File tree 2 files changed +5
-2
lines changed
2 files changed +5
-2
lines changed Original file line number Diff line number Diff line change 6
6
- main
7
7
paths-ignore :
8
8
- ' dist/**'
9
+ workflow_dispatch :
9
10
10
11
jobs :
11
12
package :
@@ -30,15 +31,15 @@ jobs:
30
31
uses : aws-actions/configure-aws-credentials@v3
31
32
with :
32
33
aws-region : us-west-2
33
- role-to-assume : ${{ secrets.SECRETS_AWS_ROLE_TO_ASSUME }}
34
+ role-to-assume : ${{ secrets.SECRETS_AWS_PACKAGING_ROLE_TO_ASSUME }}
34
35
role-duration-seconds : 900
35
36
role-session-name : SecretsManagerFetch
36
37
- name : Get bot user token
37
38
uses : aws-actions/aws-secretsmanager-get-secrets@v1
38
39
with :
39
40
parse-json-secrets : true
40
41
secret-ids : |
41
- OSDS,arn:aws:secretsmanager:us-west-2:294535624312 :secret:github-aws-sdk-osds-automation-ZHNalp
42
+ OSDS,arn:aws:secretsmanager:us-west-2:206735643321 :secret:github-aws-sdk-osds-automation-gebs9n
42
43
- name : Commit
43
44
run : |
44
45
echo "::add-mask::${{ env.OSDS_ACCESS_TOKEN }}"
Original file line number Diff line number Diff line change @@ -508,6 +508,7 @@ describe('Configure AWS Credentials', () => {
508
508
} ) ;
509
509
510
510
test ( 'GH OIDC check fails if token is not set' , async ( ) => {
511
+ process . env [ 'ACTIONS_ID_TOKEN_REQUEST_TOKEN' ] = undefined ;
511
512
process . env [ 'GITHUB_ACTIONS' ] = 'true' ;
512
513
jest . spyOn ( core , 'getInput' ) . mockImplementation (
513
514
mockGetInput ( {
@@ -528,6 +529,7 @@ describe('Configure AWS Credentials', () => {
528
529
} ) ;
529
530
530
531
test ( 'Assume role with existing credentials if nothing else set' , async ( ) => {
532
+ process . env [ 'ACTIONS_ID_TOKEN_REQUEST_TOKEN' ] = undefined ;
531
533
process . env [ 'AWS_ACCESS_KEY_ID' ] = FAKE_ACCESS_KEY_ID ;
532
534
process . env [ 'AWS_SECRET_ACCESS_KEY' ] = FAKE_SECRET_ACCESS_KEY ;
533
535
jest . spyOn ( core , 'getInput' ) . mockImplementation (
You can’t perform that action at this time.
0 commit comments