-
Notifications
You must be signed in to change notification settings - Fork 436
Closed
Labels
internalMaintenance changesMaintenance changesv3Features that will be included in Powertools v3.Features that will be included in Powertools v3.
Milestone
Description
Why is this needed?
The v3 major version of aws-actions/configure-aws-credentials has been released and is breaking our CI.
The role assumed in https://github.com/aws-powertools/powertools-lambda-python/blob/develop/.github/workflows/reusable_deploy_v2_sar.yml#L182 is different from the role that should be outputted by this command https://github.com/aws-powertools/powertools-lambda-python/blob/develop/.github/workflows/reusable_deploy_v2_sar.yml#L103.
Also, accountid is not masked by default and need to add special configuration to avoid problems with special characters (https://github.com/aws-actions/configure-aws-credentials#special-characters-in-aws_secret_access_key).
Which area does this relate to?
Automation
Solution
Investigate these problems before update this dependency.
Acknowledgment
- This request meets Powertools for AWS Lambda (Python) Tenets
- Should this be considered in other Powertools for AWS Lambda languages? i.e. Java, TypeScript, and .NET
dreamorosi
Metadata
Metadata
Assignees
Labels
internalMaintenance changesMaintenance changesv3Features that will be included in Powertools v3.Features that will be included in Powertools v3.
Type
Projects
Status
Shipped