From 94753338f91d9e325a5379c2f9e07f858dc2a9d2 Mon Sep 17 00:00:00 2001 From: Vherremi Date: Mon, 22 Sep 2025 08:35:21 -0700 Subject: [PATCH 1/6] updating 3p actions from version ID to commit SHA --- .../actions/execute_and_retry/action.yml | 2 +- .../patch_image_and_check_diff/action.yml | 2 +- .../workflows/dotnet-ec2-adot-sigv4-test.yml | 8 +-- .github/workflows/dotnet-ec2-asg-test.yml | 10 ++-- .github/workflows/dotnet-ec2-default-test.yml | 12 ++-- .github/workflows/dotnet-ec2-nuget-test.yml | 12 ++-- .github/workflows/dotnet-ec2-windows-test.yml | 10 ++-- .github/workflows/dotnet-eks-test.yml | 10 ++-- .github/workflows/dotnet-eks-windows-test.yml | 10 ++-- .github/workflows/dotnet-k8s-test.yml | 10 ++-- .../dotnet-lambda-layer-perf-test.yml | 14 ++--- .github/workflows/dotnet-lambda-test.yml | 10 ++-- .../dotnet-sample-app-ecr-deploy.yml | 10 ++-- .../workflows/dotnet-sample-app-s3-deploy.yml | 20 +++---- .github/workflows/dummy-k8s-test.yml | 2 +- .../enablement-test-publish-result.yml | 8 +-- .../workflows/java-ec2-adot-sigv4-test.yml | 8 +-- .github/workflows/java-ec2-asg-test.yml | 12 ++-- .github/workflows/java-ec2-default-test.yml | 12 ++-- .github/workflows/java-ec2-ubuntu-test.yml | 12 ++-- .github/workflows/java-ecs-test.yml | 12 ++-- .github/workflows/java-eks-otlp-ocb-retry.yml | 2 +- .github/workflows/java-eks-otlp-ocb-test.yml | 10 ++-- .github/workflows/java-eks-test.yml | 12 ++-- .github/workflows/java-k8s-test.yml | 14 ++--- .../java-lambda-layer-perf-test-cleanup.yml | 4 +- .../workflows/java-lambda-layer-perf-test.yml | 16 +++--- .github/workflows/java-lambda-test.yml | 10 ++-- .../workflows/java-sample-app-ecr-deploy.yml | 40 ++++++------- .../workflows/java-sample-app-s3-deploy.yml | 56 +++++++++---------- .github/workflows/k8s-patch-os-jobs.yml | 6 +- .github/workflows/metric-limiter-test.yml | 8 +-- .../workflows/node-ec2-adot-sigv4-test.yml | 8 +-- .github/workflows/node-ec2-asg-test.yml | 12 ++-- .github/workflows/node-ec2-default-test.yml | 12 ++-- .github/workflows/node-ecs-test.yml | 10 ++-- .github/workflows/node-eks-test.yml | 10 ++-- .github/workflows/node-k8s-test.yml | 12 ++-- .../workflows/node-lambda-layer-perf-test.yml | 14 ++--- .github/workflows/node-lambda-test.yml | 10 ++-- .../workflows/node-sample-app-ecr-deploy.yml | 10 ++-- .../workflows/node-sample-app-s3-deploy.yml | 10 ++-- .github/workflows/pr-build.yml | 8 +-- .../workflows/python-ec2-adot-sigv4-test.yml | 8 +-- .github/workflows/python-ec2-asg-test.yml | 12 ++-- .github/workflows/python-ec2-default-test.yml | 12 ++-- .github/workflows/python-ec2-genesis-test.yml | 4 +- .github/workflows/python-ecs-test.yml | 12 ++-- .github/workflows/python-eks-test.yml | 12 ++-- .github/workflows/python-k8s-test.yml | 12 ++-- .../python-lambda-layer-perf-test.yml | 14 ++--- .github/workflows/python-lambda-test.yml | 10 ++-- .../python-sample-app-ecr-deploy.yml | 18 +++--- .../workflows/python-sample-app-s3-deploy.yml | 10 ++-- .github/workflows/resource-cleanup.yml | 28 +++++----- .../traffic-generator-image-build.yml | 20 +++---- .../validate-e2e-tests-are-accounted-for.yml | 2 +- 57 files changed, 337 insertions(+), 337 deletions(-) diff --git a/.github/workflows/actions/execute_and_retry/action.yml b/.github/workflows/actions/execute_and_retry/action.yml index 3dfe73cd2..fad702bf5 100644 --- a/.github/workflows/actions/execute_and_retry/action.yml +++ b/.github/workflows/actions/execute_and_retry/action.yml @@ -71,4 +71,4 @@ runs: echo "Executing post-command for the execute_and_retry action" eval "$POST_COMMAND" - echo "Exiting execute_and_retry action" \ No newline at end of file + echo "Exiting execute_and_retry action" diff --git a/.github/workflows/actions/patch_image_and_check_diff/action.yml b/.github/workflows/actions/patch_image_and_check_diff/action.yml index 57e0ea173..92d2c9920 100644 --- a/.github/workflows/actions/patch_image_and_check_diff/action.yml +++ b/.github/workflows/actions/patch_image_and_check_diff/action.yml @@ -280,4 +280,4 @@ runs: shell: bash run: | echo "Running kubectl get pods -A" - kubectl get pods -A \ No newline at end of file + kubectl get pods -A diff --git a/.github/workflows/dotnet-ec2-adot-sigv4-test.yml b/.github/workflows/dotnet-ec2-adot-sigv4-test.yml index bca33437a..4096f6977 100644 --- a/.github/workflows/dotnet-ec2-adot-sigv4-test.yml +++ b/.github/workflows/dotnet-ec2-adot-sigv4-test.yml @@ -44,7 +44,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -64,7 +64,7 @@ jobs: run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -209,7 +209,7 @@ jobs: - name: Refresh AWS Credentials if: always() - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -221,4 +221,4 @@ jobs: working-directory: terraform/dotnet/ec2/adot-sigv4 run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/dotnet-ec2-asg-test.yml b/.github/workflows/dotnet-ec2-asg-test.yml index cc65cf441..8afc760e4 100644 --- a/.github/workflows/dotnet-ec2-asg-test.yml +++ b/.github/workflows/dotnet-ec2-asg-test.yml @@ -50,7 +50,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: aws-observability/aws-application-signals-test-framework ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -70,19 +70,19 @@ jobs: run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -281,4 +281,4 @@ jobs: working-directory: terraform/dotnet/ec2/asg run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/dotnet-ec2-default-test.yml b/.github/workflows/dotnet-ec2-default-test.yml index 127ffb50f..a1e76e5f3 100644 --- a/.github/workflows/dotnet-ec2-default-test.yml +++ b/.github/workflows/dotnet-ec2-default-test.yml @@ -56,7 +56,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -76,19 +76,19 @@ jobs: run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -249,7 +249,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -271,4 +271,4 @@ jobs: working-directory: terraform/dotnet/ec2/default run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/dotnet-ec2-nuget-test.yml b/.github/workflows/dotnet-ec2-nuget-test.yml index 54d843c9b..a0bc8481e 100644 --- a/.github/workflows/dotnet-ec2-nuget-test.yml +++ b/.github/workflows/dotnet-ec2-nuget-test.yml @@ -50,7 +50,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -70,19 +70,19 @@ jobs: run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -231,7 +231,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -253,4 +253,4 @@ jobs: working-directory: terraform/dotnet/ec2/nuget run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/dotnet-ec2-windows-test.yml b/.github/workflows/dotnet-ec2-windows-test.yml index c04732d9b..5a270d33e 100644 --- a/.github/workflows/dotnet-ec2-windows-test.yml +++ b/.github/workflows/dotnet-ec2-windows-test.yml @@ -50,7 +50,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -70,19 +70,19 @@ jobs: run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -333,7 +333,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/dotnet-eks-test.yml b/.github/workflows/dotnet-eks-test.yml index 26e20627d..39e6f1091 100644 --- a/.github/workflows/dotnet-eks-test.yml +++ b/.github/workflows/dotnet-eks-test.yml @@ -56,7 +56,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -94,13 +94,13 @@ jobs: echo DOTNET_SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -110,7 +110,7 @@ jobs: # ADOT_E2E_TEST_ROLE_ARN is used to access main build e2e test cluster # E2E_TEST_ROLE_ARN is used to access canary e2e test cluster - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -439,4 +439,4 @@ jobs: --name service-account-${{ env.TESTING_ID }} \ --namespace ${{ env.DOTNET_SAMPLE_APP_NAMESPACE }} \ --cluster ${{ inputs.test-cluster-name }} \ - --region ${{ env.E2E_TEST_AWS_REGION }} \ No newline at end of file + --region ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/dotnet-eks-windows-test.yml b/.github/workflows/dotnet-eks-windows-test.yml index 1f0731edb..2b5776222 100644 --- a/.github/workflows/dotnet-eks-windows-test.yml +++ b/.github/workflows/dotnet-eks-windows-test.yml @@ -58,7 +58,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -96,13 +96,13 @@ jobs: echo DOTNET_SAMPLE_APP_NAMESPACE="ns-w-${{ github.run_number }}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -110,7 +110,7 @@ jobs: # ADOT_E2E_TEST_ROLE_ARN is used to access main build e2e test cluster # E2E_TEST_ROLE_ARN is used to access canary e2e test cluster - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -439,4 +439,4 @@ jobs: --name service-account-${{ env.TESTING_ID }} \ --namespace ${{ env.DOTNET_SAMPLE_APP_NAMESPACE }} \ --cluster ${{ inputs.test-cluster-name }} \ - --region ${{ env.E2E_TEST_AWS_REGION }} \ No newline at end of file + --region ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/dotnet-k8s-test.yml b/.github/workflows/dotnet-k8s-test.yml index f2c91958d..776c49aab 100644 --- a/.github/workflows/dotnet-k8s-test.yml +++ b/.github/workflows/dotnet-k8s-test.yml @@ -61,7 +61,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -80,13 +80,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve Secrets - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -96,7 +96,7 @@ jobs: - name: Retrieve K8s EC2 Secrets if: ${{ env.CALLER_WORKFLOW_NAME != 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ github.event.repository.name }}/dotnet-k8s-master-node-endpoint @@ -104,7 +104,7 @@ jobs: - name: Retrieve K8s EC2 OS Patching Secrets if: ${{ env.CALLER_WORKFLOW_NAME == 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ env.CALLER_REPOSITORY }}/dotnet-k8s-master-node-endpoint-pending-value diff --git a/.github/workflows/dotnet-lambda-layer-perf-test.yml b/.github/workflows/dotnet-lambda-layer-perf-test.yml index 8ed92a4c0..13d30281c 100644 --- a/.github/workflows/dotnet-lambda-layer-perf-test.yml +++ b/.github/workflows/dotnet-lambda-layer-perf-test.yml @@ -29,19 +29,19 @@ jobs: steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Checkout aws-otel-dotnet-instrumentation - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: aws-observability/aws-otel-dotnet-instrumentation path: aws-otel-dotnet-instrumentation - name: Setup .NET - uses: actions/setup-dotnet@v4 + uses: actions/setup-dotnet@d4c94342e560b34958eacfc5d055d21461ed1c5d # v5.0.0 with: dotnet-version: ${{ github.event.inputs.dotnet-version }} @@ -49,7 +49,7 @@ jobs: run: dotnet tool install -g Amazon.Lambda.Tools - name: Setup Terraform - uses: hashicorp/setup-terraform@v2 + uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd #v3.1.2 - name: Build and Deploy .NET Sample App and Lambda Layer run: | @@ -57,7 +57,7 @@ jobs: ./build-and-deploy.sh - name: Checkout current repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: path: current-repo @@ -96,7 +96,7 @@ jobs: ./lambda-layer-perf-test/lambda-layer-run.sh true SimpleLambdaFunction - name: Upload test results - uses: actions/upload-artifact@v4 + uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 with: name: dotnet-performance-test-results path: | @@ -110,4 +110,4 @@ jobs: cd aws-otel-dotnet-instrumentation/sample-applications/lambda-test-apps/SimpleLambdaFunction/terraform/lambda echo "Starting Terraform cleanup..." terraform init - terraform destroy -auto-approve \ No newline at end of file + terraform destroy -auto-approve diff --git a/.github/workflows/dotnet-lambda-test.yml b/.github/workflows/dotnet-lambda-test.yml index 0772f18ee..935294052 100644 --- a/.github/workflows/dotnet-lambda-test.yml +++ b/.github/workflows/dotnet-lambda-test.yml @@ -51,7 +51,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -70,13 +70,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -84,7 +84,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -191,7 +191,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ always() && github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/dotnet-sample-app-ecr-deploy.yml b/.github/workflows/dotnet-sample-app-ecr-deploy.yml index 2a5fe96eb..62c04e04f 100644 --- a/.github/workflows/dotnet-sample-app-ecr-deploy.yml +++ b/.github/workflows/dotnet-sample-app-ecr-deploy.yml @@ -20,31 +20,31 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: ${{ secrets.E2E_IAD_TEST_ACCOUNT_ARN }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_ARN }} aws-region: ${{ matrix.aws-region }} - name: Login to Amazon ECR id: login-ecr - uses: aws-actions/amazon-ecr-login@v2 + uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076 # v2.0.1 - name: Docker compose build working-directory: sample-apps/dotnet diff --git a/.github/workflows/dotnet-sample-app-s3-deploy.yml b/.github/workflows/dotnet-sample-app-s3-deploy.yml index 808d6cd10..730e54c55 100644 --- a/.github/workflows/dotnet-sample-app-s3-deploy.yml +++ b/.github/workflows/dotnet-sample-app-s3-deploy.yml @@ -24,24 +24,24 @@ jobs: DEFAULT_VERSION: '8.0' DOTNET_VERSION: ${{ matrix.dotnet-version }} steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: ${{ secrets.E2E_IAD_TEST_ACCOUNT_ARN }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_ARN }} aws-region: ${{ matrix.aws-region }} @@ -114,30 +114,30 @@ jobs: runs-on: ubuntu-latest steps: - name: Checkout sample app repo - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-otel-dotnet-instrumentation' - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: ${{ secrets.E2E_IAD_TEST_ACCOUNT_ARN }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_ARN }} aws-region: ${{ matrix.aws-region }} - name: Setup .NET - uses: actions/setup-dotnet@v2 + uses: actions/setup-dotnet@d4c94342e560b34958eacfc5d055d21461ed1c5d #v5.0.0 with: dotnet-version: '8.0.x' @@ -153,4 +153,4 @@ jobs: - name: Upload Lambda Sample App to S3 working-directory: sample-applications/lambda-test-apps/SimpleLambdaFunction - run: aws s3api put-object --bucket aws-appsignals-sample-app-prod-${{ matrix.aws-region }} --body ./src/SimpleLambdaFunction/bin/Release/net8.0/SimpleLambdaFunction.zip --key dotnet-function.zip \ No newline at end of file + run: aws s3api put-object --bucket aws-appsignals-sample-app-prod-${{ matrix.aws-region }} --body ./src/SimpleLambdaFunction/bin/Release/net8.0/SimpleLambdaFunction.zip --key dotnet-function.zip diff --git a/.github/workflows/dummy-k8s-test.yml b/.github/workflows/dummy-k8s-test.yml index d804cb3a4..f5dad2a19 100644 --- a/.github/workflows/dummy-k8s-test.yml +++ b/.github/workflows/dummy-k8s-test.yml @@ -25,4 +25,4 @@ jobs: steps: - name: I am a Dummy Test, Replace me after done implementation id: job-started - run: echo "I am a Dummy Test" \ No newline at end of file + run: echo "I am a Dummy Test" diff --git a/.github/workflows/enablement-test-publish-result.yml b/.github/workflows/enablement-test-publish-result.yml index 5bcdbfa64..e8a998ddc 100644 --- a/.github/workflows/enablement-test-publish-result.yml +++ b/.github/workflows/enablement-test-publish-result.yml @@ -37,19 +37,19 @@ jobs: run: echo "job-started=true" >> $GITHUB_OUTPUT - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -68,4 +68,4 @@ jobs: --dimensions repository=${{ github.repository }},branch=${{ github.ref_name }},workflow=${{ env.CALLER_WORKFLOW_NAME }} \ --value 1.0 \ --region ${{ env.E2E_TEST_AWS_REGION }} - fi \ No newline at end of file + fi diff --git a/.github/workflows/java-ec2-adot-sigv4-test.yml b/.github/workflows/java-ec2-adot-sigv4-test.yml index d62755f4b..8a7973dcd 100644 --- a/.github/workflows/java-ec2-adot-sigv4-test.yml +++ b/.github/workflows/java-ec2-adot-sigv4-test.yml @@ -59,7 +59,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -80,7 +80,7 @@ jobs: # We use the us-east-1 account, but use us-west-2 for the test # This is because transaction search is a regional setting, which would affect all other tests if run in the same region - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -250,7 +250,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -262,4 +262,4 @@ jobs: working-directory: terraform/java/ec2/adot-sigv4 run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/java-ec2-asg-test.yml b/.github/workflows/java-ec2-asg-test.yml index 7102f4e70..d7f21bc97 100644 --- a/.github/workflows/java-ec2-asg-test.yml +++ b/.github/workflows/java-ec2-asg-test.yml @@ -62,7 +62,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -81,13 +81,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -95,7 +95,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -288,7 +288,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -310,4 +310,4 @@ jobs: working-directory: terraform/java/ec2/asg run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/java-ec2-default-test.yml b/.github/workflows/java-ec2-default-test.yml index 5d288b8cc..b94942178 100644 --- a/.github/workflows/java-ec2-default-test.yml +++ b/.github/workflows/java-ec2-default-test.yml @@ -67,7 +67,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -86,13 +86,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -100,7 +100,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -271,7 +271,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -293,4 +293,4 @@ jobs: working-directory: terraform/java/ec2/default run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/java-ec2-ubuntu-test.yml b/.github/workflows/java-ec2-ubuntu-test.yml index b20969f91..52357936a 100644 --- a/.github/workflows/java-ec2-ubuntu-test.yml +++ b/.github/workflows/java-ec2-ubuntu-test.yml @@ -51,7 +51,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -70,13 +70,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -84,7 +84,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -243,7 +243,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -265,4 +265,4 @@ jobs: working-directory: terraform/java/ec2/ubuntu run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/java-ecs-test.yml b/.github/workflows/java-ecs-test.yml index 44017be39..fecaf2d3f 100644 --- a/.github/workflows/java-ecs-test.yml +++ b/.github/workflows/java-ecs-test.yml @@ -63,7 +63,7 @@ jobs: run: | echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -82,13 +82,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -98,7 +98,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -255,7 +255,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -286,4 +286,4 @@ jobs: -var="sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_URI }}" \ -var="sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_URI }}" \ -var="adot_instrumentation_image=${{ env.ADOT_INSTRUMENTATION_IMAGE_URI }}" \ - -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" \ No newline at end of file + -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" diff --git a/.github/workflows/java-eks-otlp-ocb-retry.yml b/.github/workflows/java-eks-otlp-ocb-retry.yml index 5d70f33b3..1d4f56795 100644 --- a/.github/workflows/java-eks-otlp-ocb-retry.yml +++ b/.github/workflows/java-eks-otlp-ocb-retry.yml @@ -68,4 +68,4 @@ jobs: with: aws-region: ${{ inputs.aws-region }} caller-workflow-name: ${{ inputs.caller-workflow-name }} - validation-result: ${{ needs.java-eks-otlp-ocb-attempt-1.outputs.validation-result || needs.java-eks-otlp-ocb-attempt-2.outputs.validation-result }} \ No newline at end of file + validation-result: ${{ needs.java-eks-otlp-ocb-attempt-1.outputs.validation-result || needs.java-eks-otlp-ocb-attempt-2.outputs.validation-result }} diff --git a/.github/workflows/java-eks-otlp-ocb-test.yml b/.github/workflows/java-eks-otlp-ocb-test.yml index e98d31aad..b05465f00 100644 --- a/.github/workflows/java-eks-otlp-ocb-test.yml +++ b/.github/workflows/java-eks-otlp-ocb-test.yml @@ -75,7 +75,7 @@ jobs: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -102,13 +102,13 @@ jobs: post-command: "chmod +x install-otel-operator.sh" - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, otlp-region-account/gamma-${{ env.E2E_TEST_AWS_REGION }} @@ -116,7 +116,7 @@ jobs: JAVA_REMOTE_SAMPLE_APP_IMAGE, e2e-test/java-remote-sample-app-image - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -327,7 +327,7 @@ jobs: --rollup' - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/java-eks-test.yml b/.github/workflows/java-eks-test.yml index 71a2b04ff..25971a75c 100644 --- a/.github/workflows/java-eks-test.yml +++ b/.github/workflows/java-eks-test.yml @@ -68,7 +68,7 @@ jobs: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -103,13 +103,13 @@ jobs: sed -i "s#$delete_log_group##g" clean-app-signals.sh - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -119,7 +119,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -205,7 +205,7 @@ jobs: - name: Get RDS database credentials from SecretsManager continue-on-error: true - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 env: NODE_OPTIONS: "--network-family-autoselection-attempt-timeout=1000" with: @@ -443,7 +443,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/java-k8s-test.yml b/.github/workflows/java-k8s-test.yml index a4db9286f..51629be7a 100644 --- a/.github/workflows/java-k8s-test.yml +++ b/.github/workflows/java-k8s-test.yml @@ -67,7 +67,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -86,13 +86,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve Secrets - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -102,7 +102,7 @@ jobs: - name: Retrieve K8s EC2 Secrets if: ${{ env.CALLER_WORKFLOW_NAME != 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ github.event.repository.name }}/java-k8s-master-node-endpoint @@ -110,7 +110,7 @@ jobs: - name: Retrieve K8s EC2 OS Patching Secrets if: ${{ env.CALLER_WORKFLOW_NAME == 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ env.CALLER_REPOSITORY }}/java-k8s-master-node-endpoint-pending-value @@ -233,7 +233,7 @@ jobs: --rollup' - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 @@ -280,4 +280,4 @@ jobs: working-directory: terraform/java/k8s/cleanup run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/java-lambda-layer-perf-test-cleanup.yml b/.github/workflows/java-lambda-layer-perf-test-cleanup.yml index 07ab46d48..565d38730 100644 --- a/.github/workflows/java-lambda-layer-perf-test-cleanup.yml +++ b/.github/workflows/java-lambda-layer-perf-test-cleanup.yml @@ -35,13 +35,13 @@ jobs: steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Setup Terraform - uses: hashicorp/setup-terraform@v2 + uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd #v3.1.2 - name: Cleanup Terraform Resources if: success() || failure() || cancelled() diff --git a/.github/workflows/java-lambda-layer-perf-test.yml b/.github/workflows/java-lambda-layer-perf-test.yml index a65d4d3f9..0c28bc54c 100644 --- a/.github/workflows/java-lambda-layer-perf-test.yml +++ b/.github/workflows/java-lambda-layer-perf-test.yml @@ -35,13 +35,13 @@ jobs: steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Checkout aws-otel-java-instrumentation - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: aws-observability/aws-otel-java-instrumentation ref: ${{ github.event.inputs.ADOT-Java-Branch }} @@ -54,7 +54,7 @@ jobs: echo "ADOT Java Commit Hash: $(git rev-parse HEAD)" - name: Setup Terraform - uses: hashicorp/setup-terraform@v2 + uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd #v3.1.2 - name: Build and Deploy Lambda Layer run: | @@ -85,13 +85,13 @@ jobs: # Re-authenticate to refresh credentials (important!) - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Checkout current repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: path: current-repo @@ -130,7 +130,7 @@ jobs: ./lambda-layer-perf-test/lambda-layer-run.sh true aws-opentelemetry-distro-java - name: Upload test results - uses: actions/upload-artifact@v4 + uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 with: name: java-performance-test-results path: | @@ -141,7 +141,7 @@ jobs: # Always re-authenticate to refresh credentials before cleanup - name: Refresh AWS Credentials before cleanup if: success() || failure() || cancelled() - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 @@ -152,4 +152,4 @@ jobs: cd aws-otel-java-instrumentation/sample-apps/apigateway-lambda/terraform echo "Starting Terraform cleanup..." terraform init - terraform destroy -auto-approve \ No newline at end of file + terraform destroy -auto-approve diff --git a/.github/workflows/java-lambda-test.yml b/.github/workflows/java-lambda-test.yml index acf49c75a..ccef50c6b 100644 --- a/.github/workflows/java-lambda-test.yml +++ b/.github/workflows/java-lambda-test.yml @@ -48,7 +48,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -70,20 +70,20 @@ jobs: run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -204,7 +204,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/java-sample-app-ecr-deploy.yml b/.github/workflows/java-sample-app-ecr-deploy.yml index 02960bdd1..4fd32f7e7 100644 --- a/.github/workflows/java-sample-app-ecr-deploy.yml +++ b/.github/workflows/java-sample-app-ecr-deploy.yml @@ -28,31 +28,31 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ matrix.aws-region }} JAVA_MAIN_SAMPLE_APP_IMAGE, e2e-test/java-main-sample-app-image - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' @@ -72,31 +72,31 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ matrix.aws-region }} JAVA_REMOTE_SAMPLE_APP_IMAGE, e2e-test/java-remote-sample-app-image - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' @@ -113,27 +113,27 @@ jobs: java-version: [ '8', '17', '21', '23' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 - - uses: actions/setup-java@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: distribution: 'temurin' java-version: ${{ matrix.java-version }} check-latest: true - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | JAVA_MAIN_SAMPLE_APP_IMAGE, e2e-test/java-main-sample-app-image - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' @@ -158,27 +158,27 @@ jobs: java-version: [ '8', '17', '21', '23' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 - - uses: actions/setup-java@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: distribution: 'temurin' java-version: ${{ matrix.java-version }} check-latest: true - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | JAVA_REMOTE_SAMPLE_APP_IMAGE, e2e-test/java-remote-sample-app-image - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' diff --git a/.github/workflows/java-sample-app-s3-deploy.yml b/.github/workflows/java-sample-app-s3-deploy.yml index af82d7960..794cf618a 100644 --- a/.github/workflows/java-sample-app-s3-deploy.yml +++ b/.github/workflows/java-sample-app-s3-deploy.yml @@ -26,30 +26,30 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' @@ -69,30 +69,30 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' @@ -109,20 +109,20 @@ jobs: java-version: [ '8', '17', '21', '23' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 - - uses: actions/setup-java@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: distribution: 'temurin' java-version: ${{ matrix.java-version }} check-latest: true - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 @@ -148,20 +148,20 @@ jobs: java-version: [ '8', '17', '21', '23' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 - - uses: actions/setup-java@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: distribution: 'temurin' java-version: ${{ matrix.java-version }} check-latest: true - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 @@ -191,30 +191,30 @@ jobs: runs-on: ubuntu-latest steps: - name: Check out ADOT Java repo - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-otel-java-instrumentation' - name: Setup Java - uses: actions/setup-java@v4 + uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: distribution: 'temurin' java-version: '17' - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} @@ -230,30 +230,30 @@ jobs: java-v11-adaptive-sampling: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, adaptive-sampling-region-account/prod-us-west-2 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-west-2 - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@v4 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 with: gradle-version: '8.14' diff --git a/.github/workflows/k8s-patch-os-jobs.yml b/.github/workflows/k8s-patch-os-jobs.yml index f80583534..609c2dd0b 100644 --- a/.github/workflows/k8s-patch-os-jobs.yml +++ b/.github/workflows/k8s-patch-os-jobs.yml @@ -44,10 +44,10 @@ jobs: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - name: Checkout repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 @@ -146,7 +146,7 @@ jobs: runs-on: ubuntu-latest steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 diff --git a/.github/workflows/metric-limiter-test.yml b/.github/workflows/metric-limiter-test.yml index a185987d9..2af8a5752 100644 --- a/.github/workflows/metric-limiter-test.yml +++ b/.github/workflows/metric-limiter-test.yml @@ -70,7 +70,7 @@ jobs: echo TESTING_ID="metric-limiter-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -105,13 +105,13 @@ jobs: sed -i "s#$delete_log_group##g" clean-app-signals.sh - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -121,7 +121,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/node-ec2-adot-sigv4-test.yml b/.github/workflows/node-ec2-adot-sigv4-test.yml index b12417913..18d97022a 100644 --- a/.github/workflows/node-ec2-adot-sigv4-test.yml +++ b/.github/workflows/node-ec2-adot-sigv4-test.yml @@ -55,7 +55,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -74,7 +74,7 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -243,7 +243,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ always() }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -255,4 +255,4 @@ jobs: working-directory: terraform/node/ec2/adot-sigv4 run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/node-ec2-asg-test.yml b/.github/workflows/node-ec2-asg-test.yml index ccfb5f69e..cc61fc35e 100644 --- a/.github/workflows/node-ec2-asg-test.yml +++ b/.github/workflows/node-ec2-asg-test.yml @@ -54,7 +54,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -73,13 +73,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -87,7 +87,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -271,7 +271,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -293,4 +293,4 @@ jobs: working-directory: terraform/node/ec2/asg run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/node-ec2-default-test.yml b/.github/workflows/node-ec2-default-test.yml index 8e03c25b7..0e9199f0c 100644 --- a/.github/workflows/node-ec2-default-test.yml +++ b/.github/workflows/node-ec2-default-test.yml @@ -67,7 +67,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}-${{ inputs.node-version }}-${{ inputs.cpu-architecture }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -86,13 +86,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -100,7 +100,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -264,7 +264,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ always() && github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -286,4 +286,4 @@ jobs: working-directory: terraform/node/ec2/default run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/node-ecs-test.yml b/.github/workflows/node-ecs-test.yml index 627d66233..f52c250f3 100644 --- a/.github/workflows/node-ecs-test.yml +++ b/.github/workflows/node-ecs-test.yml @@ -57,7 +57,7 @@ jobs: run: | echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -76,13 +76,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -92,7 +92,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -249,7 +249,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/node-eks-test.yml b/.github/workflows/node-eks-test.yml index ddb0ed71b..abb194aad 100644 --- a/.github/workflows/node-eks-test.yml +++ b/.github/workflows/node-eks-test.yml @@ -62,7 +62,7 @@ jobs: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -97,13 +97,13 @@ jobs: sed -i "s#$delete_log_group##g" clean-app-signals.sh - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account and sample app ECR names - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -113,7 +113,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -199,7 +199,7 @@ jobs: - name: Get RDS database credentials from SecretsManager continue-on-error: true - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 env: NODE_OPTIONS: "--network-family-autoselection-attempt-timeout=1000" with: diff --git a/.github/workflows/node-k8s-test.yml b/.github/workflows/node-k8s-test.yml index ef71278e5..f8beb782f 100644 --- a/.github/workflows/node-k8s-test.yml +++ b/.github/workflows/node-k8s-test.yml @@ -61,7 +61,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -80,13 +80,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve Secrets - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -96,7 +96,7 @@ jobs: - name: Retrieve K8s EC2 Secrets if: ${{ env.CALLER_WORKFLOW_NAME != 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ github.event.repository.name }}/node-k8s-master-node-endpoint @@ -104,7 +104,7 @@ jobs: - name: Retrieve K8s EC2 OS Patching Secrets if: ${{ env.CALLER_WORKFLOW_NAME == 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ env.CALLER_REPOSITORY }}/node-k8s-master-node-endpoint-pending-value @@ -268,4 +268,4 @@ jobs: working-directory: terraform/node/k8s/cleanup run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/node-lambda-layer-perf-test.yml b/.github/workflows/node-lambda-layer-perf-test.yml index c3e355c21..c23bd1008 100644 --- a/.github/workflows/node-lambda-layer-perf-test.yml +++ b/.github/workflows/node-lambda-layer-perf-test.yml @@ -28,24 +28,24 @@ jobs: steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Checkout aws-otel-js-instrumentation - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: aws-observability/aws-otel-js-instrumentation path: aws-otel-js-instrumentation - name: Setup Node.js - uses: actions/setup-node@v4 + uses: actions/setup-node@a0853c24544627f65ddf259abe73b1d18a591444 # v5.0.0 with: node-version: ${{ github.event.inputs.node_version }} - name: Setup Terraform - uses: hashicorp/setup-terraform@v2 + uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd #v3.1.2 - name: Build Lambda Layer run: | @@ -63,7 +63,7 @@ jobs: terraform apply -auto-approve - name: Checkout current repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: path: current-repo @@ -102,7 +102,7 @@ jobs: ./lambda-layer-perf-test/lambda-layer-run.sh true aws-opentelemetry-distro-nodejs - name: Upload test results - uses: actions/upload-artifact@v4 + uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 with: name: js-performance-test-results path: | @@ -116,4 +116,4 @@ jobs: cd aws-otel-js-instrumentation/lambda-layer/terraform/lambda echo "Starting Terraform cleanup..." terraform init - terraform destroy -auto-approve \ No newline at end of file + terraform destroy -auto-approve diff --git a/.github/workflows/node-lambda-test.yml b/.github/workflows/node-lambda-test.yml index 290959631..435ec194a 100644 --- a/.github/workflows/node-lambda-test.yml +++ b/.github/workflows/node-lambda-test.yml @@ -55,7 +55,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -74,13 +74,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -88,7 +88,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -195,7 +195,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ always() && github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/node-sample-app-ecr-deploy.yml b/.github/workflows/node-sample-app-ecr-deploy.yml index 63cb15b64..bf1495ee1 100644 --- a/.github/workflows/node-sample-app-ecr-deploy.yml +++ b/.github/workflows/node-sample-app-ecr-deploy.yml @@ -24,31 +24,31 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_ARN }} aws-region: ${{ matrix.aws-region }} - name: Login to Amazon ECR id: login-ecr - uses: aws-actions/amazon-ecr-login@v2 + uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076 # v2.0.1 - name: Docker compose build working-directory: sample-apps/node diff --git a/.github/workflows/node-sample-app-s3-deploy.yml b/.github/workflows/node-sample-app-s3-deploy.yml index f4cf3019a..f379b9858 100644 --- a/.github/workflows/node-sample-app-s3-deploy.yml +++ b/.github/workflows/node-sample-app-s3-deploy.yml @@ -24,24 +24,24 @@ jobs: 'us-east-1','us-east-2', 'us-west-1', 'us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_ARN }} aws-region: ${{ matrix.aws-region }} @@ -55,7 +55,7 @@ jobs: run: aws s3api put-object --bucket ${{ secrets.APP_SIGNALS_E2E_EC2_JAR }}-prod-${{ matrix.aws-region }} --body ./node-sample-app.zip --key node-sample-app.zip - name: Build Lambda Sample App - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-otel-js-instrumentation' - name: Setup Layer Tools diff --git a/.github/workflows/pr-build.yml b/.github/workflows/pr-build.yml index f5a149112..ad8f8ef12 100644 --- a/.github/workflows/pr-build.yml +++ b/.github/workflows/pr-build.yml @@ -10,15 +10,15 @@ jobs: name: Gradle Build runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - - uses: actions/setup-java@v4 + - uses: actions/setup-java@dded0888837ed1f317902acf8a20df0ad188d165 # v5.0.0 with: java-version: 11 distribution: corretto - name: Setup Gradle - uses: gradle/actions/setup-gradle@v3 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 - name: Build with Gradle - run: ./gradlew build \ No newline at end of file + run: ./gradlew build diff --git a/.github/workflows/python-ec2-adot-sigv4-test.yml b/.github/workflows/python-ec2-adot-sigv4-test.yml index a0c686a27..c6eca9cfb 100644 --- a/.github/workflows/python-ec2-adot-sigv4-test.yml +++ b/.github/workflows/python-ec2-adot-sigv4-test.yml @@ -48,7 +48,7 @@ jobs: runs-on: ubuntu-latest timeout-minutes: 30 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -70,7 +70,7 @@ jobs: run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -240,7 +240,7 @@ jobs: - name: Refresh AWS Credentials if: always() - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -252,4 +252,4 @@ jobs: working-directory: terraform/python/ec2/adot-sigv4 run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/python-ec2-asg-test.yml b/.github/workflows/python-ec2-asg-test.yml index 59e9046fd..fa9daa925 100644 --- a/.github/workflows/python-ec2-asg-test.yml +++ b/.github/workflows/python-ec2-asg-test.yml @@ -66,7 +66,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: aws-observability/aws-application-signals-test-framework ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -85,13 +85,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -99,7 +99,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -289,7 +289,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -311,4 +311,4 @@ jobs: working-directory: terraform/python/ec2/asg run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/python-ec2-default-test.yml b/.github/workflows/python-ec2-default-test.yml index dd996ff52..4fb5aa575 100644 --- a/.github/workflows/python-ec2-default-test.yml +++ b/.github/workflows/python-ec2-default-test.yml @@ -68,7 +68,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -90,20 +90,20 @@ jobs: run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -272,7 +272,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -294,4 +294,4 @@ jobs: working-directory: terraform/python/ec2/default run: | terraform destroy -auto-approve \ - -var="test_id=${{ env.TESTING_ID }}" \ No newline at end of file + -var="test_id=${{ env.TESTING_ID }}" diff --git a/.github/workflows/python-ec2-genesis-test.yml b/.github/workflows/python-ec2-genesis-test.yml index b023840be..3378b3837 100644 --- a/.github/workflows/python-ec2-genesis-test.yml +++ b/.github/workflows/python-ec2-genesis-test.yml @@ -34,7 +34,7 @@ jobs: runs-on: ubuntu-latest timeout-minutes: 30 steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -82,7 +82,7 @@ jobs: echo "Generated Trace ID Header: ${TRACE_ID_HEADER}" - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/python-ecs-test.yml b/.github/workflows/python-ecs-test.yml index 62521a107..d9df7a0ba 100644 --- a/.github/workflows/python-ecs-test.yml +++ b/.github/workflows/python-ecs-test.yml @@ -63,7 +63,7 @@ jobs: run: | echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -82,13 +82,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -98,7 +98,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -255,7 +255,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -286,4 +286,4 @@ jobs: -var="sample_app_image=${{ env.MAIN_SAMPLE_APP_IMAGE_URI }}" \ -var="sample_remote_app_image=${{ env.REMOTE_SAMPLE_APP_IMAGE_URI }}" \ -var="adot_instrumentation_image=${{ env.ADOT_INSTRUMENTATION_IMAGE_URI }}" \ - -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" \ No newline at end of file + -var="cwagent_image=${{ env.CWAGENT_IMAGE_URI }}" diff --git a/.github/workflows/python-eks-test.yml b/.github/workflows/python-eks-test.yml index 094c2904c..18d2ead9e 100644 --- a/.github/workflows/python-eks-test.yml +++ b/.github/workflows/python-eks-test.yml @@ -68,7 +68,7 @@ jobs: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ inputs.caller-workflow-name == 'main-build' && 'main' || github.ref }} @@ -104,13 +104,13 @@ jobs: sed -i "s#$delete_log_group##g" clean-app-signals.sh - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -120,7 +120,7 @@ jobs: # If the workflow is running as a canary, then we want to log in to the aws account in the appropriate region - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -206,7 +206,7 @@ jobs: - name: Get RDS database credentials from SecretsManager continue-on-error: true - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 env: NODE_OPTIONS: "--network-family-autoselection-attempt-timeout=1000" with: @@ -446,7 +446,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/python-k8s-test.yml b/.github/workflows/python-k8s-test.yml index 767f96d22..bfc7ea701 100644 --- a/.github/workflows/python-k8s-test.yml +++ b/.github/workflows/python-k8s-test.yml @@ -67,7 +67,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -86,13 +86,13 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve Secrets - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} @@ -102,7 +102,7 @@ jobs: - name: Retrieve K8s EC2 Secrets if: ${{ env.CALLER_WORKFLOW_NAME != 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ github.event.repository.name }}/python-k8s-master-node-endpoint @@ -110,7 +110,7 @@ jobs: - name: Retrieve K8s EC2 OS Patching Secrets if: ${{ env.CALLER_WORKFLOW_NAME == 'k8s-os-patching' }} - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | MAIN_SERVICE_ENDPOINT, e2e-test/${{ env.CALLER_REPOSITORY }}/python-k8s-master-node-endpoint-pending-value @@ -233,7 +233,7 @@ jobs: --rollup' - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 diff --git a/.github/workflows/python-lambda-layer-perf-test.yml b/.github/workflows/python-lambda-layer-perf-test.yml index eacbf1531..6184fbf39 100644 --- a/.github/workflows/python-lambda-layer-perf-test.yml +++ b/.github/workflows/python-lambda-layer-perf-test.yml @@ -28,24 +28,24 @@ jobs: steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Checkout aws-otel-python-instrumentation - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: aws-observability/aws-otel-python-instrumentation path: aws-otel-python-instrumentation - name: Setup Python - uses: actions/setup-python@v5 + uses: actions/setup-python@e797f83bcb11b83ae66e0230d6156d7c80228e7c # v6.0.0 with: python-version: ${{ github.event.inputs.python_version }} - name: Setup Terraform - uses: hashicorp/setup-terraform@v2 + uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd #v3.1.2 - name: Build Lambda Layer run: | @@ -54,7 +54,7 @@ jobs: ./build.sh - name: Checkout current repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: path: current-repo @@ -93,7 +93,7 @@ jobs: ./lambda-layer-perf-test/lambda-layer-run.sh true aws-opentelemetry-distro-python - name: Upload test results - uses: actions/upload-artifact@v4 + uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 with: name: python-performance-test-results path: | @@ -107,4 +107,4 @@ jobs: cd aws-otel-python-instrumentation/lambda-layer/terraform/lambda echo "Starting Terraform cleanup..." terraform init - terraform destroy -auto-approve \ No newline at end of file + terraform destroy -auto-approve diff --git a/.github/workflows/python-lambda-test.yml b/.github/workflows/python-lambda-test.yml index 9a7a74187..6206d8e61 100644 --- a/.github/workflows/python-lambda-test.yml +++ b/.github/workflows/python-lambda-test.yml @@ -68,7 +68,7 @@ jobs: id: job-started run: echo "job-started=true" >> $GITHUB_OUTPUT - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -90,20 +90,20 @@ jobs: run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -221,7 +221,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} diff --git a/.github/workflows/python-sample-app-ecr-deploy.yml b/.github/workflows/python-sample-app-ecr-deploy.yml index 6823b7b8a..27a611310 100644 --- a/.github/workflows/python-sample-app-ecr-deploy.yml +++ b/.github/workflows/python-sample-app-ecr-deploy.yml @@ -28,18 +28,18 @@ jobs: 'us-east-1','us-east-2','us-west-1','us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ matrix.aws-region }} @@ -47,14 +47,14 @@ jobs: PYTHON_REMOTE_SAMPLE_APP_IMAGE, e2e-test/python-remote-sample-app-image - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} - name: Login to Amazon ECR id: login-ecr - uses: aws-actions/amazon-ecr-login@v2 + uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076 # v2.0.1 - name: Docker compose build working-directory: sample-apps/python @@ -78,18 +78,18 @@ jobs: python-version: [ '3.8', '3.9', '3.11', '3.12', '3.13' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/us-east-1 @@ -98,7 +98,7 @@ jobs: - name: Login to Amazon ECR id: login-ecr - uses: aws-actions/amazon-ecr-login@v2 + uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076 # v2.0.1 - name: Docker compose build working-directory: sample-apps/python diff --git a/.github/workflows/python-sample-app-s3-deploy.yml b/.github/workflows/python-sample-app-s3-deploy.yml index 27d5339a0..28e3d31bd 100644 --- a/.github/workflows/python-sample-app-s3-deploy.yml +++ b/.github/workflows/python-sample-app-s3-deploy.yml @@ -24,24 +24,24 @@ jobs: 'us-east-1','us-east-2', 'us-west-1', 'us-west-2' ] runs-on: ubuntu-latest steps: - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: ${{ secrets.E2E_IAD_TEST_ACCOUNT_ARN }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.E2E_TEST_ROLE_ARN }} aws-region: ${{ matrix.aws-region }} @@ -63,7 +63,7 @@ jobs: run: aws s3api put-object --bucket ${{ secrets.APP_SIGNALS_E2E_EC2_JAR }}-prod-${{ matrix.aws-region }} --body ./python-gen-ai-sample-app.zip --key python-genai-sample-app.zip - name: Build Lambda Sample App - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 with: repository: 'aws-observability/aws-otel-python-instrumentation' - name: Build sample lambda function diff --git a/.github/workflows/resource-cleanup.yml b/.github/workflows/resource-cleanup.yml index 7849836c2..b12073aa9 100644 --- a/.github/workflows/resource-cleanup.yml +++ b/.github/workflows/resource-cleanup.yml @@ -26,25 +26,25 @@ jobs: id-token: write contents: read steps: - - uses: actions/checkout@v3 - - uses: actions/setup-python@v5 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-python@e797f83bcb11b83ae66e0230d6156d7c80228e7c # v6.0.0 with: python-version: '3.10' - name: Configure AWS credentials for IAD account access - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: ${{ secrets.E2E_IAD_TEST_ACCOUNT_ARN }} aws-region: us-east-1 - name: Retrieve account id for the region - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS credentials for the regional account access - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.RESOURCE_CLEANER_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} @@ -61,13 +61,13 @@ jobs: cleanup-k8s-cluster: runs-on: ubuntu-latest steps: - - uses: actions/checkout@v3 - - uses: actions/setup-python@v5 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-python@e797f83bcb11b83ae66e0230d6156d7c80228e7c # v6.0.0 with: python-version: '3.10' - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ secrets.APPLICATION_SIGNALS_E2E_TEST_ACCOUNT_ID }}:role/${{ secrets.RESOURCE_CLEANER_ROLE_NAME }} aws-region: us-east-1 @@ -94,25 +94,25 @@ jobs: id-token: write contents: read steps: - - uses: actions/checkout@v3 - - uses: actions/setup-python@v5 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/setup-python@e797f83bcb11b83ae66e0230d6156d7c80228e7c # v6.0.0 with: python-version: '3.10' - name: Configure AWS credentials for IAD account access - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: ${{ secrets.E2E_IAD_TEST_ACCOUNT_ARN }} aws-region: us-east-1 - name: Retrieve account id for the region - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS credentials for the regional account access - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ secrets.RESOURCE_CLEANER_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} @@ -133,4 +133,4 @@ jobs: with: aws-region: 'us-east-1' caller-workflow-name: 'enablement-test-resource-cleanup' - validation-result: ${{ (needs.cleanup-ec2-instances.result == 'success' && needs.cleanup-k8s-cluster.result == 'success' && needs.cleanup-lambda-layer.result == 'success') && 'success' || 'failure' }} \ No newline at end of file + validation-result: ${{ (needs.cleanup-ec2-instances.result == 'success' && needs.cleanup-k8s-cluster.result == 'success' && needs.cleanup-lambda-layer.result == 'success') && 'success' || 'failure' }} diff --git a/.github/workflows/traffic-generator-image-build.yml b/.github/workflows/traffic-generator-image-build.yml index ad8808050..3cd4e96bc 100644 --- a/.github/workflows/traffic-generator-image-build.yml +++ b/.github/workflows/traffic-generator-image-build.yml @@ -29,29 +29,29 @@ jobs: 'us-east-1','us-east-2', 'us-west-1', 'us-west-2'] steps: - name: Checkout repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} - name: Login to Amazon ECR id: login-ecr - uses: aws-actions/amazon-ecr-login@v2 + uses: aws-actions/amazon-ecr-login@062b18b96a7aff071d4dc91bc00c4c1a7945b076 # v2.0.1 - name: Build, tag, and push image to Amazon ECR working-directory: sample-apps/traffic-generator @@ -73,22 +73,22 @@ jobs: 'us-east-1','us-east-2', 'us-west-1', 'us-west-2'] steps: - name: Checkout repository - uses: actions/checkout@v4 + uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 with: secret-ids: | ACCOUNT_ID, region-account/${{ matrix.aws-region }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ matrix.aws-region }} @@ -97,4 +97,4 @@ jobs: working-directory: sample-apps/traffic-generator run: | zip traffic-generator.zip ./index.js ./package.json - aws s3 cp traffic-generator.zip s3://aws-appsignals-sample-app-prod-${{ matrix.aws-region }}/traffic-generator.zip \ No newline at end of file + aws s3 cp traffic-generator.zip s3://aws-appsignals-sample-app-prod-${{ matrix.aws-region }}/traffic-generator.zip diff --git a/.github/workflows/validate-e2e-tests-are-accounted-for.yml b/.github/workflows/validate-e2e-tests-are-accounted-for.yml index c492c56e6..8749b3145 100644 --- a/.github/workflows/validate-e2e-tests-are-accounted-for.yml +++ b/.github/workflows/validate-e2e-tests-are-accounted-for.yml @@ -17,7 +17,7 @@ jobs: runs-on: ubuntu-latest steps: - name: Install Ruby - uses: ruby/setup-ruby@v1.221.0 + uses: ruby/setup-ruby@32110d4e311bd8996b2a82bf2a43b714ccc91777 #v1.221.0 with: ruby-version: "3.4" From 6dbdb48a8ef2d35e464b21217a400989e9f9dac4 Mon Sep 17 00:00:00 2001 From: Miqueas Herrera Date: Mon, 22 Sep 2025 09:39:37 -0700 Subject: [PATCH 2/6] Update .github/workflows/java-sample-app-ecr-deploy.yml Co-authored-by: Thomas Pierce --- .github/workflows/java-sample-app-ecr-deploy.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/java-sample-app-ecr-deploy.yml b/.github/workflows/java-sample-app-ecr-deploy.yml index 4fd32f7e7..33446c5f3 100644 --- a/.github/workflows/java-sample-app-ecr-deploy.yml +++ b/.github/workflows/java-sample-app-ecr-deploy.yml @@ -52,7 +52,7 @@ jobs: aws-region: ${{ matrix.aws-region }} - name: Setup Gradle 8.14 - uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a #4.4.3 + uses: gradle/actions/setup-gradle@ed408507eac070d1f99cc633dbcf757c94c7933a # v4.4.3 with: gradle-version: '8.14' From 6c495eb938597748a1c1c09871e1df8a525547b5 Mon Sep 17 00:00:00 2001 From: Vherremi Date: Tue, 23 Sep 2025 07:46:15 -0700 Subject: [PATCH 3/6] reverting java-eks-otlp-ocb-test.yml until change in workflow is validated --- .github/workflows/java-eks-otlp-ocb-test.yml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/java-eks-otlp-ocb-test.yml b/.github/workflows/java-eks-otlp-ocb-test.yml index b05465f00..e98d31aad 100644 --- a/.github/workflows/java-eks-otlp-ocb-test.yml +++ b/.github/workflows/java-eks-otlp-ocb-test.yml @@ -75,7 +75,7 @@ jobs: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 + - uses: actions/checkout@v4 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -102,13 +102,13 @@ jobs: post-command: "chmod +x install-otel-operator.sh" - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 # v2.0.10 + uses: aws-actions/aws-secretsmanager-get-secrets@v2 with: secret-ids: | ACCOUNT_ID, otlp-region-account/gamma-${{ env.E2E_TEST_AWS_REGION }} @@ -116,7 +116,7 @@ jobs: JAVA_REMOTE_SAMPLE_APP_IMAGE, e2e-test/java-remote-sample-app-image - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -327,7 +327,7 @@ jobs: --rollup' - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 # v5.0.0 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} From 03f4f90f6bcbe9e2075c238b6df08c64e5f19b00 Mon Sep 17 00:00:00 2001 From: Vherremi Date: Tue, 23 Sep 2025 13:38:43 -0700 Subject: [PATCH 4/6] updating java-eks-otlp-ocb-test --- .github/workflows/java-eks-otlp-ocb-test.yml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/java-eks-otlp-ocb-test.yml b/.github/workflows/java-eks-otlp-ocb-test.yml index e98d31aad..337543629 100644 --- a/.github/workflows/java-eks-otlp-ocb-test.yml +++ b/.github/workflows/java-eks-otlp-ocb-test.yml @@ -75,7 +75,7 @@ jobs: echo TESTING_ID="${{ github.job }}-${{ github.run_id }}-${{ github.run_number }}-${{ github.run_attempt }}" >> $GITHUB_ENV echo SAMPLE_APP_NAMESPACE="ns-${{ github.run_id }}-${{ github.run_number }}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 #5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -102,13 +102,13 @@ jobs: post-command: "chmod +x install-otel-operator.sh" - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v2 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | ACCOUNT_ID, otlp-region-account/gamma-${{ env.E2E_TEST_AWS_REGION }} @@ -116,7 +116,7 @@ jobs: JAVA_REMOTE_SAMPLE_APP_IMAGE, e2e-test/java-remote-sample-app-image - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -327,7 +327,7 @@ jobs: --rollup' - name: Refresh AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} From 1d947da7a21c2adf2a394f22acea8cad3bb6ee1e Mon Sep 17 00:00:00 2001 From: Vherremi Date: Tue, 23 Sep 2025 13:58:21 -0700 Subject: [PATCH 5/6] updating adaptive-sampling-test --- .github/workflows/java-ec2-adaptive-sampling-test.yml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/java-ec2-adaptive-sampling-test.yml b/.github/workflows/java-ec2-adaptive-sampling-test.yml index 897005e88..724f4c2ba 100644 --- a/.github/workflows/java-ec2-adaptive-sampling-test.yml +++ b/.github/workflows/java-ec2-adaptive-sampling-test.yml @@ -33,7 +33,7 @@ jobs: - name: Generate testing id run: echo TESTING_ID="${{ github.run_id }}-${{ github.run_number }}-${RANDOM}" >> $GITHUB_ENV - - uses: actions/checkout@v4 + - uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 #v5.0.0 with: repository: 'aws-observability/aws-application-signals-test-framework' ref: ${{ env.CALLER_WORKFLOW_NAME == 'main-build' && 'main' || github.ref }} @@ -50,20 +50,20 @@ jobs: sleep_time: 60 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.E2E_TEST_ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: us-east-1 - name: Retrieve account - uses: aws-actions/aws-secretsmanager-get-secrets@v1 + uses: aws-actions/aws-secretsmanager-get-secrets@a9a7eb4e2f2871d30dc5b892576fde60a2ecc802 #v2.0.10 with: secret-ids: | ACCOUNT_ID, adaptive-sampling-region-account/prod-${{ env.E2E_TEST_AWS_REGION }} - name: Configure AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} @@ -163,7 +163,7 @@ jobs: - name: Refresh AWS Credentials if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} - uses: aws-actions/configure-aws-credentials@v4 + uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }} aws-region: ${{ env.E2E_TEST_AWS_REGION }} From 82f3548ae45e7e22a2e7778d854fc5fb1e9c1c0e Mon Sep 17 00:00:00 2001 From: Vherremi Date: Tue, 23 Sep 2025 14:14:05 -0700 Subject: [PATCH 6/6] updating adaptive-sampling-test --- .github/workflows/java-ec2-adaptive-sampling-test.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/.github/workflows/java-ec2-adaptive-sampling-test.yml b/.github/workflows/java-ec2-adaptive-sampling-test.yml index f1dcd8fcd..0172d3e37 100644 --- a/.github/workflows/java-ec2-adaptive-sampling-test.yml +++ b/.github/workflows/java-ec2-adaptive-sampling-test.yml @@ -63,7 +63,6 @@ jobs: # Get the credentials for the adaptive sampling account specifically - name: Configure AWS Credentials - if: ${{ github.event.repository.name == 'aws-application-signals-test-framework' }} uses: aws-actions/configure-aws-credentials@a03048d87541d1d9fcf2ecf528a4a65ba9bd7838 #v5.0.0 with: role-to-assume: arn:aws:iam::${{ env.ACCOUNT_ID }}:role/${{ env.E2E_TEST_ROLE_NAME }}