diff --git a/.github/workflows/CD.yml b/.github/workflows/CD.yml index 44fc3ca53..dffeb2dc1 100644 --- a/.github/workflows/CD.yml +++ b/.github/workflows/CD.yml @@ -62,13 +62,13 @@ jobs: echo "sha=${{ github.sha }}" >> $GITHUB_OUTPUT fi - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 - name: Login Dockerhub - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: username: ${{ secrets.DOCKERHUB_RELEASE_USERNAME }} password: ${{ secrets.DOCKERHUB_RELEASE_TOKEN }} @@ -131,7 +131,7 @@ jobs: - name: Configure AWS Credentials if: steps.release-to-s3.outputs.cache-hit != 'true' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 @@ -159,7 +159,7 @@ jobs: - name: Configure AWS Credentials if: steps.release-version-image.outputs.cache-hit != 'true' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-east-1 @@ -167,7 +167,7 @@ jobs: - name: Login to Public Release ECR if: steps.release-version-image.outputs.cache-hit != 'true' id: login-ecr - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: registry: public.ecr.aws env: @@ -175,7 +175,7 @@ jobs: - name: Login Dockerhub if: steps.release-version-image.outputs.cache-hit != 'true' - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: username: ${{ secrets.DOCKERHUB_RELEASE_USERNAME }} password: ${{ secrets.DOCKERHUB_RELEASE_TOKEN }} diff --git a/.github/workflows/CI.yml b/.github/workflows/CI.yml index 06edfe849..1dd95d262 100644 --- a/.github/workflows/CI.yml +++ b/.github/workflows/CI.yml @@ -220,7 +220,7 @@ jobs: msiexec.exe /i AWSCLIV2.msi /passive [System.Environment]::SetEnvironmentVariable('Path',$Env:Path + ";C:\\Program Files\\Amazon\\AWSCLIV2",'User') - - uses: aws-actions/configure-aws-credentials@v3 + - uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_PKG_SIGNER_ROLE_ARN }} aws-region: us-west-2 @@ -295,7 +295,7 @@ jobs: ARCH=x86_64 SOURCE_ARCH=amd64 DEST=$PACKAGING_ROOT/linux/amd64 tools/packaging/linux/create_rpm.sh ARCH=aarch64 SOURCE_ARCH=arm64 DEST=$PACKAGING_ROOT/linux/arm64 tools/packaging/linux/create_rpm.sh - - uses: aws-actions/configure-aws-credentials@v3 + - uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_PKG_SIGNER_ROLE_ARN }} aws-region: us-west-2 @@ -352,7 +352,7 @@ jobs: ARCH=amd64 DEST=$PACKAGING_ROOT/debian/amd64 tools/packaging/debian/create_deb.sh ARCH=arm64 DEST=$PACKAGING_ROOT/debian/arm64 tools/packaging/debian/create_deb.sh - - uses: aws-actions/configure-aws-credentials@v3 + - uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_PKG_SIGNER_ROLE_ARN }} aws-region: us-west-2 @@ -529,14 +529,14 @@ jobs: path: build - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 - name: Login to Public Integration Test ECR if: steps.e2etest-release.outputs.cache-hit != 'true' - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: registry: public.ecr.aws env: @@ -557,7 +557,7 @@ jobs: - name: Set up Docker Buildx if: steps.e2etest-release.outputs.cache-hit != 'true' - uses: docker/setup-buildx-action@v2 + uses: docker/setup-buildx-action@v3 - name: Set up QEMU if: steps.e2etest-release.outputs.cache-hit != 'true' @@ -565,7 +565,7 @@ jobs: - name: Docker meta id: meta - uses: docker/metadata-action@v4 + uses: docker/metadata-action@v5 with: images: public.ecr.aws/${{ env.ECR_REPO }} @@ -574,7 +574,7 @@ jobs: #-Export it for delivery version image in CD #Documentation: https://github.com/docker/build-push-action - name: Build ADOT collector image - uses: docker/build-push-action@v4 + uses: docker/build-push-action@v5 if: steps.e2etest-release.outputs.cache-hit != 'true' with: file: cmd/awscollector/Dockerfile @@ -648,7 +648,7 @@ jobs: - name: Configure AWS Credentials if: steps.e2etest-eks.outputs.cache-hit != 'true' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 @@ -711,7 +711,7 @@ jobs: steps: - uses: actions/checkout@v4 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 @@ -757,7 +757,7 @@ jobs: go-version: ${{ env.GO_VERSION }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 @@ -783,7 +783,7 @@ jobs: needs: validate-all-tests-pass steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 @@ -820,7 +820,7 @@ jobs: if: always() steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 diff --git a/.github/workflows/PR-build.yml b/.github/workflows/PR-build.yml index 5d64db7bf..7f1ba9c86 100644 --- a/.github/workflows/PR-build.yml +++ b/.github/workflows/PR-build.yml @@ -350,13 +350,13 @@ jobs: run: cp -R build aws-otel-collector/build - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PR_BUILD_ROLE_ARN }} aws-region: us-east-1 - name: Login to Public Integration Test ECR - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: registry: public.ecr.aws env: diff --git a/.github/workflows/aws-resources-clean.yml b/.github/workflows/aws-resources-clean.yml index 01845f878..d60cf86ef 100644 --- a/.github/workflows/aws-resources-clean.yml +++ b/.github/workflows/aws-resources-clean.yml @@ -55,7 +55,7 @@ jobs: cache-dependency-path: tools/workflow/cleaner/go.sum - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_RESOURCE_CLEANER_ASSUMABLE_ROLE_ARN }} aws-region: ${{ matrix.region }} @@ -90,7 +90,7 @@ jobs: cache-dependency-path: tools/workflow/cleaner/go.sum - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_RESOURCE_CLEANER_ASSUMABLE_ROLE_ARN }} aws-region: ${{ matrix.region }} diff --git a/.github/workflows/canary.yml b/.github/workflows/canary.yml index d5abd7fca..1db36a359 100644 --- a/.github/workflows/canary.yml +++ b/.github/workflows/canary.yml @@ -97,7 +97,7 @@ jobs: - uses: actions/checkout@v4 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 diff --git a/.github/workflows/perf.yml b/.github/workflows/perf.yml index af98015d4..f42c20d24 100644 --- a/.github/workflows/perf.yml +++ b/.github/workflows/perf.yml @@ -60,7 +60,7 @@ jobs: fetch-depth: 0 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 @@ -152,7 +152,7 @@ jobs: - uses: actions/checkout@v4 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 diff --git a/.github/workflows/prod-image-mirror.yml b/.github/workflows/prod-image-mirror.yml index c6687fd00..6139ca967 100644 --- a/.github/workflows/prod-image-mirror.yml +++ b/.github/workflows/prod-image-mirror.yml @@ -32,13 +32,13 @@ jobs: go-version: ~1.20.8 - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 - name: Login to Public Release ECR - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: registry: public.ecr.aws env: diff --git a/.github/workflows/rollback-operator.yml b/.github/workflows/rollback-operator.yml index a62093c0c..25ec4579d 100644 --- a/.github/workflows/rollback-operator.yml +++ b/.github/workflows/rollback-operator.yml @@ -37,7 +37,7 @@ jobs: if: always() && needs.image-check.result == 'success' steps: - name: Login to Public Release ECR - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: registry: public.ecr.aws username: ${{ secrets.RELEASE_KEY_ID }} diff --git a/.github/workflows/rollback.yml b/.github/workflows/rollback.yml index f4142131d..d3e7a8588 100644 --- a/.github/workflows/rollback.yml +++ b/.github/workflows/rollback.yml @@ -83,7 +83,7 @@ jobs: type: msi steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 @@ -121,37 +121,37 @@ jobs: steps: - name: Configure AWS Credentials if: matrix.type == 'global' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 - name: Configure AWS Credentials for HKG if: matrix.type == 'hkg' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_HKG_ROLE_ARN }} aws-region: ap-east-1 - name: Configure AWS Credentials for BAH if: matrix.type == 'bah' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_BAH_ROLE_ARN }} aws-region: me-south-1 - name: Configure AWS Credentials for CPT if: matrix.type == 'cpt' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_CPT_ROLE_ARN }} aws-region: af-south-1 - name: Configure AWS Credentials for MXP if: matrix.type == 'mxp' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_MXP_ROLE_ARN }} aws-region: eu-south-1 - name: Configure AWS Credentials for CN if: matrix.type == 'cn' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: aws-access-key-id: ${{ secrets.RELEASE_CN_KEY_ID }} aws-secret-access-key: ${{ secrets.RELEASE_CN_SECRET }} @@ -195,17 +195,17 @@ jobs: if: always() && needs.all-checked.result == 'success' && github.event.inputs.skip-image-rollback == 'false' steps: - name: Login to Dockerhub - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: username: ${{ secrets.DOCKERHUB_RELEASE_USERNAME }} password: ${{ secrets.DOCKERHUB_RELEASE_TOKEN }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-east-1 - name: Login to Public Release ECR - uses: docker/login-action@v2 + uses: docker/login-action@v3 with: registry: public.ecr.aws env: @@ -250,7 +250,7 @@ jobs: type: msi steps: - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 @@ -286,37 +286,37 @@ jobs: steps: - name: Configure AWS Credentials if: matrix.type == 'global' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 - name: Configure AWS Credentials for HKG if: matrix.type == 'hkg' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_HKG_ROLE_ARN }} aws-region: ap-east-1 - name: Configure AWS Credentials for BAH if: matrix.type == 'bah' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_BAH_ROLE_ARN }} aws-region: me-south-1 - name: Configure AWS Credentials for CPT if: matrix.type == 'cpt' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_CPT_ROLE_ARN }} aws-region: af-south-1 - name: Configure AWS Credentials for MXP if: matrix.type == 'mxp' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_MXP_ROLE_ARN }} aws-region: eu-south-1 - name: Configure AWS Credentials for CN if: matrix.type == 'cn' - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: aws-access-key-id: ${{ secrets.RELEASE_CN_KEY_ID }} aws-secret-access-key: ${{ secrets.RELEASE_CN_SECRET }} diff --git a/.github/workflows/ssm-release.yml b/.github/workflows/ssm-release.yml index 2b7abf6d6..3fcf0a948 100644 --- a/.github/workflows/ssm-release.yml +++ b/.github/workflows/ssm-release.yml @@ -63,7 +63,7 @@ jobs: run: echo "SSM_ADDTL_ARGS=--make_default_version" >> $GITHUB_ENV - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_ASSUMABLE_ROLE_ARN }} aws-region: us-west-2 @@ -76,7 +76,7 @@ jobs: python3 tools/ssm/ssm_manifest.py ${{ github.event.inputs.version }} - name: Configure AWS Credentials - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_ROLE_ARN }} aws-region: us-west-2 @@ -117,7 +117,7 @@ jobs: echo "AWS_SECRET_ACCESS_KEY=" >> $GITHUB_ENV echo "AWS_SESSION_TOKEN=" >> $GITHUB_ENV - name: Configure AWS Credentials for HKG - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_HKG_ROLE_ARN }} aws-region: ap-east-1 @@ -153,7 +153,7 @@ jobs: echo "AWS_SECRET_ACCESS_KEY=" >> $GITHUB_ENV echo "AWS_SESSION_TOKEN=" >> $GITHUB_ENV - name: Configure AWS Credentials for BAH - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_BAH_ROLE_ARN }} aws-region: me-south-1 @@ -189,7 +189,7 @@ jobs: echo "AWS_SECRET_ACCESS_KEY=" >> $GITHUB_ENV echo "AWS_SESSION_TOKEN=" >> $GITHUB_ENV - name: Configure AWS Credentials for CPT - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_CPT_ROLE_ARN }} aws-region: af-south-1 @@ -225,7 +225,7 @@ jobs: echo "AWS_SECRET_ACCESS_KEY=" >> $GITHUB_ENV echo "AWS_SESSION_TOKEN=" >> $GITHUB_ENV - name: Configure AWS Credentials for MXP - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: role-to-assume: ${{ secrets.COLLECTOR_PROD_RELEASE_MXP_ROLE_ARN }} aws-region: eu-south-1 @@ -261,7 +261,7 @@ jobs: echo "AWS_SECRET_ACCESS_KEY=" >> $GITHUB_ENV echo "AWS_SESSION_TOKEN=" >> $GITHUB_ENV - name: Configure AWS Credentials for CN regions - uses: aws-actions/configure-aws-credentials@v3 + uses: aws-actions/configure-aws-credentials@v4 with: aws-access-key-id: ${{ secrets.RELEASE_CN_KEY_ID }} aws-secret-access-key: ${{ secrets.RELEASE_CN_SECRET }}