Skip to content

Commit d680192

Browse files
author
Arash Ghoreyshi
committed
Merge final changes from internal repo
1 parent eaedec0 commit d680192

File tree

4 files changed

+1608
-6
lines changed

4 files changed

+1608
-6
lines changed

.gitignore

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,4 @@
11
node_modules
2-
dist
32
.DS_Store
43
coverage
54
repolinter

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# AWS Lambda Deploy Action for GitHub Actions
1+
# AWS Lambda Deploy GitHub Action
22

33
Updates the code and configuration of AWS Lambda functions as part of GitHub Actions workflow steps.
44

@@ -251,11 +251,11 @@ If you're using the S3 deployment method, ensure your IAM role also has the foll
251251
"Sid": "S3Permissions",
252252
"Effect": "Allow",
253253
"Action": [
254-
"s3:HeadBucket",
254+
"s3:ListBucket",
255255
"s3:CreateBucket",
256256
"s3:PutObject",
257-
"s3:PutPublicAccessBlock",
258-
"s3:PutBucketEncryption",
257+
"s3:PutBucketPublicAccessBlock",
258+
"s3:PutEncryptionConfiguration",
259259
"s3:PutBucketVersioning"
260260
],
261261
"Resource": [

deploy-lambda-example.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ jobs:
6666
- name: Configure AWS credentials
6767
uses: aws-actions/configure-aws-credentials@v3
6868
with:
69-
role-to-assume: ${{ secrets.AWS_ROLE_TO_ASSUME }}
69+
role-to-assume: ${{ env.AWS_ROLE_TO_ASSUME }}
7070
aws-region: ${{ env.AWS_REGION }}
7171
# The role-to-assume should be the ARN of the IAM role you created for GitHub Actions OIDC
7272

0 commit comments

Comments
 (0)