@@ -98,19 +98,19 @@ function exportCredentials(params){
98
98
99
99
// AWS_ACCESS_KEY_ID:
100
100
// Specifies an AWS access key associated with an IAM user or role
101
- core . exportVariable ( 'AWS_ACCESS_KEY_ID' , accessKeyId ) ;
102
101
core . setSecret ( accessKeyId ) ;
102
+ core . exportVariable ( 'AWS_ACCESS_KEY_ID' , accessKeyId ) ;
103
103
104
104
// AWS_SECRET_ACCESS_KEY:
105
105
// Specifies the secret key associated with the access key. This is essentially the "password" for the access key.
106
- core . exportVariable ( 'AWS_SECRET_ACCESS_KEY' , secretAccessKey ) ;
107
106
core . setSecret ( secretAccessKey ) ;
107
+ core . exportVariable ( 'AWS_SECRET_ACCESS_KEY' , secretAccessKey ) ;
108
108
109
109
// AWS_SESSION_TOKEN:
110
110
// Specifies the session token value that is required if you are using temporary security credentials.
111
111
if ( sessionToken ) {
112
- core . exportVariable ( 'AWS_SESSION_TOKEN' , sessionToken ) ;
113
112
core . setSecret ( sessionToken ) ;
113
+ core . exportVariable ( 'AWS_SESSION_TOKEN' , sessionToken ) ;
114
114
} else if ( process . env . AWS_SESSION_TOKEN ) {
115
115
// clear session token from previous credentials action
116
116
core . exportVariable ( 'AWS_SESSION_TOKEN' , '' ) ;
@@ -129,10 +129,10 @@ async function exportAccountId(maskAccountId, region) {
129
129
const sts = getStsClient ( region ) ;
130
130
const identity = await sts . getCallerIdentity ( ) . promise ( ) ;
131
131
const accountId = identity . Account ;
132
- core . setOutput ( 'aws-account-id' , accountId ) ;
133
132
if ( ! maskAccountId || maskAccountId . toLowerCase ( ) == 'true' ) {
134
133
core . setSecret ( accountId ) ;
135
134
}
135
+ core . setOutput ( 'aws-account-id' , accountId ) ;
136
136
return accountId ;
137
137
}
138
138
0 commit comments