aws-ssm-send-command icon indicating copy to clipboard operation
aws-ssm-send-command copied to clipboard

Github Actions for using AWS SSM Send-Command

Results 13 aws-ssm-send-command issues
Sort by recently updated
recently updated
newest added

`InvalidInstanceId: Instances [[***]] not in a valid state for account 28878`

In the documentation there's an example of getting the command id. Is it not possible to grab the status? ie. Github Actions `${{ steps.ssm-client.outputs.status }}"`

Bumps [@actions/core](https://github.com/actions/toolkit/tree/HEAD/packages/core) from 1.2.7 to 1.9.1. Changelog Sourced from @​actions/core's changelog. 1.9.1 Randomize delimiter when calling core.exportVariable 1.9.0 Added toPosixPath, toWin32Path and toPlatformPath utilities #1102 1.8.2 Update to v2.0.1 of...

dependencies

Bumps [node-fetch](https://github.com/node-fetch/node-fetch) from 2.6.1 to 2.6.7. Release notes Sourced from node-fetch's releases. v2.6.7 Security patch release Recommended to upgrade, to not leak sensitive cookie and authentication header information to 3th...

dependencies

This is just to know if there is a way to see the command being run on the server in the shell script of if a shell script is used...

Hi, thanks for an awesome action I've set this role AmazonSSMFullAccess to my user and my instance also has this role. I've added all vulnerable infrormation to secrets. When running...

bug

We are using role based access but doesn't work as per https://github.com/peterkimzz/aws-ssm-send-command/blob/931e3645de26eef6b29f323f1c4c7dee89be5665/action.yml#L11 it requires AK/SK

Trying to use aws-ssm-send-command, simple examples are all failing. ``` name: Deploy using AWS SSM Send-Command on: push: branches: [main] jobs: start: runs-on: ubuntu-latest steps: - uses: actions/checkout@v2 - name:...

if the id of instace is i-0b8185eca982369a and input the id into actions yml file it makes validation error. but it is match with regex and has 20 of length

**Describe the bug** Able to run ssm:SendCommand **To Reproduce** Add a policy in the IAM user with ssm:SendCommand and with document AWS-RunShellScript **Expected behavior** Run the send Command with no...