@@ -184,7 +184,7 @@ line like this:
184
184
` ` `
185
185
Or we can have a nicely formatted JSON as well:
186
186
` ` ` yaml
187
- uses : aws-actions/configure-aws-credentials@v4
187
+ uses : aws-actions/configure-aws-credentials@v4.1.0
188
188
with :
189
189
inline-session-policy : >-
190
190
{
@@ -205,13 +205,13 @@ The Amazon Resource Names (ARNs) of the IAM managed policies that you want to
205
205
use as managed session policies. The policies must exist in the same account as
206
206
the role. You can pass a single managed policy like this:
207
207
` ` ` yaml
208
- uses : aws-actions/configure-aws-credentials@v4
208
+ uses : aws-actions/configure-aws-credentials@v4.1.0
209
209
with :
210
210
managed-session-policies : arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
211
211
` ` `
212
212
And we can pass multiple managed policies likes this:
213
213
` ` ` yaml
214
- uses : aws-actions/configure-aws-credentials@v4
214
+ uses : aws-actions/configure-aws-credentials@v4.1.0
215
215
with :
216
216
managed-session-policies : |
217
217
arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -286,7 +286,7 @@ You can specify the audience through the `audience` input:
286
286
287
287
` ` ` yaml
288
288
- name: Configure AWS Credentials for China region audience
289
- uses: aws-actions/configure-aws-credentials@v4
289
+ uses: aws-actions/configure-aws-credentials@v4.1.0
290
290
with:
291
291
audience: sts.amazonaws.com.cn
292
292
aws-region: us-east-3
@@ -421,7 +421,7 @@ You can use this action to simply configure the region and account ID in the
421
421
environment, and then use the runner's credentials for all AWS API calls made by
422
422
your Actions workflow :
423
423
` ` ` yaml
424
- uses: aws-actions/configure-aws-credentials@v4
424
+ uses: aws-actions/configure-aws-credentials@v4.1.0
425
425
with:
426
426
aws-region: us-east-2
427
427
` ` `
@@ -431,7 +431,7 @@ APIs called by your Actions workflow.
431
431
Or, you can use this action to assume a role, and then use the role credentials
432
432
for all AWS API calls made by your Actions workflow :
433
433
` ` ` yaml
434
- uses: aws-actions/configure-aws-credentials@v4
434
+ uses: aws-actions/configure-aws-credentials@v4.1.0
435
435
with:
436
436
aws-region: us-east-2
437
437
role-to-assume: my-github-actions-role
@@ -453,7 +453,7 @@ variable.
453
453
454
454
Manually configured proxy :
455
455
` ` ` yaml
456
- uses: aws-actions/configure-aws-credentials@v4
456
+ uses: aws-actions/configure-aws-credentials@v4.1.0
457
457
with:
458
458
aws-region: us-east-2
459
459
role-to-assume: my-github-actions-role
@@ -480,7 +480,7 @@ should include the AWS CLI by default.
480
480
# ## AssumeRoleWithWebIdentity (recommended)
481
481
` ` ` yaml
482
482
- name: Configure AWS Credentials
483
- uses: aws-actions/configure-aws-credentials@v4
483
+ uses: aws-actions/configure-aws-credentials@v4.1.0
484
484
with:
485
485
aws-region: us-east-2
486
486
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -494,13 +494,13 @@ environment variable and use it to assume the role
494
494
# ## AssumeRole with role previously assumed by action in same workflow
495
495
` ` ` yaml
496
496
- name: Configure AWS Credentials
497
- uses: aws-actions/configure-aws-credentials@v4
497
+ uses: aws-actions/configure-aws-credentials@v4.1.0
498
498
with:
499
499
aws-region: us-east-2
500
500
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
501
501
role-session-name: MySessionName
502
502
- name: Configure other AWS Credentials
503
- uses: aws-actions/configure-aws-credentials@v4
503
+ uses: aws-actions/configure-aws-credentials@v4.1.0
504
504
with:
505
505
aws-region: us-east-2
506
506
role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -515,7 +515,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
515
515
# ## AssumeRole with static IAM credentials in repository secrets
516
516
` ` ` yaml
517
517
- name: Configure AWS Credentials
518
- uses: aws-actions/configure-aws-credentials@v4
518
+ uses: aws-actions/configure-aws-credentials@v4.1.0
519
519
with:
520
520
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
521
521
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -534,7 +534,7 @@ name, like `role-to-assume: my-github-actions-role`.
534
534
` ` ` yaml
535
535
- name: Configure AWS Credentials 1
536
536
id: creds
537
- uses: aws-actions/configure-aws-credentials@v4
537
+ uses: aws-actions/configure-aws-credentials@v4.1.0
538
538
with:
539
539
aws-region: us-east-2
540
540
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -543,7 +543,7 @@ name, like `role-to-assume: my-github-actions-role`.
543
543
run: |
544
544
aws sts get-caller-identity
545
545
- name: Configure AWS Credentials 2
546
- uses: aws-actions/configure-aws-credentials@v4
546
+ uses: aws-actions/configure-aws-credentials@v4.1.0
547
547
with:
548
548
aws-region: us-east-2
549
549
aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}
0 commit comments