Skip to content

Commit 483d6b5

Browse files
authored
Merge pull request #1329 from aws-actions/alikulka-patch-1
chore: Update README.md
2 parents ececac1 + c776536 commit 483d6b5

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

README.md

+13-13
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ line like this:
184184
```
185185
Or we can have a nicely formatted JSON as well:
186186
```yaml
187-
uses: aws-actions/configure-aws-credentials@v4
187+
uses: aws-actions/configure-aws-credentials@v4.1.0
188188
with:
189189
inline-session-policy: >-
190190
{
@@ -205,13 +205,13 @@ The Amazon Resource Names (ARNs) of the IAM managed policies that you want to
205205
use as managed session policies. The policies must exist in the same account as
206206
the role. You can pass a single managed policy like this:
207207
```yaml
208-
uses: aws-actions/configure-aws-credentials@v4
208+
uses: aws-actions/configure-aws-credentials@v4.1.0
209209
with:
210210
managed-session-policies: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
211211
```
212212
And we can pass multiple managed policies likes this:
213213
```yaml
214-
uses: aws-actions/configure-aws-credentials@v4
214+
uses: aws-actions/configure-aws-credentials@v4.1.0
215215
with:
216216
managed-session-policies: |
217217
arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -286,7 +286,7 @@ You can specify the audience through the `audience` input:
286286

287287
```yaml
288288
- name: Configure AWS Credentials for China region audience
289-
uses: aws-actions/configure-aws-credentials@v4
289+
uses: aws-actions/configure-aws-credentials@v4.1.0
290290
with:
291291
audience: sts.amazonaws.com.cn
292292
aws-region: us-east-3
@@ -421,7 +421,7 @@ You can use this action to simply configure the region and account ID in the
421421
environment, and then use the runner's credentials for all AWS API calls made by
422422
your Actions workflow:
423423
```yaml
424-
uses: aws-actions/configure-aws-credentials@v4
424+
uses: aws-actions/configure-aws-credentials@v4.1.0
425425
with:
426426
aws-region: us-east-2
427427
```
@@ -431,7 +431,7 @@ APIs called by your Actions workflow.
431431
Or, you can use this action to assume a role, and then use the role credentials
432432
for all AWS API calls made by your Actions workflow:
433433
```yaml
434-
uses: aws-actions/configure-aws-credentials@v4
434+
uses: aws-actions/configure-aws-credentials@v4.1.0
435435
with:
436436
aws-region: us-east-2
437437
role-to-assume: my-github-actions-role
@@ -453,7 +453,7 @@ variable.
453453

454454
Manually configured proxy:
455455
```yaml
456-
uses: aws-actions/configure-aws-credentials@v4
456+
uses: aws-actions/configure-aws-credentials@v4.1.0
457457
with:
458458
aws-region: us-east-2
459459
role-to-assume: my-github-actions-role
@@ -480,7 +480,7 @@ should include the AWS CLI by default.
480480
### AssumeRoleWithWebIdentity (recommended)
481481
```yaml
482482
- name: Configure AWS Credentials
483-
uses: aws-actions/configure-aws-credentials@v4
483+
uses: aws-actions/configure-aws-credentials@v4.1.0
484484
with:
485485
aws-region: us-east-2
486486
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -494,13 +494,13 @@ environment variable and use it to assume the role
494494
### AssumeRole with role previously assumed by action in same workflow
495495
```yaml
496496
- name: Configure AWS Credentials
497-
uses: aws-actions/configure-aws-credentials@v4
497+
uses: aws-actions/configure-aws-credentials@v4.1.0
498498
with:
499499
aws-region: us-east-2
500500
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
501501
role-session-name: MySessionName
502502
- name: Configure other AWS Credentials
503-
uses: aws-actions/configure-aws-credentials@v4
503+
uses: aws-actions/configure-aws-credentials@v4.1.0
504504
with:
505505
aws-region: us-east-2
506506
role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -515,7 +515,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
515515
### AssumeRole with static IAM credentials in repository secrets
516516
```yaml
517517
- name: Configure AWS Credentials
518-
uses: aws-actions/configure-aws-credentials@v4
518+
uses: aws-actions/configure-aws-credentials@v4.1.0
519519
with:
520520
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
521521
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -534,7 +534,7 @@ name, like `role-to-assume: my-github-actions-role`.
534534
```yaml
535535
- name: Configure AWS Credentials 1
536536
id: creds
537-
uses: aws-actions/configure-aws-credentials@v4
537+
uses: aws-actions/configure-aws-credentials@v4.1.0
538538
with:
539539
aws-region: us-east-2
540540
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -543,7 +543,7 @@ name, like `role-to-assume: my-github-actions-role`.
543543
run: |
544544
aws sts get-caller-identity
545545
- name: Configure AWS Credentials 2
546-
uses: aws-actions/configure-aws-credentials@v4
546+
uses: aws-actions/configure-aws-credentials@v4.1.0
547547
with:
548548
aws-region: us-east-2
549549
aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}

0 commit comments

Comments
 (0)