@@ -184,7 +184,7 @@ line like this:
184184` ` `
185185Or we can have a nicely formatted JSON as well:
186186` ` ` yaml
187- uses : aws-actions/configure-aws-credentials@v4
187+ uses : aws-actions/configure-aws-credentials@v4.1.0
188188 with :
189189 inline-session-policy : >-
190190 {
@@ -205,13 +205,13 @@ The Amazon Resource Names (ARNs) of the IAM managed policies that you want to
205205use as managed session policies. The policies must exist in the same account as
206206the role. You can pass a single managed policy like this:
207207` ` ` yaml
208- uses : aws-actions/configure-aws-credentials@v4
208+ uses : aws-actions/configure-aws-credentials@v4.1.0
209209 with :
210210 managed-session-policies : arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
211211` ` `
212212And we can pass multiple managed policies likes this:
213213` ` ` yaml
214- uses : aws-actions/configure-aws-credentials@v4
214+ uses : aws-actions/configure-aws-credentials@v4.1.0
215215 with :
216216 managed-session-policies : |
217217 arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -286,7 +286,7 @@ You can specify the audience through the `audience` input:
286286
287287` ` ` yaml
288288 - name: Configure AWS Credentials for China region audience
289- uses: aws-actions/configure-aws-credentials@v4
289+ uses: aws-actions/configure-aws-credentials@v4.1.0
290290 with:
291291 audience: sts.amazonaws.com.cn
292292 aws-region: us-east-3
@@ -421,7 +421,7 @@ You can use this action to simply configure the region and account ID in the
421421environment, and then use the runner's credentials for all AWS API calls made by
422422your Actions workflow :
423423` ` ` yaml
424- uses: aws-actions/configure-aws-credentials@v4
424+ uses: aws-actions/configure-aws-credentials@v4.1.0
425425with:
426426 aws-region: us-east-2
427427` ` `
@@ -431,7 +431,7 @@ APIs called by your Actions workflow.
431431Or, you can use this action to assume a role, and then use the role credentials
432432for all AWS API calls made by your Actions workflow :
433433` ` ` yaml
434- uses: aws-actions/configure-aws-credentials@v4
434+ uses: aws-actions/configure-aws-credentials@v4.1.0
435435with:
436436 aws-region: us-east-2
437437 role-to-assume: my-github-actions-role
@@ -453,7 +453,7 @@ variable.
453453
454454Manually configured proxy :
455455` ` ` yaml
456- uses: aws-actions/configure-aws-credentials@v4
456+ uses: aws-actions/configure-aws-credentials@v4.1.0
457457with:
458458 aws-region: us-east-2
459459 role-to-assume: my-github-actions-role
@@ -480,7 +480,7 @@ should include the AWS CLI by default.
480480# ## AssumeRoleWithWebIdentity (recommended)
481481` ` ` yaml
482482 - name: Configure AWS Credentials
483- uses: aws-actions/configure-aws-credentials@v4
483+ uses: aws-actions/configure-aws-credentials@v4.1.0
484484 with:
485485 aws-region: us-east-2
486486 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -494,13 +494,13 @@ environment variable and use it to assume the role
494494# ## AssumeRole with role previously assumed by action in same workflow
495495` ` ` yaml
496496 - name: Configure AWS Credentials
497- uses: aws-actions/configure-aws-credentials@v4
497+ uses: aws-actions/configure-aws-credentials@v4.1.0
498498 with:
499499 aws-region: us-east-2
500500 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
501501 role-session-name: MySessionName
502502 - name: Configure other AWS Credentials
503- uses: aws-actions/configure-aws-credentials@v4
503+ uses: aws-actions/configure-aws-credentials@v4.1.0
504504 with:
505505 aws-region: us-east-2
506506 role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -515,7 +515,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
515515# ## AssumeRole with static IAM credentials in repository secrets
516516` ` ` yaml
517517 - name: Configure AWS Credentials
518- uses: aws-actions/configure-aws-credentials@v4
518+ uses: aws-actions/configure-aws-credentials@v4.1.0
519519 with:
520520 aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
521521 aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -534,7 +534,7 @@ name, like `role-to-assume: my-github-actions-role`.
534534` ` ` yaml
535535 - name: Configure AWS Credentials 1
536536 id: creds
537- uses: aws-actions/configure-aws-credentials@v4
537+ uses: aws-actions/configure-aws-credentials@v4.1.0
538538 with:
539539 aws-region: us-east-2
540540 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -543,7 +543,7 @@ name, like `role-to-assume: my-github-actions-role`.
543543 run: |
544544 aws sts get-caller-identity
545545 - name: Configure AWS Credentials 2
546- uses: aws-actions/configure-aws-credentials@v4
546+ uses: aws-actions/configure-aws-credentials@v4.1.0
547547 with:
548548 aws-region: us-east-2
549549 aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}
0 commit comments