@@ -178,7 +178,7 @@ this action will always consider the `HTTP_PROXY` environment variable.
178178
179179Manually configured proxy :
180180` ` ` yaml
181- uses: aws-actions/configure-aws-credentials@v4.1.0
181+ uses: aws-actions/configure-aws-credentials@v4.2.1
182182with:
183183 aws-region: us-east-2
184184 role-to-assume: my-github-actions-role
@@ -249,13 +249,13 @@ line.
249249<summary>Inline session policy examples</summary>
250250
251251` ` ` yaml
252- uses: aws-actions/configure-aws-credentials@v4
252+ uses: aws-actions/configure-aws-credentials@v4.2.1
253253 with:
254254 inline-session-policy: '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:List*","Resource":"*"}]}'
255255` ` `
256256Or we can have a nicely formatted JSON as well :
257257` ` ` yaml
258- uses: aws-actions/configure-aws-credentials@v4.1.0
258+ uses: aws-actions/configure-aws-credentials@v4.2.1
259259 with:
260260 inline-session-policy: >-
261261 {
@@ -281,13 +281,13 @@ the role.
281281<summary>Managed session policy examples</summary>
282282
283283` ` ` yaml
284- uses: aws-actions/configure-aws-credentials@v4.1.0
284+ uses: aws-actions/configure-aws-credentials@v4.2.1
285285 with:
286286 managed-session-policies: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
287287` ` `
288288And we can pass multiple managed policies likes this :
289289` ` ` yaml
290- uses: aws-actions/configure-aws-credentials@v4.1.0
290+ uses: aws-actions/configure-aws-credentials@v4.2.1
291291 with:
292292 managed-session-policies: |
293293 arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -325,7 +325,7 @@ You can specify the audience through the `audience` input:
325325
326326` ` ` yaml
327327 - name: Configure AWS Credentials for China region audience
328- uses: aws-actions/configure-aws-credentials@v4.1.0
328+ uses: aws-actions/configure-aws-credentials@v4.2.1
329329 with:
330330 audience: sts.amazonaws.com.cn
331331 aws-region: cn-northwest-1
@@ -399,7 +399,7 @@ Examples
399399# ## AssumeRoleWithWebIdentity
400400` ` ` yaml
401401 - name: Configure AWS Credentials
402- uses: aws-actions/configure-aws-credentials@v4.1.0
402+ uses: aws-actions/configure-aws-credentials@v4.2.1
403403 with:
404404 aws-region: us-east-2
405405 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -413,13 +413,13 @@ environment variable and use it to assume the role
413413# ## AssumeRole with role previously assumed by action in same workflow
414414` ` ` yaml
415415 - name: Configure AWS Credentials
416- uses: aws-actions/configure-aws-credentials@v4.1.0
416+ uses: aws-actions/configure-aws-credentials@v4.2.1
417417 with:
418418 aws-region: us-east-2
419419 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
420420 role-session-name: MySessionName
421421 - name: Configure other AWS Credentials
422- uses: aws-actions/configure-aws-credentials@v4.1.0
422+ uses: aws-actions/configure-aws-credentials@v4.2.1
423423 with:
424424 aws-region: us-east-2
425425 role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -434,7 +434,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
434434# ## AssumeRole with static IAM credentials in repository secrets
435435` ` ` yaml
436436 - name: Configure AWS Credentials
437- uses: aws-actions/configure-aws-credentials@v4.1.0
437+ uses: aws-actions/configure-aws-credentials@v4.2.1
438438 with:
439439 aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
440440 aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -453,7 +453,7 @@ name, like `role-to-assume: my-github-actions-role`.
453453` ` ` yaml
454454 - name: Configure AWS Credentials 1
455455 id: creds
456- uses: aws-actions/configure-aws-credentials@v4.1.0
456+ uses: aws-actions/configure-aws-credentials@v4.2.1
457457 with:
458458 aws-region: us-east-2
459459 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -462,7 +462,7 @@ name, like `role-to-assume: my-github-actions-role`.
462462 run: |
463463 aws sts get-caller-identity
464464 - name: Configure AWS Credentials 2
465- uses: aws-actions/configure-aws-credentials@v4.1.0
465+ uses: aws-actions/configure-aws-credentials@v4.2.1
466466 with:
467467 aws-region: us-east-2
468468 aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}
0 commit comments