@@ -178,7 +178,7 @@ this action will always consider the `HTTP_PROXY` environment variable.
178
178
179
179
Manually configured proxy :
180
180
` ` ` yaml
181
- uses: aws-actions/[email protected] .0
181
+ uses: aws-actions/[email protected] .1
182
182
with:
183
183
aws-region: us-east-2
184
184
role-to-assume: my-github-actions-role
@@ -249,13 +249,13 @@ line.
249
249
<summary>Inline session policy examples</summary>
250
250
251
251
` ` ` yaml
252
- uses: aws-actions/[email protected] .0
252
+ uses: aws-actions/[email protected] .1
253
253
with:
254
254
inline-session-policy: '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:List*","Resource":"*"}]}'
255
255
` ` `
256
256
Or we can have a nicely formatted JSON as well :
257
257
` ` ` yaml
258
- uses: aws-actions/[email protected] .0
258
+ uses: aws-actions/[email protected] .1
259
259
with:
260
260
inline-session-policy: >-
261
261
{
@@ -281,13 +281,13 @@ the role.
281
281
<summary>Managed session policy examples</summary>
282
282
283
283
` ` ` yaml
284
- uses: aws-actions/[email protected] .0
284
+ uses: aws-actions/[email protected] .1
285
285
with:
286
286
managed-session-policies: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
287
287
` ` `
288
288
And we can pass multiple managed policies likes this :
289
289
` ` ` yaml
290
- uses: aws-actions/[email protected] .0
290
+ uses: aws-actions/[email protected] .1
291
291
with:
292
292
managed-session-policies: |
293
293
arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -325,7 +325,7 @@ You can specify the audience through the `audience` input:
325
325
326
326
` ` ` yaml
327
327
- name: Configure AWS Credentials for China region audience
328
- uses: aws-actions/[email protected] .0
328
+ uses: aws-actions/[email protected] .1
329
329
with:
330
330
audience: sts.amazonaws.com.cn
331
331
aws-region: cn-northwest-1
@@ -399,7 +399,7 @@ Examples
399
399
# ## AssumeRoleWithWebIdentity
400
400
` ` ` yaml
401
401
- name: Configure AWS Credentials
402
- uses: aws-actions/[email protected] .0
402
+ uses: aws-actions/[email protected] .1
403
403
with:
404
404
aws-region: us-east-2
405
405
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -413,13 +413,13 @@ environment variable and use it to assume the role
413
413
# ## AssumeRole with role previously assumed by action in same workflow
414
414
` ` ` yaml
415
415
- name: Configure AWS Credentials
416
- uses: aws-actions/[email protected] .0
416
+ uses: aws-actions/[email protected] .1
417
417
with:
418
418
aws-region: us-east-2
419
419
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
420
420
role-session-name: MySessionName
421
421
- name: Configure other AWS Credentials
422
- uses: aws-actions/[email protected] .0
422
+ uses: aws-actions/[email protected] .1
423
423
with:
424
424
aws-region: us-east-2
425
425
role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -434,7 +434,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
434
434
# ## AssumeRole with static IAM credentials in repository secrets
435
435
` ` ` yaml
436
436
- name: Configure AWS Credentials
437
- uses: aws-actions/[email protected] .0
437
+ uses: aws-actions/[email protected] .1
438
438
with:
439
439
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
440
440
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -453,7 +453,7 @@ name, like `role-to-assume: my-github-actions-role`.
453
453
` ` ` yaml
454
454
- name: Configure AWS Credentials 1
455
455
id: creds
456
- uses: aws-actions/[email protected] .0
456
+ uses: aws-actions/[email protected] .1
457
457
with:
458
458
aws-region: us-east-2
459
459
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -462,7 +462,7 @@ name, like `role-to-assume: my-github-actions-role`.
462
462
run: |
463
463
aws sts get-caller-identity
464
464
- name: Configure AWS Credentials 2
465
- uses: aws-actions/[email protected] .0
465
+ uses: aws-actions/[email protected] .1
466
466
with:
467
467
aws-region: us-east-2
468
468
aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}
0 commit comments