@@ -181,7 +181,7 @@ this action will always consider the `HTTP_PROXY` environment variable.
181181
182182Manually configured proxy :
183183` ` ` yaml
184- uses: aws-actions/configure-aws-credentials@v5.0 .0
184+ uses: aws-actions/configure-aws-credentials@v5.1 .0
185185with:
186186 aws-region: us-east-2
187187 role-to-assume: my-github-actions-role
@@ -252,13 +252,13 @@ line.
252252<summary>Inline session policy examples</summary>
253253
254254` ` ` yaml
255- uses: aws-actions/configure-aws-credentials@v5.0 .0
255+ uses: aws-actions/configure-aws-credentials@v5.1 .0
256256 with:
257257 inline-session-policy: '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:List*","Resource":"*"}]}'
258258` ` `
259259Or we can have a nicely formatted JSON as well :
260260` ` ` yaml
261- uses: aws-actions/configure-aws-credentials@v5.0 .0
261+ uses: aws-actions/configure-aws-credentials@v5.1 .0
262262 with:
263263 inline-session-policy: >-
264264 {
@@ -284,13 +284,13 @@ the role.
284284<summary>Managed session policy examples</summary>
285285
286286` ` ` yaml
287- uses: aws-actions/configure-aws-credentials@v5.0 .0
287+ uses: aws-actions/configure-aws-credentials@v5.1 .0
288288 with:
289289 managed-session-policies: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
290290` ` `
291291And we can pass multiple managed policies likes this :
292292` ` ` yaml
293- uses: aws-actions/configure-aws-credentials@v5.0 .0
293+ uses: aws-actions/configure-aws-credentials@v5.1 .0
294294 with:
295295 managed-session-policies: |
296296 arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -328,7 +328,7 @@ You can specify the audience through the `audience` input:
328328
329329` ` ` yaml
330330 - name: Configure AWS Credentials for China region audience
331- uses: aws-actions/configure-aws-credentials@v5.0 .0
331+ uses: aws-actions/configure-aws-credentials@v5.1 .0
332332 with:
333333 audience: sts.amazonaws.com.cn
334334 aws-region: cn-northwest-1
@@ -402,7 +402,7 @@ Examples
402402# ## AssumeRoleWithWebIdentity
403403` ` ` yaml
404404 - name: Configure AWS Credentials
405- uses: aws-actions/configure-aws-credentials@v5.0 .0
405+ uses: aws-actions/configure-aws-credentials@v5.1 .0
406406 with:
407407 aws-region: us-east-2
408408 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -416,13 +416,13 @@ environment variable and use it to assume the role
416416# ## AssumeRole with role previously assumed by action in same workflow
417417` ` ` yaml
418418 - name: Configure AWS Credentials
419- uses: aws-actions/configure-aws-credentials@v5.0 .0
419+ uses: aws-actions/configure-aws-credentials@v5.1 .0
420420 with:
421421 aws-region: us-east-2
422422 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
423423 role-session-name: MySessionName
424424 - name: Configure other AWS Credentials
425- uses: aws-actions/configure-aws-credentials@v5.0 .0
425+ uses: aws-actions/configure-aws-credentials@v5.1 .0
426426 with:
427427 aws-region: us-east-2
428428 role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -437,7 +437,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
437437# ## AssumeRole with static IAM credentials in repository secrets
438438` ` ` yaml
439439 - name: Configure AWS Credentials
440- uses: aws-actions/configure-aws-credentials@v5.0 .0
440+ uses: aws-actions/configure-aws-credentials@v5.1 .0
441441 with:
442442 aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
443443 aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -456,7 +456,7 @@ name, like `role-to-assume: my-github-actions-role`.
456456` ` ` yaml
457457 - name: Configure AWS Credentials 1
458458 id: creds
459- uses: aws-actions/configure-aws-credentials@v5.0 .0
459+ uses: aws-actions/configure-aws-credentials@v5.1 .0
460460 with:
461461 aws-region: us-east-2
462462 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -465,7 +465,7 @@ name, like `role-to-assume: my-github-actions-role`.
465465 run: |
466466 aws sts get-caller-identity
467467 - name: Configure AWS Credentials 2
468- uses: aws-actions/configure-aws-credentials@v5.0 .0
468+ uses: aws-actions/configure-aws-credentials@v5.1 .0
469469 with:
470470 aws-region: us-east-2
471471 aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}
0 commit comments