Skip to content

Commit 06083b7

Browse files
chore: update readme version to v5.1.0 (aws-actions#1506)
1 parent 7b61d01 commit 06083b7

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

README.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ this action will always consider the `HTTP_PROXY` environment variable.
181181

182182
Manually configured proxy:
183183
```yaml
184-
uses: aws-actions/configure-aws-credentials@v5.0.0
184+
uses: aws-actions/configure-aws-credentials@v5.1.0
185185
with:
186186
aws-region: us-east-2
187187
role-to-assume: my-github-actions-role
@@ -252,13 +252,13 @@ line.
252252
<summary>Inline session policy examples</summary>
253253

254254
```yaml
255-
uses: aws-actions/configure-aws-credentials@v5.0.0
255+
uses: aws-actions/configure-aws-credentials@v5.1.0
256256
with:
257257
inline-session-policy: '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:List*","Resource":"*"}]}'
258258
```
259259
Or we can have a nicely formatted JSON as well:
260260
```yaml
261-
uses: aws-actions/configure-aws-credentials@v5.0.0
261+
uses: aws-actions/configure-aws-credentials@v5.1.0
262262
with:
263263
inline-session-policy: >-
264264
{
@@ -284,13 +284,13 @@ the role.
284284
<summary>Managed session policy examples</summary>
285285

286286
```yaml
287-
uses: aws-actions/configure-aws-credentials@v5.0.0
287+
uses: aws-actions/configure-aws-credentials@v5.1.0
288288
with:
289289
managed-session-policies: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
290290
```
291291
And we can pass multiple managed policies likes this:
292292
```yaml
293-
uses: aws-actions/configure-aws-credentials@v5.0.0
293+
uses: aws-actions/configure-aws-credentials@v5.1.0
294294
with:
295295
managed-session-policies: |
296296
arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -328,7 +328,7 @@ You can specify the audience through the `audience` input:
328328

329329
```yaml
330330
- name: Configure AWS Credentials for China region audience
331-
uses: aws-actions/configure-aws-credentials@v5.0.0
331+
uses: aws-actions/configure-aws-credentials@v5.1.0
332332
with:
333333
audience: sts.amazonaws.com.cn
334334
aws-region: cn-northwest-1
@@ -402,7 +402,7 @@ Examples
402402
### AssumeRoleWithWebIdentity
403403
```yaml
404404
- name: Configure AWS Credentials
405-
uses: aws-actions/configure-aws-credentials@v5.0.0
405+
uses: aws-actions/configure-aws-credentials@v5.1.0
406406
with:
407407
aws-region: us-east-2
408408
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -416,13 +416,13 @@ environment variable and use it to assume the role
416416
### AssumeRole with role previously assumed by action in same workflow
417417
```yaml
418418
- name: Configure AWS Credentials
419-
uses: aws-actions/configure-aws-credentials@v5.0.0
419+
uses: aws-actions/configure-aws-credentials@v5.1.0
420420
with:
421421
aws-region: us-east-2
422422
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
423423
role-session-name: MySessionName
424424
- name: Configure other AWS Credentials
425-
uses: aws-actions/configure-aws-credentials@v5.0.0
425+
uses: aws-actions/configure-aws-credentials@v5.1.0
426426
with:
427427
aws-region: us-east-2
428428
role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -437,7 +437,7 @@ role, `arn:aws:iam::987654321000:role/my-second-role`.
437437
### AssumeRole with static IAM credentials in repository secrets
438438
```yaml
439439
- name: Configure AWS Credentials
440-
uses: aws-actions/configure-aws-credentials@v5.0.0
440+
uses: aws-actions/configure-aws-credentials@v5.1.0
441441
with:
442442
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
443443
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -456,7 +456,7 @@ name, like `role-to-assume: my-github-actions-role`.
456456
```yaml
457457
- name: Configure AWS Credentials 1
458458
id: creds
459-
uses: aws-actions/configure-aws-credentials@v5.0.0
459+
uses: aws-actions/configure-aws-credentials@v5.1.0
460460
with:
461461
aws-region: us-east-2
462462
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -465,7 +465,7 @@ name, like `role-to-assume: my-github-actions-role`.
465465
run: |
466466
aws sts get-caller-identity
467467
- name: Configure AWS Credentials 2
468-
uses: aws-actions/configure-aws-credentials@v5.0.0
468+
uses: aws-actions/configure-aws-credentials@v5.1.0
469469
with:
470470
aws-region: us-east-2
471471
aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}

0 commit comments

Comments
 (0)