77
77
run: |
78
78
aws s3 sync . s3://my-s3-test-website-bucket
79
79
- name: Configure AWS credentials from Production account
80
- uses: aws-actions/configure-aws-credentials@v1
80
+ uses: aws-actions/configure-aws-credentials@v2
81
81
with:
82
82
role-to-assume: arn:aws:iam::222222222222:role/my-github-actions-role-prod
83
83
aws-region: us-west-2
@@ -159,7 +159,7 @@ In this example, the secret `AWS_ROLE_TO_ASSUME` contains a string like `arn:aws
159
159
# ### AssumeRoleWithWebIdentity using a custom audience
160
160
` ` ` yaml
161
161
- name: Configure AWS Credentials for Beta Customers
162
- uses: aws-actions/configure-aws-credentials@v1
162
+ uses: aws-actions/configure-aws-credentials@v2
163
163
with:
164
164
audience: beta-customers
165
165
aws-region: us-east-3
@@ -173,7 +173,7 @@ Changing the default audience may be necessary when using non-default [AWS parti
173
173
# ### AssumeRoleWithWebIdentity and disable secure Action outputs
174
174
` ` ` yaml
175
175
- name: Configure AWS Credentials
176
- uses: aws-actions/configure-aws-credentials@v1
176
+ uses: aws-actions/configure-aws-credentials@v2
177
177
with:
178
178
aws-region: us-east-2
179
179
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -292,7 +292,7 @@ the OIDC provider and not set during the AssumeRoleWithWebIdentity API call
292
292
within the Action. You can skip this session tagging by providing
293
293
`role-skip-session-tagging` as true in the action's inputs :
294
294
` ` ` yaml
295
- uses: aws-actions/configure-aws-credentials@v1
295
+ uses: aws-actions/configure-aws-credentials@v2
296
296
with:
297
297
role-skip-session-tagging: true
298
298
` ` `
@@ -314,7 +314,7 @@ You can use this action to simply configure the region and account ID in the
314
314
environment, and then use the runner's credentials for all AWS API calls made by
315
315
your Actions workflow :
316
316
` ` ` yaml
317
- uses: aws-actions/configure-aws-credentials@v1
317
+ uses: aws-actions/configure-aws-credentials@v2
318
318
with:
319
319
aws-region: us-east-2
320
320
` ` `
@@ -347,7 +347,7 @@ environment.
347
347
348
348
Manually configured proxy :
349
349
` ` ` yaml
350
- uses: aws-actions/configure-aws-credentials@v1
350
+ uses: aws-actions/configure-aws-credentials@v2
351
351
with:
352
352
aws-region: us-east-2
353
353
role-to-assume: my-github-actions-role
0 commit comments