Skip to content

Commit f86a0c3

Browse files
Update README examples to use v2
1 parent 7fc5f08 commit f86a0c3

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ jobs:
7777
run: |
7878
aws s3 sync . s3://my-s3-test-website-bucket
7979
- name: Configure AWS credentials from Production account
80-
uses: aws-actions/configure-aws-credentials@v1
80+
uses: aws-actions/configure-aws-credentials@v2
8181
with:
8282
role-to-assume: arn:aws:iam::222222222222:role/my-github-actions-role-prod
8383
aws-region: us-west-2
@@ -159,7 +159,7 @@ In this example, the secret `AWS_ROLE_TO_ASSUME` contains a string like `arn:aws
159159
#### AssumeRoleWithWebIdentity using a custom audience
160160
```yaml
161161
- name: Configure AWS Credentials for Beta Customers
162-
uses: aws-actions/configure-aws-credentials@v1
162+
uses: aws-actions/configure-aws-credentials@v2
163163
with:
164164
audience: beta-customers
165165
aws-region: us-east-3
@@ -173,7 +173,7 @@ Changing the default audience may be necessary when using non-default [AWS parti
173173
#### AssumeRoleWithWebIdentity and disable secure Action outputs
174174
```yaml
175175
- name: Configure AWS Credentials
176-
uses: aws-actions/configure-aws-credentials@v1
176+
uses: aws-actions/configure-aws-credentials@v2
177177
with:
178178
aws-region: us-east-2
179179
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -292,7 +292,7 @@ the OIDC provider and not set during the AssumeRoleWithWebIdentity API call
292292
within the Action. You can skip this session tagging by providing
293293
`role-skip-session-tagging` as true in the action's inputs:
294294
```yaml
295-
uses: aws-actions/configure-aws-credentials@v1
295+
uses: aws-actions/configure-aws-credentials@v2
296296
with:
297297
role-skip-session-tagging: true
298298
```
@@ -314,7 +314,7 @@ You can use this action to simply configure the region and account ID in the
314314
environment, and then use the runner's credentials for all AWS API calls made by
315315
your Actions workflow:
316316
```yaml
317-
uses: aws-actions/configure-aws-credentials@v1
317+
uses: aws-actions/configure-aws-credentials@v2
318318
with:
319319
aws-region: us-east-2
320320
```
@@ -347,7 +347,7 @@ environment.
347347

348348
Manually configured proxy:
349349
```yaml
350-
uses: aws-actions/configure-aws-credentials@v1
350+
uses: aws-actions/configure-aws-credentials@v2
351351
with:
352352
aws-region: us-east-2
353353
role-to-assume: my-github-actions-role

0 commit comments

Comments
 (0)