Bumps aws-actions/configure-aws-credentials from 3 to 4. Release notes Sourced from aws-actions/configure-aws-credentials's releases. v4 This tag tracks the latest v4.x.x release v3.0.2 See the c...
uses:aws-actions/configure-aws-credentials@v4with:aws-region:us-east-2role-to-assume:my-github-actions-role In this case, your runner's credentials must have permissions to assume the role. You can also assume a role using a web identity token file, such as if usingAmazon EKS IRSA. Pods...
uses: aws-actions/configure-aws-credentials@v4 with: aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} @@ -194,7 +194,7 @@ jobs: uses: actions/checkout@v4 - name: Configure AWS Credentials uses: aws-actions/configure...
uses: aws-actions/configure-aws-credentials@v4 with: aws-access-key-id: ${{ secrets.MARKETPLACE_ID }} aws-secret-access-key: ${{ secrets.MARKETPLACE_KEY }} aws-region: us-east-1 It does use a different access key tho.. so might be intended adutchak and others added 2 commi...
uses:aws-actions/configure-aws-credentials@v4with:aws-region:us-east-2 In this case, your runner's credentials must have permissions to call any AWS APIs called by your Actions workflow. Or, you can use this action to assume a role, and then use the role credentials for all AWS API ...
- name: Configure AWS Credentials for China region audience uses: aws-actions/configure-aws-credentials@v4 with: audience: sts.amazonaws.com.cn aws-region: us-east-3 role-to-assume: arn:aws-cn:iam::123456789100:role/my-github-actions-role Configuring IAM to trust GitHub To use GitHub's OI...
- name: Configure AWS Credentials for China region audience uses: aws-actions/configure-aws-credentials@v4 with: audience: sts.amazonaws.com.cn aws-region: us-east-3 role-to-assume: arn:aws-cn:iam::123456789100:role/my-github-actions-role Configuring IAM to trust GitHub To use GitHub's OI...
- name: Configure AWS Credentials uses: aws-actions/configure-aws-credentials@v4 with: aws-region: us-east-2 role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role role-session-name: MySessionName In this example, the Action will load the OIDC token from the GitHub-provided...