From 0f01265ceb495eb8c6998d8ab2409215cfcb08ac Mon Sep 17 00:00:00 2001
From: Henry Griffiths <42880130+henrygriffiths@users.noreply.github.com>
Date: Thu, 5 Feb 2026 11:53:33 -0600
Subject: [PATCH] chore: update readme version to v6.0.0 (#1642)
---
README.md | 26 +++++++++++++-------------
1 file changed, 13 insertions(+), 13 deletions(-)
diff --git a/README.md b/README.md
index ccc9e34..c95310a 100644
--- a/README.md
+++ b/README.md
@@ -182,7 +182,7 @@ this action will always consider the `HTTP_PROXY` environment variable.
Manually configured proxy:
```yaml
-uses: aws-actions/configure-aws-credentials@v5.1.1
+uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-region: us-east-2
role-to-assume: my-github-actions-role
@@ -243,7 +243,7 @@ you can use the `transitive-tag-keys` input to specify the keys of the tags to b
_Note that all subsequent roles in the chain must have `role-skip-session-tagging` set to `true`_
```yaml
- uses: aws-actions/configure-aws-credentials@v5
+ uses: aws-actions/configure-aws-credentials@v6
with:
transitive-tag-keys: |
Repository
@@ -267,13 +267,13 @@ line.
Inline session policy examples
```yaml
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
inline-session-policy: '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:List*","Resource":"*"}]}'
```
Or we can have a nicely formatted JSON as well:
```yaml
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
inline-session-policy: >-
{
@@ -299,13 +299,13 @@ the role.
Managed session policy examples
```yaml
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
managed-session-policies: arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
```
And we can pass multiple managed policies likes this:
```yaml
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
managed-session-policies: |
arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess
@@ -343,7 +343,7 @@ You can specify the audience through the `audience` input:
```yaml
- name: Configure AWS Credentials for China region audience
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
audience: sts.amazonaws.com.cn
aws-region: cn-northwest-1
@@ -417,7 +417,7 @@ Examples
### AssumeRoleWithWebIdentity
```yaml
- name: Configure AWS Credentials
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-region: us-east-2
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -431,13 +431,13 @@ environment variable and use it to assume the role
### AssumeRole with role previously assumed by action in same workflow
```yaml
- name: Configure AWS Credentials
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-region: us-east-2
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
role-session-name: MySessionName
- name: Configure other AWS Credentials
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-region: us-east-2
role-to-assume: arn:aws:iam::987654321000:role/my-second-role
@@ -454,7 +454,7 @@ Note that the trust relationship/trust policy of the second role must grant the
### AssumeRole with static IAM credentials in repository secrets
```yaml
- name: Configure AWS Credentials
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }}
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }}
@@ -473,7 +473,7 @@ name, like `role-to-assume: my-github-actions-role`.
```yaml
- name: Configure AWS Credentials 1
id: creds
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-region: us-east-2
role-to-assume: arn:aws:iam::123456789100:role/my-github-actions-role
@@ -482,7 +482,7 @@ name, like `role-to-assume: my-github-actions-role`.
run: |
aws sts get-caller-identity
- name: Configure AWS Credentials 2
- uses: aws-actions/configure-aws-credentials@v5.1.1
+ uses: aws-actions/configure-aws-credentials@v6.0.0
with:
aws-region: us-east-2
aws-access-key-id: ${{ steps.creds.outputs.aws-access-key-id }}