mirror of
https://github.com/aws-actions/configure-aws-credentials.git
synced 2026-03-12 18:07:10 -04:00
96 lines
4.4 KiB
YAML
96 lines
4.4 KiB
YAML
|
|
name: '"Configure AWS Credentials" Action for GitHub Actions'
|
|
description: Configures AWS credentials for use in subsequent steps in a GitHub Action workflow
|
|
runs:
|
|
using: node20
|
|
main: dist/index.js
|
|
post: dist/cleanup/index.js
|
|
branding:
|
|
color: orange
|
|
icon: cloud
|
|
inputs:
|
|
aws-region:
|
|
description: AWS Region, e.g. us-east-2
|
|
required: true
|
|
role-to-assume:
|
|
description: The Amazon Resource Name (ARN) of the role to assume. Use the provided credentials to assume an IAM role and configure the Actions environment with the assumed role credentials rather than with the provided credentials.
|
|
required: false
|
|
aws-access-key-id:
|
|
description: AWS Access Key ID. Provide this key if you want to assume a role using access keys rather than a web identity token.
|
|
required: false
|
|
aws-secret-access-key:
|
|
description: AWS Secret Access Key. Required if aws-access-key-id is provided.
|
|
required: false
|
|
aws-session-token:
|
|
description: AWS Session Token.
|
|
required: false
|
|
web-identity-token-file:
|
|
description: Use the web identity token file from the provided file system path in order to assume an IAM role using a web identity, e.g. from within an Amazon EKS worker node.
|
|
required: false
|
|
role-chaining:
|
|
description: Use existing credentials from the environment to assume a new role, rather than providing credentials as input.
|
|
required: false
|
|
audience:
|
|
description: The audience to use for the OIDC provider
|
|
required: false
|
|
default: sts.amazonaws.com
|
|
http-proxy:
|
|
description: Proxy to use for the AWS SDK agent
|
|
required: false
|
|
mask-aws-account-id:
|
|
description: Whether to mask the AWS account ID for these credentials as a secret value. By default the account ID will not be masked
|
|
required: false
|
|
role-duration-seconds:
|
|
description: Role duration in seconds. Default is one hour.
|
|
required: false
|
|
role-external-id:
|
|
description: The external ID of the role to assume.
|
|
required: false
|
|
role-session-name:
|
|
description: "Role session name (default: GitHubActions)"
|
|
required: false
|
|
role-skip-session-tagging:
|
|
description: Skip session tagging during role assumption
|
|
required: false
|
|
transitive-tag-keys:
|
|
description: Define a list of transitive tag keys to pass when assuming a role
|
|
required: false
|
|
inline-session-policy:
|
|
description: Define an inline session policy to use when assuming a role
|
|
required: false
|
|
managed-session-policies:
|
|
description: Define a list of managed session policies to use when assuming a role
|
|
required: false
|
|
output-credentials:
|
|
description: Whether to set credentials as step output
|
|
required: false
|
|
output-env-credentials:
|
|
description: Whether to export credentials as environment variables. If you set this to false, you probably want to use output-credentials.
|
|
required: false
|
|
default: true
|
|
unset-current-credentials:
|
|
description: Whether to unset the existing credentials in your runner. May be useful if you run this action multiple times in the same job
|
|
required: false
|
|
disable-retry:
|
|
description: Whether to disable the retry and backoff mechanism when the assume role call fails. By default the retry mechanism is enabled
|
|
required: false
|
|
retry-max-attempts:
|
|
description: The maximum number of attempts it will attempt to retry the assume role call. By default it will retry 12 times
|
|
required: false
|
|
special-characters-workaround:
|
|
description: Some environments do not support special characters in AWS_SECRET_ACCESS_KEY. This option will retry fetching credentials until the secret access key does not contain special characters. This option overrides disable-retry and retry-max-attempts. This option is disabled by default
|
|
required: false
|
|
use-existing-credentials:
|
|
description: When enabled, this option will check if there are already valid credentials in the environment. If there are, new credentials will not be fetched. If there are not, the action will run as normal.
|
|
outputs:
|
|
aws-account-id:
|
|
description: The AWS account ID for the provided credentials
|
|
aws-access-key-id:
|
|
description: The AWS access key ID for the provided credentials
|
|
aws-secret-access-key:
|
|
description: The AWS secret access key for the provided credentials
|
|
aws-session-token:
|
|
description: The AWS session token for the provided credentials
|
|
aws-expiration:
|
|
description: The expiration time for the provided credentials
|