@@ -19,15 +19,18 @@ This action allows you to synchronously invoke a Lambda function and get the res
1919
2020## Table of contents
2121
22- - [ Input parameters] ( #input-parameters )
23- - [ Credentials] ( #credentials )
24- - [ Invocation] ( #invocation )
25- - [ Output] ( #output )
26- - [ Examples] ( #examples )
27- - [ Basic example] ( #basic-example )
28- - [ Using output] ( #using-output )
29- - [ Specifying alias/version] ( #specifying-aliasversion )
30- - [ Handling logs] ( #handling-logs )
22+ - [ Invoke AWS Lambda] ( #invoke-aws-lambda )
23+ - [ Table of contents] ( #table-of-contents )
24+ - [ Input parameters] ( #input-parameters )
25+ - [ Credentials] ( #credentials )
26+ - [ Invocation] ( #invocation )
27+ - [ Output] ( #output )
28+ - [ Examples] ( #examples )
29+ - [ Basic example] ( #basic-example )
30+ - [ Using output] ( #using-output )
31+ - [ Specifying alias/version] ( #specifying-aliasversion )
32+ - [ Handling logs] ( #handling-logs )
33+ - [ OpenID Credentials] ( #openid-credentials )
3134
3235<hr >
3336
@@ -157,3 +160,24 @@ These steps process logs returned from the invocation:
157160- name: Store tail logs to file
158161 run: echo "${{ fromJSON(steps.foobar.outputs.response).LogResult }}" > invocation-logs.json
159162` ` `
163+
164+ # ## OpenID Credentials
165+
166+ You can also use OpenID Credentials via `aws-actions/configure-aws-credentials` :
167+ ` ` ` yaml
168+ - name: Assume AWS role
169+ uses: aws-actions/configure-aws-credentials@v1
170+ with:
171+ role-to-assume: the_arn_of_the_role_you_want_to_assume
172+ aws-region: eu-west-1
173+
174+ - name: Invoke the Lambda
175+ uses: gagoar/invoke-aws-lambda@master
176+ with:
177+ AWS_ACCESS_KEY_ID: ${{env.AWS_ACCESS_KEY_ID}}
178+ AWS_SECRET_ACCESS_KEY: ${{env.AWS_SECRET_ACCESS_KEY}}
179+ AWS_SESSION_TOKEN: ${{env.AWS_SESSION_TOKEN}}
180+ REGION: ${{env.AWS_REGION}}
181+ FunctionName: foobarFunction
182+ Payload: '{ "myParameter": false }'
183+ ` ` `
0 commit comments