diff --git a/dist/index.js b/dist/index.js index ea9d7df..20054ab 100644 --- a/dist/index.js +++ b/dist/index.js @@ -145,7 +145,7 @@ async function assumeRoleWithCredentials(params, client) { core.info('Assuming role with user credentials'); if (!process.env['AWS_SESSION_TOKEN']) { core.warning('To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' + - ' See https://s12d.com/gha-oidc-aws for more information.'); + ' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.'); } try { const creds = await client.send(new client_sts_1.AssumeRoleCommand({ ...params })); diff --git a/src/assumeRole.ts b/src/assumeRole.ts index 6502b6f..c95449f 100644 --- a/src/assumeRole.ts +++ b/src/assumeRole.ts @@ -59,7 +59,7 @@ async function assumeRoleWithCredentials(params: AssumeRoleCommandInput, client: if (!process.env['AWS_SESSION_TOKEN']) { core.warning( 'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' + - ' See https://s12d.com/gha-oidc-aws for more information.' + ' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.' ); } try { diff --git a/test/index.test.ts b/test/index.test.ts index f1227ee..98b8793 100644 --- a/test/index.test.ts +++ b/test/index.test.ts @@ -879,7 +879,7 @@ describe('Configure AWS Credentials', () => { expect(core.warning).toHaveBeenCalledWith( 'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' + - ' See https://s12d.com/gha-oidc-aws for more information.' + ' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.' ); });