From 0a640cb1ea6ce6735003e69ddc75c10119f675e2 Mon Sep 17 00:00:00 2001 From: Tim Finnigan <87778557+tim-finnigan@users.noreply.github.com> Date: Thu, 9 Nov 2023 15:56:58 -0800 Subject: [PATCH] replace shortened URL with full URL (#905) Co-authored-by: mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> --- dist/index.js | 2 +- src/assumeRole.ts | 2 +- test/index.test.ts | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/dist/index.js b/dist/index.js index ea9d7df..20054ab 100644 --- a/dist/index.js +++ b/dist/index.js @@ -145,7 +145,7 @@ async function assumeRoleWithCredentials(params, client) { core.info('Assuming role with user credentials'); if (!process.env['AWS_SESSION_TOKEN']) { core.warning('To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' + - ' See https://s12d.com/gha-oidc-aws for more information.'); + ' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.'); } try { const creds = await client.send(new client_sts_1.AssumeRoleCommand({ ...params })); diff --git a/src/assumeRole.ts b/src/assumeRole.ts index 6502b6f..c95449f 100644 --- a/src/assumeRole.ts +++ b/src/assumeRole.ts @@ -59,7 +59,7 @@ async function assumeRoleWithCredentials(params: AssumeRoleCommandInput, client: if (!process.env['AWS_SESSION_TOKEN']) { core.warning( 'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' + - ' See https://s12d.com/gha-oidc-aws for more information.' + ' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.' ); } try { diff --git a/test/index.test.ts b/test/index.test.ts index f1227ee..98b8793 100644 --- a/test/index.test.ts +++ b/test/index.test.ts @@ -879,7 +879,7 @@ describe('Configure AWS Credentials', () => { expect(core.warning).toHaveBeenCalledWith( 'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' + - ' See https://s12d.com/gha-oidc-aws for more information.' + ' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.' ); });