replace shortened URL with full URL (#905)

Co-authored-by: mergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
This commit is contained in:
Tim Finnigan
2023-11-09 15:56:58 -08:00
committed by GitHub
parent 3e19f1cabc
commit 0a640cb1ea
3 changed files with 3 additions and 3 deletions

2
dist/index.js generated vendored
View File

@@ -145,7 +145,7 @@ async function assumeRoleWithCredentials(params, client) {
core.info('Assuming role with user credentials');
if (!process.env['AWS_SESSION_TOKEN']) {
core.warning('To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' +
' See https://s12d.com/gha-oidc-aws for more information.');
' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.');
}
try {
const creds = await client.send(new client_sts_1.AssumeRoleCommand({ ...params }));

View File

@@ -59,7 +59,7 @@ async function assumeRoleWithCredentials(params: AssumeRoleCommandInput, client:
if (!process.env['AWS_SESSION_TOKEN']) {
core.warning(
'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' +
' See https://s12d.com/gha-oidc-aws for more information.'
' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.'
);
}
try {

View File

@@ -879,7 +879,7 @@ describe('Configure AWS Credentials', () => {
expect(core.warning).toHaveBeenCalledWith(
'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' +
' See https://s12d.com/gha-oidc-aws for more information.'
' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.'
);
});