You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
if: always() # always run even if the previous step fails
61
60
with:
62
61
report_paths: '**/report-junit.xml'
63
-
- name: Analyze with SonarCloud
64
-
# You can pin the exact commit or the version.
65
-
uses: SonarSource/sonarcloud-github-action@master
62
+
63
+
- name: Analyze with SonarCloud
64
+
uses: SonarSource/sonarqube-scan-action@v5
66
65
env:
67
66
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information
68
67
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} # Generate a token on Sonarcloud.io, add it to the secrets of this repo with the name SONAR_TOKEN (Settings > Secrets > Actions > add new repository secret)
Copy file name to clipboardExpand all lines: cmd/awscliauth.go
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -59,7 +59,7 @@ Stores them under the $HOME/.aws/credentials file under a specified path or retu
59
59
r.Cmd.PersistentFlags().IntVarP(&rf.duration, "max-duration", "d", 900, `Override default max session duration, in seconds, of the role session [900-43200].
60
60
NB: This cannot be higher than the 3600 as the API does not allow for AssumeRole for sessions longer than an hour`)
Short: "Clears any stored credentials in the OS secret store",
23
22
Long: `Clears any stored credentials in the OS secret store
24
-
25
-
NB: Occassionally you may encounter a hanging chromium processes if not using own browser binary, you should kill all the instances of the chromium PIDs`,
23
+
NB: Occassionally you may encounter a hanging chromium processes, you should kill all the instances of the chromium (or if using own browser binary) PIDs`,
Copy file name to clipboardExpand all lines: cmd/specific.go
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -75,6 +75,6 @@ Returns the same JSON object as the call to the AWS CLI for any of the sts Assum
75
75
76
76
cmd.PersistentFlags().StringVarP(&flags.method, "method", "m", "WEB_ID", "Runs a specific credentialProvider as opposed to relying on the default chain provider fallback")
77
77
cmd.PersistentFlags().StringVarP(&flags.role, "role", "r", "", `Set the role you want to assume when SAML or OIDC process completes`)
0 commit comments