Skip to content

Commit 0a640cb

Browse files
replace shortened URL with full URL (#905)
Co-authored-by: mergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
1 parent 3e19f1c commit 0a640cb

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

dist/index.js

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

src/assumeRole.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ async function assumeRoleWithCredentials(params: AssumeRoleCommandInput, client:
5959
if (!process.env['AWS_SESSION_TOKEN']) {
6060
core.warning(
6161
'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' +
62-
' See https://s12d.com/gha-oidc-aws for more information.'
62+
' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.'
6363
);
6464
}
6565
try {

test/index.test.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -879,7 +879,7 @@ describe('Configure AWS Credentials', () => {
879879

880880
expect(core.warning).toHaveBeenCalledWith(
881881
'To avoid using long-term AWS credentials, please update your workflows to authenticate using OpenID Connect.' +
882-
' See https://s12d.com/gha-oidc-aws for more information.'
882+
' See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for more information.'
883883
);
884884
});
885885

0 commit comments

Comments
 (0)