From 30e50159d1c7c5487e4befc81863bc69cc8ee592 Mon Sep 17 00:00:00 2001 From: Hossein Abbasi <16090309+hsnabszhdn@users.noreply.github.com> Date: Tue, 17 Sep 2024 01:21:16 +1000 Subject: [PATCH] Use consistent language for placeholders in AWS OpenID setup (#34525) Co-authored-by: itecompro <16090309+itecompro@users.noreply.github.com> Co-authored-by: Alex Nguyen <150945400+nguyenalex836@users.noreply.github.com> --- .../configuring-openid-connect-in-amazon-web-services.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/content/actions/security-for-github-actions/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services.md b/content/actions/security-for-github-actions/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services.md index 23d6756363de..3eb93c0ae817 100644 --- a/content/actions/security-for-github-actions/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services.md +++ b/content/actions/security-for-github-actions/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services.md @@ -124,8 +124,8 @@ To update your workflows for OIDC, you will need to make two changes to your YAM The `aws-actions/configure-aws-credentials` action receives a JWT from the {% data variables.product.prodname_dotcom %} OIDC provider, and then requests an access token from AWS. For more information, see the AWS [documentation](https://github.com/aws-actions/configure-aws-credentials). -* `BUCKET-NAME`: Add the name of your S3 bucket here. -* `AWS-REGION`: Add the name of your AWS region here. +* `BUCKET-NAME`: Replace this with the name of your S3 bucket. +* `AWS-REGION`: Replace this with the name of your AWS region. * `ROLE-TO-ASSUME`: Replace this with your AWS role. For example, `arn:aws:iam::1234567890:role/example-role` ```yaml copy