diff --git a/.github/workflows/md-links-check.yml b/.github/workflows/md-links-check.yml index bf52a3df..942214fa 100644 --- a/.github/workflows/md-links-check.yml +++ b/.github/workflows/md-links-check.yml @@ -28,7 +28,7 @@ on: [pull_request] jobs: check-links: name: runner / linkspector - runs-on: ubuntu-latest + runs-on: ubuntu-22.04 steps: - uses: actions/checkout@v4 - name: Run linkspector @@ -36,4 +36,4 @@ jobs: with: github_token: ${{ secrets.GITHUB_TOKEN }} reporter: github-pr-review - fail_on_error: true \ No newline at end of file + fail_on_error: true diff --git a/.linkspector.yml b/.linkspector.yml index e3b01b16..1dffd0e9 100644 --- a/.linkspector.yml +++ b/.linkspector.yml @@ -1,5 +1,8 @@ dirs: - ./docs files: - - ./*.md -useGitIgnore: true \ No newline at end of file + - CHANGELOG.md + - CONTRIBUTING.md + - LICENSE.md + - README.md +useGitIgnore: true diff --git a/CHANGELOG.md b/CHANGELOG.md index bb793efc..c63cb017 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,7 +4,8 @@ ### Bugs - * `aws-sso-profile` helper generates error about `--no-config-check` flag + * `aws-sso-profile` helper generates error about `--no-config-check` flag + * Honor `DefaultRegion` in config.yaml when using interactive prompt #1075 ## [v2.0.0-beta4] - 2024-09-29 diff --git a/docs/commands.md b/docs/commands.md index 4d2bbca7..f7c53c19 100644 --- a/docs/commands.md +++ b/docs/commands.md @@ -457,7 +457,7 @@ override this by first exporting `AWS_SSO` to the value you want to use. If you want to pass specific args to `aws-sso-profile` you can use the `$AWS_SSO_HELPER_ARGS` environment variable. If nothing is set, then -`--level error --no-config-check` is used. +`--level error` is used. Currently the following shells are supported: diff --git a/docs/config.md b/docs/config.md index efc25b43..d9139a58 100644 --- a/docs/config.md +++ b/docs/config.md @@ -552,10 +552,19 @@ path or disable this configuration option. #### AutoLogin -When set to `true`, `aws-sso` will behave like v1.x and automatically attempt to +When set to `true`, `aws-sso` will behave mostly like v1.x and automatically attempt to login with your SSO provider to AWS Identity Center when your session has expired. When set to `false` (the default) you must first run [aws-sso login](commands.md#login). +**Note:** This feature exists soley beacuse people don't like change. Enabling this +really isn't ideal from a security standpoint since it makes it more likely that +an attempted phish attack will be successful. Users should expect the login page to load +in their browser if and only if they have manually initiated the login process. + +**Note:** that v2.x does not support the common [--no-config-check]( +https://synfinatic.github.io/aws-sso-cli/v1.17.0/commands/#common-flags) flag that was +present in 1.x. + #### LogLevel / LogLines By default, the `LogLevel` is 'info'. You can override it here or via