Skip to content

Commit d10604c

Browse files
authored
Raw tag rendering fix (#59339)
1 parent 7c14d28 commit d10604c

File tree

3 files changed

+0
-11
lines changed

3 files changed

+0
-11
lines changed

content/actions/how-tos/secure-your-work/security-harden-deployments/oidc-in-azure.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,6 @@ The [`azure/login`](https://github.com/Azure/login) action receives a JWT from t
7777

7878
The following example exchanges an OIDC ID token with Azure to receive an access token, which can then be used to access cloud resources.
7979

80-
{% raw %}
8180

8281
```yaml copy
8382
{% data reusables.actions.actions-not-certified-by-github-comment %}
@@ -104,8 +103,6 @@ jobs:
104103
az group list
105104
```
106105
107-
{% endraw %}
108-
109106
## Further reading
110107
111108
{% data reusables.actions.oidc-further-reading %}

content/actions/how-tos/secure-your-work/security-harden-deployments/oidc-in-google-cloud-platform.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -78,8 +78,6 @@ This example has a job called `Get_OIDC_ID_token` that uses actions to request a
7878

7979
This action exchanges a {% data variables.product.prodname_dotcom %} OIDC token for a Google Cloud access token, using [Workload Identity Federation](https://cloud.google.com/iam/docs/workload-identity-federation).
8080

81-
{% raw %}
82-
8381
```yaml copy
8482
{% data reusables.actions.actions-not-certified-by-github-comment %}
8583
name: List services in GCP
@@ -109,8 +107,6 @@ jobs:
109107
gcloud services list
110108
```
111109
112-
{% endraw %}
113-
114110
## Further reading
115111
116112
{% data reusables.actions.oidc-further-reading %}

content/actions/how-tos/secure-your-work/security-harden-deployments/oidc-in-jfrog.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,8 +55,6 @@ In your {% data variables.product.prodname_actions %} workflow file, ensure you
5555

5656
The following example uses the placeholders `YOUR_PROVIDER_NAME` and `YOUR_AUDIENCE`.
5757

58-
{% raw %}
59-
6058
```yaml
6159
{% data reusables.actions.actions-not-certified-by-github-comment %}
6260
permissions:
@@ -80,8 +78,6 @@ jobs:
8078

8179
```
8280

83-
{% endraw %}
84-
8581
> [!TIP]
8682
> When OIDC authentication is used, the `setup-jfrog-cli` action automatically provides `oidc-user` and `oidc-token` as step outputs.
8783
> These can be used for other integrations that require authentication with JFrog.

0 commit comments

Comments
 (0)