Skip to content

Commit 5e210ff

Browse files
sethvargojgstew
andauthored
Update spelling and workflow versions (#422)
Closes #421 --------- Signed-off-by: JGStew <james@jgstew.com> Signed-off-by: JGStew <jamesgstewart2@gmail.com> Co-authored-by: JGStew <james@jgstew.com> Co-authored-by: JGStew <jamesgstewart2@gmail.com>
1 parent 49ae1e8 commit 5e210ff

File tree

6 files changed

+8
-7
lines changed

6 files changed

+8
-7
lines changed

.github/workflows/release.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ on:
2222

2323
jobs:
2424
release:
25-
if: "startsWith(github.event.head_commit.message, 'Release: v')"
25+
if: |-
26+
${{ startsWith(github.event.head_commit.message, 'Release: v') }}
2627
name: 'Release'
2728
uses: 'google-github-actions/.github/.github/workflows/release.yml@v0'

.github/workflows/troubleshooting.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
runs-on: 'ubuntu-latest'
2828

2929
steps:
30-
- uses: 'actions/github-script@v6'
30+
- uses: 'actions/github-script@v7'
3131
with:
3232
script: |-
3333
const msg =

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -618,7 +618,7 @@ as a secret.
618618
> [!CAUTION]
619619
>
620620
> Google Cloud Service Account Key JSON files must be secured
621-
> and treated like a password. Anyone with acess to the JSON key can
621+
> and treated like a password. Anyone with access to the JSON key can
622622
> authenticate to Google Cloud as the underlying Service Account. By default,
623623
> these credentials never expire, which is why the former authentication options
624624
> are much preferred.

action.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ inputs:
143143
description: |-
144144
Number of times to retry a failed authentication attempt. This is useful
145145
for automated pipelines that may execute before IAM permissions are fully
146-
propogated.
146+
propagated.
147147
deprecationMessage: |-
148148
This field is no longer used and will be removed in a future release.
149149
required: false

docs/TROUBLESHOOTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
> [!CAUTION]
1010
>
1111
> Enabling debug logging increases the chances of a secret
12-
> being accidentially logged. While GitHub Actions will scrub secrets,
12+
> being accidentally logged. While GitHub Actions will scrub secrets,
1313
> please take extra caution when sharing these debug logs in publicly
1414
> accessible places like GitHub issues.
1515
>
@@ -81,7 +81,7 @@
8181
token", it means admission into the Workload Identity Pool failed. Check
8282
your [**Attribute Conditions**][attribute-conditions].
8383

84-
- If the error message inclues "Failed to generate OAuth 2.0 Access
84+
- If the error message includes "Failed to generate OAuth 2.0 Access
8585
Token", it means Service Account Impersonation failed. Check your
8686
[**Service Account Impersonation**][sa-impersonation] settings and
8787
ensure the principalSet is correct.

src/post.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ export async function run(logger: Logger) {
3434

3535
// Look up the credentials path, if one exists. Note that we only check the
3636
// environment variable set by our action, since we don't want to
37-
// accidentially clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
37+
// accidentally clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
3838
// another environment variable manually.
3939
const credentialsPath = process.env['GOOGLE_GHA_CREDS_PATH'];
4040
if (!credentialsPath) {

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy