File tree 6 files changed +8
-7
lines changed 6 files changed +8
-7
lines changed Original file line number Diff line number Diff line change 22
22
23
23
jobs :
24
24
release :
25
- if : " startsWith(github.event.head_commit.message, 'Release: v')"
25
+ if : |-
26
+ ${{ startsWith(github.event.head_commit.message, 'Release: v') }}
26
27
name : ' Release'
27
28
uses : ' google-github-actions/.github/.github/workflows/release.yml@v0'
Original file line number Diff line number Diff line change 27
27
runs-on : ' ubuntu-latest'
28
28
29
29
steps :
30
- - uses : ' actions/github-script@v6 '
30
+ - uses : ' actions/github-script@v7 '
31
31
with :
32
32
script : |-
33
33
const msg =
Original file line number Diff line number Diff line change @@ -618,7 +618,7 @@ as a secret.
618
618
> [!CAUTION]
619
619
>
620
620
> Google Cloud Service Account Key JSON files must be secured
621
- > and treated like a password. Anyone with acess to the JSON key can
621
+ > and treated like a password. Anyone with access to the JSON key can
622
622
> authenticate to Google Cloud as the underlying Service Account. By default,
623
623
> these credentials never expire, which is why the former authentication options
624
624
> are much preferred.
Original file line number Diff line number Diff line change @@ -143,7 +143,7 @@ inputs:
143
143
description : |-
144
144
Number of times to retry a failed authentication attempt. This is useful
145
145
for automated pipelines that may execute before IAM permissions are fully
146
- propogated .
146
+ propagated .
147
147
deprecationMessage : |-
148
148
This field is no longer used and will be removed in a future release.
149
149
required : false
Original file line number Diff line number Diff line change 9
9
> [ !CAUTION]
10
10
>
11
11
> Enabling debug logging increases the chances of a secret
12
- > being accidentially logged. While GitHub Actions will scrub secrets,
12
+ > being accidentally logged. While GitHub Actions will scrub secrets,
13
13
> please take extra caution when sharing these debug logs in publicly
14
14
> accessible places like GitHub issues.
15
15
>
81
81
token", it means admission into the Workload Identity Pool failed. Check
82
82
your [**Attribute Conditions**][attribute-conditions].
83
83
84
- - If the error message inclues "Failed to generate OAuth 2.0 Access
84
+ - If the error message includes "Failed to generate OAuth 2.0 Access
85
85
Token", it means Service Account Impersonation failed. Check your
86
86
[**Service Account Impersonation**][sa-impersonation] settings and
87
87
ensure the principalSet is correct.
Original file line number Diff line number Diff line change @@ -34,7 +34,7 @@ export async function run(logger: Logger) {
34
34
35
35
// Look up the credentials path, if one exists. Note that we only check the
36
36
// environment variable set by our action, since we don't want to
37
- // accidentially clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
37
+ // accidentally clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
38
38
// another environment variable manually.
39
39
const credentialsPath = process . env [ 'GOOGLE_GHA_CREDS_PATH' ] ;
40
40
if ( ! credentialsPath ) {
You can’t perform that action at this time.
0 commit comments