Skip to content

Commit 5e210ff

Browse files
sethvargojgstew
andauthored
Update spelling and workflow versions (#422)
Closes #421 --------- Signed-off-by: JGStew <james@jgstew.com> Signed-off-by: JGStew <jamesgstewart2@gmail.com> Co-authored-by: JGStew <james@jgstew.com> Co-authored-by: JGStew <jamesgstewart2@gmail.com>
1 parent 49ae1e8 commit 5e210ff

File tree

6 files changed

+8
-7
lines changed

6 files changed

+8
-7
lines changed

.github/workflows/release.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ on:
2222

2323
jobs:
2424
release:
25-
if: "startsWith(github.event.head_commit.message, 'Release: v')"
25+
if: |-
26+
${{ startsWith(github.event.head_commit.message, 'Release: v') }}
2627
name: 'Release'
2728
uses: 'google-github-actions/.github/.github/workflows/release.yml@v0'

.github/workflows/troubleshooting.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
runs-on: 'ubuntu-latest'
2828

2929
steps:
30-
- uses: 'actions/github-script@v6'
30+
- uses: 'actions/github-script@v7'
3131
with:
3232
script: |-
3333
const msg =

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -618,7 +618,7 @@ as a secret.
618618
> [!CAUTION]
619619
>
620620
> Google Cloud Service Account Key JSON files must be secured
621-
> and treated like a password. Anyone with acess to the JSON key can
621+
> and treated like a password. Anyone with access to the JSON key can
622622
> authenticate to Google Cloud as the underlying Service Account. By default,
623623
> these credentials never expire, which is why the former authentication options
624624
> are much preferred.

action.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -143,7 +143,7 @@ inputs:
143143
description: |-
144144
Number of times to retry a failed authentication attempt. This is useful
145145
for automated pipelines that may execute before IAM permissions are fully
146-
propogated.
146+
propagated.
147147
deprecationMessage: |-
148148
This field is no longer used and will be removed in a future release.
149149
required: false

docs/TROUBLESHOOTING.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
> [!CAUTION]
1010
>
1111
> Enabling debug logging increases the chances of a secret
12-
> being accidentially logged. While GitHub Actions will scrub secrets,
12+
> being accidentally logged. While GitHub Actions will scrub secrets,
1313
> please take extra caution when sharing these debug logs in publicly
1414
> accessible places like GitHub issues.
1515
>
@@ -81,7 +81,7 @@
8181
token", it means admission into the Workload Identity Pool failed. Check
8282
your [**Attribute Conditions**][attribute-conditions].
8383

84-
- If the error message inclues "Failed to generate OAuth 2.0 Access
84+
- If the error message includes "Failed to generate OAuth 2.0 Access
8585
Token", it means Service Account Impersonation failed. Check your
8686
[**Service Account Impersonation**][sa-impersonation] settings and
8787
ensure the principalSet is correct.

src/post.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ export async function run(logger: Logger) {
3434

3535
// Look up the credentials path, if one exists. Note that we only check the
3636
// environment variable set by our action, since we don't want to
37-
// accidentially clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
37+
// accidentally clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
3838
// another environment variable manually.
3939
const credentialsPath = process.env['GOOGLE_GHA_CREDS_PATH'];
4040
if (!credentialsPath) {

0 commit comments

Comments
 (0)