Update spelling and workflow versions (#422)

Closes #421

---------

Signed-off-by: JGStew <james@jgstew.com>
Signed-off-by: JGStew <jamesgstewart2@gmail.com>
Co-authored-by: JGStew <james@jgstew.com>
Co-authored-by: JGStew <jamesgstewart2@gmail.com>
This commit is contained in:
Seth Vargo 2024-06-21 11:57:04 -04:00 committed by GitHub
parent 49ae1e804e
commit 5e210ff4ed
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
6 changed files with 8 additions and 7 deletions

View File

@ -22,6 +22,7 @@ on:
jobs: jobs:
release: release:
if: "startsWith(github.event.head_commit.message, 'Release: v')" if: |-
${{ startsWith(github.event.head_commit.message, 'Release: v') }}
name: 'Release' name: 'Release'
uses: 'google-github-actions/.github/.github/workflows/release.yml@v0' uses: 'google-github-actions/.github/.github/workflows/release.yml@v0'

View File

@ -27,7 +27,7 @@ jobs:
runs-on: 'ubuntu-latest' runs-on: 'ubuntu-latest'
steps: steps:
- uses: 'actions/github-script@v6' - uses: 'actions/github-script@v7'
with: with:
script: |- script: |-
const msg = const msg =

View File

@ -618,7 +618,7 @@ as a secret.
> [!CAUTION] > [!CAUTION]
> >
> Google Cloud Service Account Key JSON files must be secured > Google Cloud Service Account Key JSON files must be secured
> and treated like a password. Anyone with acess to the JSON key can > and treated like a password. Anyone with access to the JSON key can
> authenticate to Google Cloud as the underlying Service Account. By default, > authenticate to Google Cloud as the underlying Service Account. By default,
> these credentials never expire, which is why the former authentication options > these credentials never expire, which is why the former authentication options
> are much preferred. > are much preferred.

View File

@ -143,7 +143,7 @@ inputs:
description: |- description: |-
Number of times to retry a failed authentication attempt. This is useful Number of times to retry a failed authentication attempt. This is useful
for automated pipelines that may execute before IAM permissions are fully for automated pipelines that may execute before IAM permissions are fully
propogated. propagated.
deprecationMessage: |- deprecationMessage: |-
This field is no longer used and will be removed in a future release. This field is no longer used and will be removed in a future release.
required: false required: false

View File

@ -9,7 +9,7 @@
> [!CAUTION] > [!CAUTION]
> >
> Enabling debug logging increases the chances of a secret > Enabling debug logging increases the chances of a secret
> being accidentially logged. While GitHub Actions will scrub secrets, > being accidentally logged. While GitHub Actions will scrub secrets,
> please take extra caution when sharing these debug logs in publicly > please take extra caution when sharing these debug logs in publicly
> accessible places like GitHub issues. > accessible places like GitHub issues.
> >
@ -81,7 +81,7 @@
token", it means admission into the Workload Identity Pool failed. Check token", it means admission into the Workload Identity Pool failed. Check
your [**Attribute Conditions**][attribute-conditions]. your [**Attribute Conditions**][attribute-conditions].
- If the error message inclues "Failed to generate OAuth 2.0 Access - If the error message includes "Failed to generate OAuth 2.0 Access
Token", it means Service Account Impersonation failed. Check your Token", it means Service Account Impersonation failed. Check your
[**Service Account Impersonation**][sa-impersonation] settings and [**Service Account Impersonation**][sa-impersonation] settings and
ensure the principalSet is correct. ensure the principalSet is correct.

View File

@ -34,7 +34,7 @@ export async function run(logger: Logger) {
// Look up the credentials path, if one exists. Note that we only check the // Look up the credentials path, if one exists. Note that we only check the
// environment variable set by our action, since we don't want to // environment variable set by our action, since we don't want to
// accidentially clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or // accidentally clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
// another environment variable manually. // another environment variable manually.
const credentialsPath = process.env['GOOGLE_GHA_CREDS_PATH']; const credentialsPath = process.env['GOOGLE_GHA_CREDS_PATH'];
if (!credentialsPath) { if (!credentialsPath) {