File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 2222
2323jobs :
2424 release :
25- if : " startsWith(github.event.head_commit.message, 'Release: v')"
25+ if : |-
26+ ${{ startsWith(github.event.head_commit.message, 'Release: v') }}
2627 name : ' Release'
2728 uses : ' google-github-actions/.github/.github/workflows/release.yml@v0'
Original file line number Diff line number Diff line change 2727 runs-on : ' ubuntu-latest'
2828
2929 steps :
30- - uses : ' actions/github-script@v6 '
30+ - uses : ' actions/github-script@v7 '
3131 with :
3232 script : |-
3333 const msg =
Original file line number Diff line number Diff line change @@ -618,7 +618,7 @@ as a secret.
618618> [!CAUTION]
619619>
620620> Google Cloud Service Account Key JSON files must be secured
621- > and treated like a password. Anyone with acess to the JSON key can
621+ > and treated like a password. Anyone with access to the JSON key can
622622> authenticate to Google Cloud as the underlying Service Account. By default,
623623> these credentials never expire, which is why the former authentication options
624624> are much preferred.
Original file line number Diff line number Diff line change @@ -143,7 +143,7 @@ inputs:
143143 description : |-
144144 Number of times to retry a failed authentication attempt. This is useful
145145 for automated pipelines that may execute before IAM permissions are fully
146- propogated .
146+ propagated .
147147 deprecationMessage : |-
148148 This field is no longer used and will be removed in a future release.
149149 required : false
Original file line number Diff line number Diff line change 99 > [ !CAUTION]
1010 >
1111 > Enabling debug logging increases the chances of a secret
12- > being accidentially logged. While GitHub Actions will scrub secrets,
12+ > being accidentally logged. While GitHub Actions will scrub secrets,
1313 > please take extra caution when sharing these debug logs in publicly
1414 > accessible places like GitHub issues.
1515 >
8181 token", it means admission into the Workload Identity Pool failed. Check
8282 your [**Attribute Conditions**][attribute-conditions].
8383
84- - If the error message inclues "Failed to generate OAuth 2.0 Access
84+ - If the error message includes "Failed to generate OAuth 2.0 Access
8585 Token", it means Service Account Impersonation failed. Check your
8686 [**Service Account Impersonation**][sa-impersonation] settings and
8787 ensure the principalSet is correct.
Original file line number Diff line number Diff line change @@ -34,7 +34,7 @@ export async function run(logger: Logger) {
3434
3535 // Look up the credentials path, if one exists. Note that we only check the
3636 // environment variable set by our action, since we don't want to
37- // accidentially clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
37+ // accidentally clean up if someone set GOOGLE_APPLICATION_CREDENTIALS or
3838 // another environment variable manually.
3939 const credentialsPath = process . env [ 'GOOGLE_GHA_CREDS_PATH' ] ;
4040 if ( ! credentialsPath ) {
You can’t perform that action at this time.
0 commit comments