-
Notifications
You must be signed in to change notification settings - Fork 564
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Spelling #1246
Spelling #1246
Conversation
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM to me thanks for that
i would say to squash the commits in one
and I vote to add this action as well
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Most corrections were automatically suggested by Google Sheets.
I added a couple of manual fixes (mostly brands and a name) and a couple of overrides.
All blame goes to me
@@ -46,7 +46,7 @@ A whole buncha bugfixes! | |||
* Added the `--signature-digest-algorithm` flag to `cosign verify`, allowing verification of container image signatures which were generated with a non-SHA256 signature algorithm (https://github.com/sigstore/cosign/pull/1071) | |||
* Builds should now be reproducible (https://github.com/sigstore/cosign/pull/1053) | |||
* Allows base64 files as `--cert` in `cosign verify-blob` (https://github.com/sigstore/cosign/pull/1088) | |||
* Kubernetes secrets generated for version >= 1.21 clusters have the immutible bit set (https://github.com/sigstore/cosign/pull/1091) | |||
* Kubernetes secrets generated for version >= 1.21 clusters have the immutable bit set (https://github.com/sigstore/cosign/pull/1091) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some projects don't like retroactive changes to release notes, let me know if you want me to drop all changes to this (or any other) file
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't see an issue with it!
@@ -134,7 +134,7 @@ A whole buncha bugfixes! | |||
* `manifest verify` now supports verifying images in all Kubernetes objects that fit within `PodSpec`, `PodSpecTemplate`, or `JobSpecTemplate`, including CRDs (https://github.com/sigstore/cosign/pull/697) | |||
* Added shell auto-completion support (Clutch collab from @erkanzileli, @passcod, and @Dentrax! https://github.com/sigstore/cosign/pull/836) | |||
* `cosign` has generated Markdown docs available in the `doc/` directory (https://github.com/sigstore/cosign/pull/839) | |||
* Added support for verifying with secrets from a Gitlab project (https://github.com/sigstore/cosign/pull/934) | |||
* Added support for verifying with secrets from a GitLab project (https://github.com/sigstore/cosign/pull/934) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Brand
@@ -412,7 +412,7 @@ See [#254](https://github.com/sigstore/cosign/issues/254) for more info. | |||
* Dan Lorenc | |||
* Priya Wadhwa | |||
* Ivan Font | |||
* Depandabot! | |||
* Dependabot! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Brand
@@ -4,7 +4,7 @@ | |||
|
|||
# asraa | |||
# bobcallaway | |||
# dekakgaijin | |||
# dekkagaijin |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@@ -66,7 +66,7 @@ These can be supplied on the command line with the `--identity-token` flag. | |||
The `audiences` field must contain `sigstore`. | |||
|
|||
`cosign` also has support for detecting some of these automated environments | |||
and producing an identity token. Currently this supports Google and Github. | |||
and producing an identity token. Currently this supports Google and GitHub. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
brand
@@ -55,7 +55,7 @@ func TestValidKey(t *testing.T) { | |||
t.Errorf("Error adding public key") | |||
} | |||
if _, err := root.ValidKey(publicKey, "root"); err != nil { | |||
t.Errorf("Error checking key validit %s", err) | |||
t.Errorf("Error checking key validity %s", err) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Test
type attache struct { | ||
type attached struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'd be tempted to use attachment
but I didn't want to have to figure out if golang would scream at me.
I'm not entirely certain what this object is.
@@ -7,7 +7,7 @@ doesn't fit well into other types. | |||
The format for this is defined as follows: | |||
|
|||
`data`: Raw data to place in the attestation. This is a base64-encoded string of bytes. | |||
`timestamp`: The timestamp the attestion was generated at in the RFC3339 format in the UTC timezone. | |||
`timestamp`: The timestamp the attestation was generated at in the RFC3339 format in the UTC timezone. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
user facing doc
"annotatons": { | ||
"annotations": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Bad example?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The one nit about digest-able, otherwise this lgtm!
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Signed-off-by: Josh Soref <[email protected]>
Summary
This PR corrects misspellings identified by the check-spelling action.
The misspellings have been reported at jsoref@b446970#commitcomment-62396680
The action reports that the changes in this PR would make it happy: jsoref@2872d9c
Note: this PR does not include the action. If you're interested in running a spell check on every PR and push, that can be offered separately.
Ticket Link
Fixes
Release Note