Skip to content

Commit cacd913

Browse files
committed
fix GitHub and GitLab spelling to a correct one
Signed-off-by: George Gaál <[email protected]>
1 parent 5cf11a5 commit cacd913

20 files changed

+41
-41
lines changed

docs/ce/azure-specific/azure.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Click "Go to Resource"; go to Access keys (on the lefthand side)
1414

1515
Click "show" on the connection string. Copy and save it securely; it will be needed later in this guide.
1616

17-
## 2\. Add Azure keys to Github Actions Secrets
17+
## 2\. Add Azure keys to GitHub Actions Secrets
1818

1919
### In Azure
2020

@@ -32,7 +32,7 @@ Go to Certificates and Secrets. Click New Client Secret. Give it a name; click A
3232

3333
Go to **subscription** in the portal and select your subscription ID, select **Access Control (IAM)** and **Add** the **Role assignment**, **Contributor** to your Service Principal. Take note of your Subscription ID value
3434

35-
### In Github
35+
### In GitHub
3636

3737
- Go to Settings → Secrets and Variables
3838

docs/ce/gcp/federated-oidc-access.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ gcloud iam workload-identity-pools create github-wif-pool --location="global" --
1515

1616
## 2\. Create a Workload Identity Provider
1717

18-
A Workload Identity Provider links an external identity like Github with your Google Cloud account. This lets IAM use tokens from external providers to authorize access to Google Cloud resources.
18+
A Workload Identity Provider links an external identity like GitHub with your Google Cloud account. This lets IAM use tokens from external providers to authorize access to Google Cloud resources.
1919

2020
```
2121
gcloud iam workload-identity-pools providers create-oidc githubwif \
@@ -27,7 +27,7 @@ gcloud iam workload-identity-pools providers create-oidc githubwif \
2727

2828
## 3\. Create a Service Account and bind policies
2929

30-
A service account with relevant permissions will be impersonated by WIF. This allows Github action to impersonate the service account and get a token.
30+
A service account with relevant permissions will be impersonated by WIF. This allows GitHub action to impersonate the service account and get a token.
3131

3232
```
3333
gcloud iam service-accounts create test-wif \
@@ -43,7 +43,7 @@ gcloud iam service-accounts add-iam-policy-binding [email protected]
4343
--member="principalSet://iam.googleapis.com/projects//locations/global/workloadIdentityPools/github-wif-pool/attribute.repository/PradeepSingh1988/gcp-wif"
4444
```
4545

46-
## 4\. Add secrets to Github
46+
## 4\. Add secrets to GitHub
4747

4848
Create 2 secrets in your Action Secrets with the following names:
4949

docs/ce/gcp/setting-up-gcp-+-gh-actions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Let's create our first pull request with a change and see this in action:
1919

2020
![](images/configuration/2.webp)
2121

22-
4. Add environment variables into your Github Action Secrets (cloud keys are a requirement since digger needs to connect to your account for coordinating locks). Use[ this guide](https://developers.google.com/workspace/guides/create-credentials) to get the value for it:
22+
4. Add environment variables into your GitHub Action Secrets (cloud keys are a requirement since digger needs to connect to your account for coordinating locks). Use[ this guide](https://developers.google.com/workspace/guides/create-credentials) to get the value for it:
2323

2424
![](/images/gcp/1.png)
2525

docs/ce/getting-started/github-actions-+-aws.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: "Github Actions + AWS"
2+
title: "GitHub Actions + AWS"
33
---
44

5-
In this tutorial, you will set up Digger to automate terraform pull requests using Github Actions and AWS
5+
In this tutorial, you will set up Digger to automate terraform pull requests using GitHub Actions and AWS
66

77
# Prerequisites
88

@@ -34,7 +34,7 @@ projects:
3434
dir: prod
3535
```
3636

37-
# Create Github Actions workflow file
37+
# Create GitHub Actions workflow file
3838

3939
Place it at `.github/workflows/digger_workflow.yml` (name is important!)
4040

docs/ce/getting-started/github-actions-and-gcp.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
title: "Github Actions + GCP"
2+
title: "GitHub Actions + GCP"
33
---
44

5-
In this tutorial, you will set up Digger to automate terraform pull requests using Github Actions and GCP.
5+
In this tutorial, you will set up Digger to automate terraform pull requests using GitHub Actions and GCP.
66

77
# Prerequisites
88

@@ -33,7 +33,7 @@ projects:
3333
dir: prod
3434
```
3535

36-
# Create Github Actions workflow file
36+
# Create GitHub Actions workflow file
3737

3838
Place it at `.github/workflows/digger_workflow.yml` (name is important!)
3939

@@ -87,7 +87,7 @@ jobs:
8787

8888
This file defines a workflow with 5 steps:
8989

90-
- Checkout repository using Github's official [Checkout action](https://github.com/actions/checkout)
90+
- Checkout repository using GitHub's official [Checkout action](https://github.com/actions/checkout)
9191
- Authenticate into GCP using Google's official [Auth action](https://github.com/google-github-actions/auth). Note the `create_credentials_file: true` option; without it, subsequent steps that rely [Application Default Credentials](https://cloud.google.com/docs/authentication/provide-credentials-adc) will not work.
9292
- Set up Google Cloud SDK for use in the subsequent steps via Google's official [Setup-gcloud action](https://github.com/google-github-actions/setup-gcloud)
9393
- Verify that GCP is configured correctly by running `gcloud info`

docs/ce/howto/store-plans-in-a-bucket.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: "Store plans in a Bucket"
33
---
44

5-
### Github
6-
Digger can use Github Artifacts to store `terraform plan` outputs. In order to enable it you can set the following argument in digger_workflow.yml:
5+
### GitHub
6+
Digger can use GitHub Artifacts to store `terraform plan` outputs. In order to enable it you can set the following argument in digger_workflow.yml:
77

88
```
99
upload-plan-destination: github

docs/ce/reference/digger.yml.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -246,7 +246,7 @@ Workflow configuration describes how to react to CI events. It has 3 sections:
246246

247247
A project in Digger corresponds to a directory containing Terraform code. Projects are treated as standalone independent entities with their own locks. Digger will not prevent you from running plan and apply in different projects simultaneously.
248248

249-
You can run plan / apply in a specified project by using the -p option in Github PR comment:
249+
You can run plan / apply in a specified project by using the -p option in GitHub PR comment:
250250

251251
```bash
252252
digger apply -p my-second-app

docs/ce/self-host/deploy-binary.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ This guide describes self-hosting the orchestrator backend as a binary aka "roll
1111
open source (Apache 2.0 license) ([repo on
1212
GitHub](https://github.com/diggerhq/digger)). You do not need a license or an
1313
account on Digger Cloud to self-host Digger CE. If you require
14-
enterprise-grade features like Github Enterprise Server support, SSO / SAML,
14+
enterprise-grade features like GitHub Enterprise Server support, SSO / SAML,
1515
multi-team / multi-org - [Talk to
1616
us](https://calendly.com/diggerdev/digger-open-source-terraform-cloud-alternativ-clone)
1717
</Note>

docs/ce/self-host/deploy-docker-compose.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Digger has 2 main components: the CLI that runs within your CI and an orchestrat
77
This guide describes self-hosting the orchestrator backend as a binary aka "roll your own". Self-hosting may come handy when using the cloud-based version of it is not an option (for example due to compliance requirements). More guides (docker, EC2, etc) are coming soon.
88

99
<Note>
10-
This guide is about self-hosting Digger Community Edition which is free and open source (Apache 2.0 license) ([repo on GitHub](https://github.com/diggerhq/digger)). You do not need a license or an account on Digger Cloud to self-host Digger CE. If you require enterprise-grade features like Github Enterprise Server support, SSO / SAML, multi-team / multi-org - [Talk to us](https://calendly.com/diggerdev/digger-open-source-terraform-cloud-alternativ-clone)
10+
This guide is about self-hosting Digger Community Edition which is free and open source (Apache 2.0 license) ([repo on GitHub](https://github.com/diggerhq/digger)). You do not need a license or an account on Digger Cloud to self-host Digger CE. If you require enterprise-grade features like GitHub Enterprise Server support, SSO / SAML, multi-team / multi-org - [Talk to us](https://calendly.com/diggerdev/digger-open-source-terraform-cloud-alternativ-clone)
1111
</Note>
1212

1313
# Prerequisites

docs/ce/self-host/deploy-docker.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Digger has 2 main components: the CLI that runs within your CI and an orchestrat
77
This guide describes self-hosting the orchestrator backend as a binary aka "roll your own". Self-hosting may come handy when using the cloud-based version of it is not an option (for example due to compliance requirements). More guides (docker, EC2, etc) are coming soon.
88

99
<Note>
10-
This guide is about self-hosting Digger Community Edition which is free and open source (Apache 2.0 license) ([repo on GitHub](https://github.com/diggerhq/digger)). You do not need a license or an account on Digger Cloud to self-host Digger CE. If you require enterprise-grade features like Github Enterprise Server support, SSO / SAML, multi-team / multi-org - [Talk to us](https://calendly.com/diggerdev/digger-open-source-terraform-cloud-alternativ-clone)
10+
This guide is about self-hosting Digger Community Edition which is free and open source (Apache 2.0 license) ([repo on GitHub](https://github.com/diggerhq/digger)). You do not need a license or an account on Digger Cloud to self-host Digger CE. If you require enterprise-grade features like GitHub Enterprise Server support, SSO / SAML, multi-team / multi-org - [Talk to us](https://calendly.com/diggerdev/digger-open-source-terraform-cloud-alternativ-clone)
1111
</Note>
1212

1313
# Prerequisites

0 commit comments

Comments
 (0)