Skip to content

Commit e1d0c3b

Browse files
author
Peter Bengtsson
authored
Correct internal links with imperfect quotation marks (content/actions) (github#35044)
1 parent a5bd38b commit e1d0c3b

File tree

12 files changed

+32
-32
lines changed

12 files changed

+32
-32
lines changed

content/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-personal-account-settings/integrating-jira-with-your-personal-projects.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,5 +24,5 @@ shortTitle: Integrate Jira with projects
2424

2525
## Further reading
2626

27-
- ["Integrating Jira with your organization project board"](/organizations/managing-organization-settings/integrating-jira-with-your-organization-project-board)
27+
- "[AUTOTITLE](/organizations/managing-organization-settings/integrating-jira-with-your-organization-project-board)"
2828
- <a href="https://confluence.atlassian.com/adminjiracloud/connect-jira-cloud-to-github-814188429.html" data-proofer-ignore>Connect Jira Cloud to GitHub</a> (Atlassian documentation)

content/actions/deployment/deploying-to-your-cloud-provider/deploying-to-amazon-elastic-container-service.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ On every new push to `main` in your {% data variables.product.company_short %} r
3030

3131
{% note %}
3232

33-
**Note**: {% data reusables.actions.about-oidc-short-overview %} and ["Configuring OpenID Connect in Amazon Web Services"](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services).
33+
**Note**: {% data reusables.actions.about-oidc-short-overview %} and "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services)."
3434

3535
{% endnote %}
3636

content/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -470,11 +470,11 @@ You can now update your YAML workflows to use OIDC access tokens instead of secr
470470

471471
To enable and configure OIDC for your specific cloud provider, see the following guides:
472472

473-
- ["Configuring OpenID Connect in Amazon Web Services"](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services)
474-
- ["Configuring OpenID Connect in Azure"](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure)
475-
- ["Configuring OpenID Connect in Google Cloud Platform"](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-google-cloud-platform)
476-
- ["Configuring OpenID Connect in Hashicorp Vault"](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-hashicorp-vault)
473+
- "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services)"
474+
- "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure)"
475+
- "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-google-cloud-platform)"
476+
- "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-hashicorp-vault)"
477477

478478
To enable and configure OIDC for another cloud provider, see the following guide:
479479

480-
- ["Configuring OpenID Connect in cloud providers"](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-cloud-providers)
480+
- "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-cloud-providers)"

content/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-azure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ topics:
1616

1717
## Overview
1818

19-
OpenID Connect (OIDC) allows your {% data variables.product.prodname_actions %} workflows to access resources in Azure, without needing to store the Azure credentials as long-lived {% data variables.product.prodname_dotcom %} secrets.
19+
OpenID Connect (OIDC) allows your {% data variables.product.prodname_actions %} workflows to access resources in Azure, without needing to store the Azure credentials as long-lived {% data variables.product.prodname_dotcom %} secrets.
2020

2121
This guide gives an overview of how to configure Azure to trust {% data variables.product.prodname_dotcom %}'s OIDC as a federated identity, and includes a workflow example for the [`azure/login`](https://github.com/Azure/login) action that uses tokens to authenticate to Azure and access resources.
2222

@@ -38,7 +38,7 @@ To configure the OIDC identity provider in Azure, you will need to perform the f
3838

3939
Additional guidance for configuring the identity provider:
4040

41-
- For security hardening, make sure you've reviewed ["Configuring the OIDC trust with the cloud"](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud). For an example, see ["Configuring the subject in your cloud provider"](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-subject-in-your-cloud-provider).
41+
- For security hardening, make sure you've reviewed "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud)." For an example, see "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-subject-in-your-cloud-provider)."
4242
- For the `audience` setting, `api://AzureADTokenExchange` is the recommended value, but you can also specify other values here.
4343

4444
## Updating your {% data variables.product.prodname_actions %} workflow
@@ -65,7 +65,7 @@ on: [push]
6565
permissions:
6666
id-token: write
6767
contents: read
68-
jobs:
68+
jobs:
6969
build-and-deploy:
7070
runs-on: ubuntu-latest
7171
steps:
@@ -75,7 +75,7 @@ jobs:
7575
client-id: ${{ secrets.AZURE_CLIENT_ID }}
7676
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
7777
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
78-
78+
7979
- name: 'Run az commands'
8080
run: |
8181
az account show

content/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-google-cloud-platform.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ topics:
1616

1717
## Overview
1818

19-
OpenID Connect (OIDC) allows your {% data variables.product.prodname_actions %} workflows to access resources in Google Cloud Platform (GCP), without needing to store the GCP credentials as long-lived {% data variables.product.prodname_dotcom %} secrets.
19+
OpenID Connect (OIDC) allows your {% data variables.product.prodname_actions %} workflows to access resources in Google Cloud Platform (GCP), without needing to store the GCP credentials as long-lived {% data variables.product.prodname_dotcom %} secrets.
2020

2121
This guide gives an overview of how to configure GCP to trust {% data variables.product.prodname_dotcom %}'s OIDC as a federated identity, and includes a workflow example for the [`google-github-actions/auth`](https://github.com/google-github-actions/auth) action that uses tokens to authenticate to GCP and access resources.
2222

@@ -32,11 +32,11 @@ To configure the OIDC identity provider in GCP, you will need to perform the fol
3232

3333
1. Create a new identity pool.
3434
2. Configure the mapping and add conditions.
35-
3. Connect the new pool to a service account.
35+
3. Connect the new pool to a service account.
3636

3737
Additional guidance for configuring the identity provider:
3838

39-
- For security hardening, make sure you've reviewed ["Configuring the OIDC trust with the cloud"](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud). For an example, see ["Configuring the subject in your cloud provider"](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-subject-in-your-cloud-provider).
39+
- For security hardening, make sure you've reviewed "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud)." For an example, see "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-subject-in-your-cloud-provider)."
4040
- For the service account to be available for configuration, it needs to be assigned to the `roles/iam.workloadIdentityUser` role. For more information, see [the GCP documentation](https://cloud.google.com/iam/docs/workload-identity-federation?_ga=2.114275588.-285296507.1634918453#conditions).
4141
- The Issuer URL to use: {% ifversion ghes %}`https://HOSTNAME/_services/token`{% else %}`https://token.actions.githubusercontent.com`{% endif %}
4242

content/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-hashicorp-vault.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,13 +32,13 @@ To use OIDC with HashiCorp Vault, you will need to add a trust configuration for
3232

3333
To configure your Vault server to accept JSON Web Tokens (JWT) for authentication:
3434

35-
1. Enable the JWT `auth` method, and use `write` to apply the configuration to your Vault.
35+
1. Enable the JWT `auth` method, and use `write` to apply the configuration to your Vault.
3636
For `oidc_discovery_url` and `bound_issuer` parameters, use {% ifversion ghes %}`https://HOSTNAME/_services/token`{% else %}`https://token.actions.githubusercontent.com`{% endif %}. These parameters allow the Vault server to verify the received JSON Web Tokens (JWT) during the authentication process.
3737

3838
```sh{:copy}
3939
vault auth enable jwt
4040
```
41-
41+
4242
```sh{:copy}
4343
vault write auth/jwt/config \
4444
bound_issuer="{% ifversion ghes %}https://HOSTNAME/_services/token{% else %}https://token.actions.githubusercontent.com{% endif %}" \
@@ -83,7 +83,7 @@ To configure your Vault server to accept JSON Web Tokens (JWT) for authenticatio
8383
- `ttl` defines the validity of the resulting access token.
8484
- Ensure that the `bound_claims` parameter is defined for your security requirements, and has at least one condition. Optionally, you can also set the `bound_subject` as well as the `bound_audiences` parameter.
8585
- To check arbitrary claims in the received JWT payload, the `bound_claims` parameter contains a set of claims and their required values. In the above example, the role will accept any incoming authentication requests from the `repo-name` repository owned by the `user-or-org-name` account.
86-
- To see all the available claims supported by {% data variables.product.prodname_dotcom %}'s OIDC provider, see ["Configuring the OIDC trust with the cloud"](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud).
86+
- To see all the available claims supported by {% data variables.product.prodname_dotcom %}'s OIDC provider, see "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#configuring-the-oidc-trust-with-the-cloud)."
8787
8888
For more information, see the HashiCorp Vault [documentation](https://www.vaultproject.io/docs/auth/jwt).
8989
@@ -143,7 +143,7 @@ jobs:
143143
namespace: <Vault Namespace - HCP Vault and Vault Enterprise only>
144144
role: <Role name>
145145
secrets: <Secret-Path>
146-
146+
147147
- name: Use secret from Vault
148148
run: |
149149
# This step has access to the secret retrieved above; see hashicorp/vault-action for more details.

content/actions/hosting-your-own-runners/running-scripts-before-or-after-a-job.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ The following scripting languages are supported:
2929
Your custom scripts can use the following features:
3030

3131
- **Variables**: Scripts have access to the default variables. The full webhook event payload can be found in `GITHUB_EVENT_PATH`. For more information, see "[AUTOTITLE](/actions/learn-github-actions/variables#default-environment-variables)."
32-
- **Workflow commands**: Scripts can use workflow commands. For more information, see ["Workflow commands for {% data variables.product.prodname_actions %}"](/actions/using-workflows/workflow-commands-for-github-actions){% ifversion actions-save-state-set-output-envs %}{% else %}, with the exception of `save-state` and `set-output`, which are not supported by these scripts{% endif %}. Scripts can also use environment files. For more information, see [Environment files](/actions/using-workflows/workflow-commands-for-github-actions#environment-files).
32+
- **Workflow commands**: Scripts can use workflow commands. For more information, see "[AUTOTITLE](/actions/using-workflows/workflow-commands-for-github-actions)"{% ifversion actions-save-state-set-output-envs %}{% else %}, with the exception of `save-state` and `set-output`, which are not supported by these scripts{% endif %}. Scripts can also use environment files. For more information, see [Environment files](/actions/using-workflows/workflow-commands-for-github-actions#environment-files).
3333

3434
Your script files must use a file extension for the relevant language, such as `.sh` or `.ps1`, in order to run successfully.
3535

content/actions/managing-workflow-runs/re-running-workflows-and-jobs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ gh run rerun --job JOB_ID --debug
156156
{% ifversion fpt or ghes > 3.4 or ghae or ghec %}
157157
## Reviewing previous workflow runs
158158

159-
You can view the results from your previous attempts at running a workflow. You can also view previous workflow runs using the API. For more information, see ["Get a workflow run"](/rest/actions#get-a-workflow-run).
159+
You can view the results from your previous attempts at running a workflow. You can also view previous workflow runs using the API. For more information, see "[AUTOTITLE](/rest/actions#get-a-workflow-run)."
160160

161161
{% data reusables.repositories.navigate-to-repo %}
162162
{% data reusables.repositories.actions-tab %}

content/actions/migrating-to-github-actions/migrating-from-travis-ci-to-github-actions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ To give you control over when CI tasks are executed, a {% data variables.product
4141

4242
### Using YAML syntax
4343

44-
Travis CI and {% data variables.product.prodname_actions %} both use YAML to create jobs and workflows, and these files are stored in the code's repository. For more information on how {% data variables.product.prodname_actions %} uses YAML, see ["Creating a workflow file](/actions/learn-github-actions/understanding-github-actions#create-an-example-workflow)."
44+
Travis CI and {% data variables.product.prodname_actions %} both use YAML to create jobs and workflows, and these files are stored in the code's repository. For more information on how {% data variables.product.prodname_actions %} uses YAML, see "[AUTOTITLE](/actions/learn-github-actions/understanding-github-actions#create-an-example-workflow)."
4545

4646
### Custom variables
4747

@@ -58,7 +58,7 @@ Travis CI can use `stages` to run jobs in parallel. Similarly, {% data variables
5858
### Status badges
5959

6060
Travis CI and {% data variables.product.prodname_actions %} both support status badges, which let you indicate whether a build is passing or failing.
61-
For more information, see ["Adding a workflow status badge to your repository](/actions/monitoring-and-troubleshooting-workflows/adding-a-workflow-status-badge)."
61+
For more information, see "[AUTOTITLE](/actions/monitoring-and-troubleshooting-workflows/adding-a-workflow-status-badge)."
6262

6363
### Using a matrix
6464

@@ -196,7 +196,7 @@ When migrating from Travis CI, consider the following key features in {% data va
196196

197197
### Hosting your own runners
198198

199-
If your jobs require specific hardware or software, {% data variables.product.prodname_actions %} allows you to host your own runners and send your jobs to them for processing. {% data variables.product.prodname_actions %} also lets you use policies to control how these runners are accessed, granting access at the organization or repository level. For more information, see ["Hosting your own runners](/actions/hosting-your-own-runners)."
199+
If your jobs require specific hardware or software, {% data variables.product.prodname_actions %} allows you to host your own runners and send your jobs to them for processing. {% data variables.product.prodname_actions %} also lets you use policies to control how these runners are accessed, granting access at the organization or repository level. For more information, see "[AUTOTITLE](/actions/hosting-your-own-runners)."
200200

201201
{% ifversion fpt or ghec %}
202202

content/actions/monitoring-and-troubleshooting-workflows/enabling-debug-logging.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,4 +43,4 @@ Runner diagnostic logging provides additional log files that contain information
4343
Step debug logging increases the verbosity of a job's logs during and after a job's execution.
4444

4545
1. To enable step debug logging, set the following secret{% ifversion actions-configuration-variables %} or variable{% endif %} in the repository that contains the workflow: `ACTIONS_STEP_DEBUG` to `true`.{% ifversion actions-configuration-variables %} If both the secret and variable are set, the value of the secret takes precedence over the variable.{% endif %}
46-
1. After setting the secret{% ifversion actions-configuration-variables %} or variable{% endif %}, more debug events are shown in the step logs. For more information, see ["Viewing logs to diagnose failures"](/actions/monitoring-and-troubleshooting-workflows/using-workflow-run-logs#viewing-logs-to-diagnose-failures).
46+
1. After setting the secret{% ifversion actions-configuration-variables %} or variable{% endif %}, more debug events are shown in the step logs. For more information, see "[AUTOTITLE](/actions/monitoring-and-troubleshooting-workflows/using-workflow-run-logs#viewing-logs-to-diagnose-failures)."

0 commit comments

Comments
 (0)