Skip to content
This repository was archived by the owner on Jun 3, 2025. It is now read-only.

Commit 544abd7

Browse files
authored
Fix typo (#1719)
* Fix typo * Another typo
1 parent a42adb9 commit 544abd7

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -395,7 +395,7 @@ as a remote image destination:
395395
### Caching
396396

397397
#### Caching Layers
398-
kaniko can cache layers created by `RUN` and `Copy` (configured by flag `--cache-copy-layers`) commands in a remote repository.
398+
kaniko can cache layers created by `RUN` and `COPY` (configured by flag `--cache-copy-layers`) commands in a remote repository.
399399
Before executing a command, kaniko checks the cache for the layer.
400400
If it exists, kaniko will pull and extract the cached layer instead of executing the command.
401401
If not, kaniko will execute the command and then push the newly created layer to the cache.
@@ -471,7 +471,7 @@ If you have enabled Workload Indentity on your GKE cluster then you can use the
471471

472472
Learn more on how to [enable](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#enable_on_cluster) and [migrate existing apps](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#migrate_applications_to) to workload identity.
473473

474-
To authenticate using workload identity you need to run the kaniko pod using the Kubernetes Service Account (KSA) bound to Google Service Account (GSA) which as `Storage.Admin` permissions to push images to Google Container registry.
474+
To authenticate using workload identity you need to run the kaniko pod using the Kubernetes Service Account (KSA) bound to Google Service Account (GSA) which has `Storage.Admin` permissions to push images to Google Container registry.
475475

476476
Please follow the detailed steps [here](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity#authenticating_to) to create a Kubernetes Service Account, Google Service Account and create an IAM policy binding between the two to allow the Kubernetes Service account to act as the Google service account.
477477

0 commit comments

Comments
 (0)