GitXplorerGitXplorer
k

setup-git-cliff

public
3 stars
3 forks
4 issues

Commits

List of commits on branch main.
Verified
a46ec217455e4ece86baf02c796619d523388915

ci(sync-files): update sync settings (#80)

kkenji-miyake committed a year ago
Verified
524db824308d6e69177d37023133906d34d4d142

chore: sync files (#76)

kkenji-miyake-bot[bot] committed a year ago
Verified
b5607db169be76b1a25e458789137f269ae91b4c

ci(sync-files): fix sync settings (#75)

kkenji-miyake committed a year ago
Verified
116caa96a06ee61cfef62b22514202d111f8cb34

docs: update to v2 (#74)

kkenji-miyake committed a year ago
Verified
bf1bcc223a0ca7b92b650448fdebcbc802f0ea79

ci(pre-commit): autoupdate (#63)

ppre-commit-ci[bot] committed a year ago
Verified
e650bc7c88de58a90967751e9543153fdd74cb4f

chore: update npm dependencies (#66)

kkenji-miyake-bot[bot] committed a year ago

README

The README file for this repository.

setup-git-cliff

This action sets up orhun/git-cliff.

Usage

jobs:
  test:
    runs-on: ubuntu-latest
    steps:
      - name: Check out repository
        uses: actions/checkout@v3

      - name: Set up git-cliff
        uses: kenji-miyake/setup-git-cliff@v2

      - name: Run git-cliff
        run: |
          git cliff

Action inputs and outputs

Refer to action.yaml.

Skip authentication

By default, this action will use the ${{ github.token }} context variable to authenticate to GitHub.

This could result in a Bad credentials exception if the action is running on a self-hosted runner connected to a GitHub Enterprise Server instance.

To avoid this, you can explicitly set the token to null to perform an unauthenticated request:

- name: Set up git-cliff
  uses: kenji-miyake/setup-git-cliff@v2
  with:
    token: null