Skip to content

Commit 5a162f4

Browse files
authored
Merge pull request #370 from ianlewis/368-bug-textlint-skippatterns-match-parts-of-words
chore: fix spelling errors
2 parents 1f5d9e8 + ee37c66 commit 5a162f4

File tree

2 files changed

+44
-44
lines changed

2 files changed

+44
-44
lines changed

.textlintrc.yaml

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -21,37 +21,37 @@ rules:
2121
spelling:
2222
language: "en"
2323
skipPatterns:
24-
- "CHANGELOG"
25-
- "CODEOWNER"
26-
- "CLA"
27-
- "CLI"
28-
- "CVSS"
29-
- "DCO"
30-
- "PR"
31-
- "UI"
32-
- "YAML"
33-
- "Changelog"
34-
- "CodeQL"
35-
- "Dependabot"
36-
- "JavaScript"
37-
- "MacOS"
38-
- "Makefile"
39-
- "Node.js"
40-
- "OpenSSF"
41-
- "TODO"
42-
- "e2e"
43-
- "/[Ff]ormatter/"
44-
- "/[Ll]inter/"
45-
- "/[Pp]re/"
46-
- "/[Rr]ebase/"
47-
- "/[Rr]eproducibility/"
48-
- "/[Rr]uleset/"
49-
- "/[Rr]untime/"
50-
- "/[Ss]exualized/"
51-
- "/[Ss]ocio-economic/"
52-
- "/[Uu]serspace/"
53-
- "/[Vv]endored/"
54-
- "/[Vv]irtualenv/"
55-
- "/v[0-9]+/"
56-
- "/[0-9]+/"
24+
- "/\\bCHANGELOG\\b/g"
25+
- "/\\bCODEOWNER\\b/g"
26+
- "/\\bCLA\\b/g"
27+
- "/\\bCLI\\b/g"
28+
- "/\\bCVSS\\b/g"
29+
- "/\\bDCO\\b/g"
30+
- "/\\bPRs?\\b/g"
31+
- "/\\bUI\\b/g"
32+
- "/\\bYAML\\b/g"
33+
- "/\\bChangelog\\b/g"
34+
- "/\\bCodeQL\\b/g"
35+
- "/\\bDependabot\\b/g"
36+
- "/\\bJavaScript\\b/g"
37+
- "/\\bMacOS\\b/g"
38+
- "/\\bMakefile\\b/g"
39+
- "/\\bNode.js\\b/g"
40+
- "/\\bOpenSSF\\b/g"
41+
- "/\\bTODOs?\\b/g"
42+
- "/\\be2e\\b/g"
43+
- "/\\b[Ff]ormatters?\\b/g"
44+
- "/\\b[Ll]inters?\\b/g"
45+
- "/\\b[Pp]ositivity\\b/g"
46+
- "/\\b[Pp]re\\b/g"
47+
- "/\\b[Rr]ebase\\b/g"
48+
- "/\\b[Rr]eproducibility\\b/g"
49+
- "/\\b[Rr]ulesets?\\b/g"
50+
- "/\\b[Rr]untimes?\\b/g"
51+
- "/\\b[Ss]exualized\\b/g"
52+
- "/\\b[Ss]ocio-economic\\b/g"
53+
- "/\\b[Uu]serspace\\b/g"
54+
- "/\\b[Vv]endored\\b/g"
55+
- "/\\b[Vv]irtualenv\\b/g"
56+
- "/\\bv?[0-9]+\\b/g"
5757
- ":white_check_mark:"

SECURITY.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ This document describes the security policy that applies to this repository.
77
Security updates for this repository will be applied the most recent major
88
version and its minor versions.
99

10-
For example if 2.2.0 is the latest version:
10+
For example, if 2.2.0 is the latest version:
1111

1212
| Version | Supported |
1313
| ------- | ------------------ |
@@ -17,7 +17,7 @@ For example if 2.2.0 is the latest version:
1717
| < 2.0.0 | :x: |
1818

1919
However, if the repository has not made a stable release (e.g. the latest
20-
release is < v1.0.0) then only the most latest minor version will be patched.
20+
release is < v1.0.0) then only the latest minor version will be patched.
2121

2222
## Security Release & Disclosure Process
2323

@@ -46,25 +46,25 @@ It is reasonable to delay disclosure when the bug or the fix is not yet fully
4646
understood, the solution is not well-tested, or for vendor coordination. The
4747
time frame for disclosure is from immediate (especially if it's already publicly
4848
known) to several weeks. For a vulnerability with a straightforward mitigation,
49-
we expect report date to disclosure date to be on the order of 14 days.
49+
we expect the report date to disclosure date to be on the order of 14 days.
5050

5151
If you know of a publicly disclosed security vulnerability please IMMEDIATELY
5252
[report the vulnerability](#reporting-a-vulnerability) so that the patch,
5353
release, and communication process can be started as early as possible.
5454

55-
If the reporter does not go through the private disclosure process, the fix and
55+
If the reporter does not go through the private disclosure process, the fix, and
5656
release process will proceed as swiftly as possible. In extreme cases you can
5757
ask GitHub to delete the issue but this generally isn't necessary and is
5858
unlikely to make a public disclosure less damaging.
5959

6060
### Security Releases
6161

62-
Once a fix is available it will be released, the GitHub Security Advisory made
63-
public and announced via project communication channels. Security releases
64-
will clearly marked as a security release and include information on which
65-
vulnerabilities were fixed. As much as possible this announcement should be
66-
actionable, and include any mitigating steps users can take prior to upgrading
67-
to a fixed version.
62+
Once a fix is available, it will be released, the GitHub Security Advisory made
63+
public, and the fix release announced via project communication channels.
64+
Security releases will be clearly marked as a security release and include
65+
information on which vulnerabilities were fixed. As much as possible this
66+
announcement should be actionable, and include any mitigating steps users can
67+
take prior to upgrading to a fixed version.
6868

6969
Fixes will be applied in patch releases to all [supported
7070
versions](#supported-versions) and all fixed vulnerabilities will be noted in
@@ -79,7 +79,7 @@ Vulnerability severity is evaluated on a case-by-case basis, guided by [CVSS
7979

8080
We aim to reduce the number of security issues through several general
8181
security-conscious development practices including the use of unit-tests,
82-
end-to-end (e2e) tests, static and dynamic analysis tools, and use of
82+
end-to-end (e2e) tests, static, and dynamic analysis tools, and use of
8383
memory-safe languages.
8484

8585
We aim to fix issues discovered by analysis tools as quickly as possible. We

0 commit comments

Comments
 (0)