зеркало из https://github.com/github/docs.git
Коммит
70cd490de0
|
@ -14,7 +14,7 @@ versions:
|
|||
|
||||
{% data reusables.actions.jobs.section-assigning-permissions-to-jobs %}
|
||||
|
||||
## Defining access for the `GITHUB_TOKEN` scopes
|
||||
## Defining access for the `GITHUB_TOKEN` permissions
|
||||
|
||||
{% data reusables.actions.github-token-available-permissions %}
|
||||
|
||||
|
|
|
@ -52,6 +52,7 @@ The trial lasts for **{% data reusables.enterprise.ghec-trial-length %} days** a
|
|||
* {% data variables.product.prodname_sponsors %}
|
||||
* Paid {% data variables.product.prodname_marketplace %} apps
|
||||
* {% data variables.product.prodname_github_connect %}
|
||||
* {% data variables.large_files.product_name_long %}
|
||||
* For {% data variables.product.prodname_actions %}, increased minutes, job concurrency, and {% data variables.actions.hosted_runner %}s
|
||||
|
||||
If you invite an existing organization into your trial enterprise, **all of these features will be disabled**. If you remove the organization from the enterprise, the features will be re-enabled.
|
||||
|
|
|
@ -40,8 +40,6 @@ All {% data variables.product.prodname_pages %} sites, including sites that are
|
|||
|
||||
When you set or change your custom domain in the Pages settings, an automatic DNS check begins. This check determines if your DNS settings are configured to allow {% data variables.product.prodname_dotcom %} to obtain a certificate automatically. If the check is successful, {% data variables.product.prodname_dotcom %} queues a job to request a TLS certificate from [Let's Encrypt](https://letsencrypt.org/). On receiving a valid certificate, {% data variables.product.prodname_dotcom %} automatically uploads it to the servers that handle TLS termination for Pages. When this process completes successfully, a check mark is displayed beside your custom domain name.
|
||||
|
||||
Please note that your {% data variables.product.prodname_pages %} site must be publicly available for a Let's Encrypt certificate to be issued. Once the certificate has been issued you may revert the site to private.
|
||||
|
||||
The process may take some time. If the process has not completed several minutes after you clicked **Save**, try clicking **Remove** next to your custom domain name. Retype the domain name and click **Save** again. This will cancel and restart the provisioning process.
|
||||
|
||||
## Resolving problems with mixed content
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
You can define the access that the `GITHUB_TOKEN` will permit by specifying `read`, `write`, or `none` as the value of the available scopes within the `permissions` key.
|
||||
You can define the access that the `GITHUB_TOKEN` will permit by specifying `read`, `write`, or `none` as the value of the available permissions within the `permissions` key.
|
||||
|
||||
```yaml
|
||||
permissions:
|
||||
|
@ -17,9 +17,9 @@ permissions:
|
|||
statuses: read|write|none
|
||||
```
|
||||
|
||||
If you specify the access for any of these scopes, all of those that are not specified are set to `none`.
|
||||
If you specify the access for any of these permissions, all of those that are not specified are set to `none`.
|
||||
|
||||
You can use the following syntax to define one of `read-all` or `write-all` access for all of the available scopes:
|
||||
You can use the following syntax to define one of `read-all` or `write-all` access for all of the available permissions:
|
||||
|
||||
```yaml
|
||||
permissions: read-all
|
||||
|
@ -29,7 +29,7 @@ permissions: read-all
|
|||
permissions: write-all
|
||||
```
|
||||
|
||||
You can use the following syntax to disable permissions for all of the available scopes:
|
||||
You can use the following syntax to disable permissions for all of the available permissions:
|
||||
|
||||
```yaml
|
||||
permissions: {}
|
||||
|
|
|
@ -1 +1 @@
|
|||
The `GITHUB_TOKEN` secret is set to an access token for the repository each time a job in a workflow begins. You should set the permissions for this access token in the workflow file to grant read access for the `contents` scope and write access for the `packages` scope. For more information, see "[AUTOTITLE](/actions/security-guides/automatic-token-authentication)."
|
||||
The `GITHUB_TOKEN` secret is set to an access token for the repository each time a job in a workflow begins. You should set the permissions for this access token in the workflow file to grant read access for the `contents` permission and write access for the `packages` permission. For more information, see "[AUTOTITLE](/actions/security-guides/automatic-token-authentication)."
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
For each of the available scopes, shown in the table below, you can assign one of the permissions: `read`, `write`, or `none`. If you specify the access for any of these scopes, all of those that are not specified are set to `none`.
|
||||
For each of the available permissions, shown in the table below, you can assign one of the access levels: `read`, `write`, or `none`. `write` includes `read`. If you specify the access for any of these permissions, all of those that are not specified are set to `none`.
|
||||
|
||||
Available scopes and details of what each allows an action to do:
|
||||
Available permissions and details of what each allows an action to do:
|
||||
|
||||
| Scope | Allows an action using `GITHUB_TOKEN` to |
|
||||
| Permission | Allows an action using `GITHUB_TOKEN` to |
|
||||
| --- | --- |
|
||||
| `actions` | Work with GitHub Actions. For example, `actions: write` permits an action to cancel a workflow run. For more information, see "[AUTOTITLE](/rest/overview/permissions-required-for-github-apps?apiVersion=2022-11-28#repository-permissions-for-actions)." |
|
||||
{% ifversion artifact-attestations %}| `attestations` | Work with artifact attestations. For example, `attestations: write` permits an action to generate an artifact attestation for a build. For more information, see "[AUTOTITLE](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds)" |{% endif %}
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
This example shows permissions being set for the `GITHUB_TOKEN` that will only apply to the job named `stale`. Write access is granted for the `issues` and `pull-requests` scopes. All other scopes will have no access.
|
||||
This example shows permissions being set for the `GITHUB_TOKEN` that will only apply to the job named `stale`. Write access is granted for the `issues` and `pull-requests` permissions. All other permissions will have no access.
|
||||
|
||||
```yaml
|
||||
jobs:
|
||||
|
|
|
@ -1 +1 @@
|
|||
1. Under "Workflow permissions", choose whether you want the `GITHUB_TOKEN` to have read and write access for all scopes (the permissive setting), or just read access for the `contents` {% ifversion actions-default-workflow-permissions-restrictive %}and `packages` scopes{% else %}scope{% endif %} (the restricted setting).
|
||||
1. Under "Workflow permissions", choose whether you want the `GITHUB_TOKEN` to have read and write access for all permissions (the permissive setting), or just read access for the `contents` {% ifversion actions-default-workflow-permissions-restrictive %}and `packages` permissions{% else %}permission{% endif %} (the restricted setting).
|
||||
|
|
Загрузка…
Ссылка в новой задаче