You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: translations/es-ES/content/actions/deployment/deploying-xcode-applications/index.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,8 @@ shortTitle: Desplegar aplicaciones de Xcode
4
4
intro: 'Puedes firmar apps de Xcode dentro de tu flujo de integración continua (IC) si instalas un certificado de firma de código de Apple en los ejecutores de {% data variables.product.prodname_actions %}.'
Copy file name to clipboardExpand all lines: translations/es-ES/content/actions/deployment/targeting-different-environments/index.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,8 @@ shortTitle: Apuntar a ambientes diferentes
4
4
intro: Puedes configurr ambientes con reglas de protección y secretos. Un job de flujo de trabajo que referencie a un ambiente debe seguir cualquier regla de protección para el ambiente antes de ejecutar o acceder a los secretos de dicho ambiente.
Copy file name to clipboardExpand all lines: translations/es-ES/content/actions/hosting-your-own-runners/about-self-hosted-runners.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,8 @@ For more information about installing and using self-hosted runners, see "[Addin
51
51
- Can use cloud services or local machines that you already pay for.
52
52
- Are customizable to your hardware, operating system, software, and security requirements.
53
53
- Don't need to have a clean instance for every job execution.
54
-
- Are free to use with {% data variables.product.prodname_actions %}, but you are responsible for the cost of maintaining your runner machines.
54
+
- Are free to use with {% data variables.product.prodname_actions %}, but you are responsible for the cost of maintaining your runner machines.{% ifversion ghec or ghes or ghae %}
55
+
- Can be organized into groups to restrict access to specific {% if restrict-groups-to-workflows %}workflows, {% endif %}organizations and repositories. For more information, see "[Managing access to self-hosted runners using groups](/actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups)."{% endif %}
In addition, your workflow may require access to other network resources. For example, if your workflow installs packages or publishes containers to {% data variables.product.prodname_dotcom %} Packages, then the runner will also require access to those network endpoints.
188
189
189
-
If you use an IP address allow list for your {% data variables.product.prodname_dotcom %} organization or enterprise account, you must add your self-hosted runner's IP address to the allow list. For more information, see "[Managing allowed IP addresses for your organization](/organizations/keeping-your-organization-secure/managing-allowed-ip-addresses-for-your-organization#using-github-actions-with-an-ip-allow-list)" or "[Enforcing policies for security settings in your enterprise](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise)".
190
+
If you use an IP address allow list for your {% data variables.product.prodname_dotcom %} organization or enterprise account, you must add your self-hosted runner's IP address to the allow list. For more information, see "[Managing allowed IP addresses for your organization](/{% ifversion fpt %}enterprise-cloud@latest/{% endif %}/organizations/keeping-your-organization-secure/managing-allowed-ip-addresses-for-your-organization#using-github-actions-with-an-ip-allow-list)" or "[Enforcing policies for security settings in your enterprise](/{% ifversion fpt %}enterprise-cloud@latest/{% endif %}admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise){% ifversion fpt %}" in the {% data variables.product.prodname_ghe_cloud %} documentation.{% else %}."{% endif %}
Copy file name to clipboardExpand all lines: translations/es-ES/content/actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups.md
+44-7Lines changed: 44 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,11 +9,12 @@ versions:
9
9
ghae: '*'
10
10
ghec: '*'
11
11
type: tutorial
12
-
shortTitle: Administrar grupos de ejecutores
12
+
shortTitle: Manage access to runners
13
13
---
14
14
15
15
{% data reusables.actions.enterprise-beta %}
16
16
{% data reusables.actions.enterprise-github-hosted-runners %}
17
+
{% data reusables.actions.restrict-runner-workflow-beta %}
17
18
18
19
## Acerca de los grupos de ejecutores auto-hospedados
19
20
@@ -31,9 +32,10 @@ Si utilizas
31
32
{% endif %}
32
33
33
34
{% ifversion ghec or ghes or ghae %}
34
-
Los grupos de ejecutores auto-hospedados se utilizan para controlar el acceso a los ejecutores auto-hospedados a nivel de empresas y organizaciones. Los administradores de la empresa pueden configurar políticas de acceso que controlan qué organizaciones en la empresa tienen acceso al grupo de ejecutores. Los administradores de las organizaciones pueden configurar políticas de acceso que controlen qué repositorios en una organización tienen acceso al grupo de ejecutores.
35
+
Los grupos de ejecutores auto-hospedados se utilizan para controlar el acceso a los ejecutores auto-hospedados a nivel de empresas y organizaciones. Enterprise owners can configure access policies that control which organizations
36
+
{% if restrict-groups-to-workflows %}and workflows {% endif %}in an enterprise have access to the runner group. Organization owners can configure access policies that control which repositories{% if restrict-groups-to-workflows %} and workflows{% endif %} in an organization have access to the runner group.
35
37
36
-
Cuando un administrador de empresa otorga acceso a una organización para un grupo de ejecutores, los administradores de organización pueden ver que dicho grupo se lista en la configuración del ejecutor auto-hospedado de la organización. Los administradores de la organización pueden entonces asignar políticas de acceso adicionales para repositorios granulares en el grupo de ejecutores de la empresa.
38
+
When an enterprise owner grants an organization access to a runner group, organization owners can see the runner group listed in the organization's self-hosted runner settings. The organization owners can then assign additional granular repository{% if restrict-groups-to-workflows %} and workflow{% endif %} access policies to the enterprise runner group.
37
39
38
40
Cuando se crean nuevos ejecutores, se asignan automáticamente al grupo predeterminado. Los ejecutores solo pueden estar en un grupo a la vez. Puedes mover los ejecutores del grupo predeterminado a otro grupo. Para obtener más información, consulta la sección "[Mover un ejecutor auto-hospedado a un grupo](#moving-a-self-hosted-runner-to-a-group)".
39
41
@@ -43,13 +45,14 @@ Todas las organizaciones tienen un solo grupo predeterminado de ejecutores auto-
43
45
44
46
Los ejecutores auto-hospedados se asignan automáticamente al grupo predeterminado cuando se crean y solo pueden ser mimebros de un grupo a la vez. Puedes mover un ejecutor del grupo predeterminado a cualquier grupo que crees.
45
47
46
-
Cuando creas un grupo, debes elegir una política que defina qué repositorios tienen acceso al grupo ejecutor.
48
+
When creating a group, you must choose a policy that defines which repositories{% if restrict-groups-to-workflows %} and workflows{% endif %} have access to the runner group.
47
49
48
50
{% ifversion ghec or ghes > 3.3 or ghae-issue-5091 %}
49
51
{% data reusables.organizations.navigate-to-org %}
50
52
{% data reusables.organizations.org_settings %}
51
53
{% data reusables.actions.settings-sidebar-actions-runner-groups %}
52
54
1. En la sección de "Grupos de ejecutores", haz clic en **Grupo de ejecutores nuevo**.
55
+
1. Enter a name for your runner group.
53
56
{% data reusables.actions.runner-group-assign-policy-repo %}
54
57
55
58
{% warning %}
@@ -59,6 +62,7 @@ Cuando creas un grupo, debes elegir una política que defina qué repositorios t
59
62
Para obtener más información, consulta "[Acerca de los ejecutores autoalojados](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories)."
60
63
61
64
{% endwarning %}
65
+
{% data reusables.actions.runner-group-assign-policy-workflow %}{%- if restrict-groups-to-workflows %} Organization-owned runner groups cannot access workflows from a different organization in the enterprise; instead, you must create an enterprise-owned runner group.{% endif %}
62
66
{% data reusables.actions.self-hosted-runner-create-group %}
63
67
{% elsif ghae or ghes < 3.4 %}
64
68
{% data reusables.organizations.navigate-to-org %}
@@ -89,7 +93,7 @@ Cuando creas un grupo, debes elegir una política que defina qué repositorios t
89
93
90
94
## Crear un grupo de ejecutores auto-hospedados para una empresa
91
95
92
-
Las empresas pueden agregar sus ejecutores auto-hospedados a grupos para su administración de accesos. Las empresas pueden crear grupos de ejecutores auto-hospedados a los cuales puedan acceder organizaciones específicas en la cuenta empresarial. Los administradores de la organización pueden entonces asignar políticas de acceso adicionales para los repositorios granulares a estos grupos de ejecutores para las empresas. Para obtener más información sobre cómo crear un grupo de ejecutores auto-hospedados con la API de REST, consulta las terminales empresariales en la [API de REST de {% data variables.product.prodname_actions %}](/rest/reference/actions#self-hosted-runner-groups).
96
+
Las empresas pueden agregar sus ejecutores auto-hospedados a grupos para su administración de accesos. Enterprises can create groups of self-hosted runners that are accessible to specific organizations in the enterprise account{% if restrict-groups-to-workflows %} or to specific workflows{% endif %}. Organization owners can then assign additional granular repository{% if restrict-groups-to-workflows %} or workflow{% endif %} access policies to the enterprise runner groups. Para obtener más información sobre cómo crear un grupo de ejecutores auto-hospedados con la API de REST, consulta las terminales empresariales en la [API de REST de {% data variables.product.prodname_actions %}](/rest/reference/actions#self-hosted-runner-groups).
93
97
94
98
Los ejecutores auto-hospedados se asignan automáticamente al grupo predeterminado cuando se crean y solo pueden ser mimebros de un grupo a la vez. Puedes asignar el ejecutor a un grupo específico durante el proceso de registro o puedes moverlo después desde el grupo predeterminado a un grupo personalizado.
95
99
@@ -116,17 +120,21 @@ Cuando creas un grupo, debes elegir la política que defina qué organizaciones
116
120
117
121

118
122
{%- endif %}
123
+
{% data reusables.actions.runner-group-assign-policy-workflow %}
119
124
1. Da clic en **Guardar grupo** para crear el grupo y aplicar la política.
120
125
121
126
{% endif %}
122
127
123
128
## Cambiar la política de acceso de un grupo de ejecutores auto-hospedados
124
129
125
-
Puedes actualizar la política de acceso de un grupo ejecutor o renombrarlo.
130
+
For runner groups in an enterprise, you can change what organizations in the enterprise can access a runner group{% if restrict-groups-to-workflows %} or restrict what workflows a runner group can run{% endif %}. For runner groups in an organization, you can change what repositories in the organization can access a runner group{% if restrict-groups-to-workflows %} or restrict what workflows a runner group can run{% endif %}.
131
+
132
+
### Changing what organizations or repositories can access a runner group
133
+
126
134
{% ifversion fpt or ghec or ghes > 3.3 or ghae-issue-5091 %}
127
135
{% data reusables.actions.self-hosted-runner-groups-navigate-to-repo-org-enterprise %}
128
136
{% data reusables.actions.settings-sidebar-actions-runner-groups-selection %}
129
-
1.Modifica las opciones de acceso o cambia el nombre del grupo de ejecutores.
137
+
1.For runner groups in an enterprise, under **Organization access**, modify what organizations can access the runner group. For runner groups in an organization, under **Repository access**, modify what repositories can access the runner group.
130
138
131
139
{%- ifversion fpt or ghec or ghes %}
132
140
{% warning %}
@@ -143,6 +151,35 @@ Puedes actualizar la política de acceso de un grupo ejecutor o renombrarlo.
143
151
{% data reusables.actions.self-hosted-runner-configure-runner-group-access %}
144
152
{% endif %}
145
153
154
+
{% if restrict-groups-to-workflows %}
155
+
### Changing what workflows can access a runner group
156
+
You can configure a self-hosted runner group to run either selected workflows or all workflows. For example, you might use this setting to protect secrets that are stored on self-hosted runners or to standardize deployment workflows by restricting a runner group to run only a specific reusable workflow. This setting cannot be overridden if you are configuring an organization's runner group that was shared by an enterprise.
157
+
{% data reusables.actions.self-hosted-runner-groups-navigate-to-repo-org-enterprise %}
158
+
{% data reusables.actions.settings-sidebar-actions-runner-groups-selection %}
159
+
1. Under **Workflow access**, select the dropdown menu and click **Selected workflows**.
160
+
1. Da clic en {% octicon "gear" aria-label="the gear icon" %}.
161
+
1. Enter a comma separated list of the workflows that can access the runner group. Use the full path, including the repository name and owner. Pin the workflow to a branch, tag, or full SHA. For example: `octo-org/octo-repo/.github/workflows/build.yml@v2, octo-org/octo-repo/.github/workflows/deploy.yml@d6dc6c96df4f32fa27b039f2084f576ed2c5c2a5, monalisa/octo-test/.github/workflows/test.yml@main`.
162
+
163
+
Only jobs directly defined within the selected workflows will have access to the runner group.
164
+
165
+
Organization-owned runner groups cannot access workflows from a different organization in the enterprise; instead, you must create an enterprise-owned runner group.
166
+
167
+
1. Haz clic en **Save ** (guardar).
168
+
169
+
{% endif %}
170
+
171
+
## Changing the name of a runner group
172
+
173
+
{% ifversion fpt or ghec or ghes > 3.3 or ghae-issue-5091 %}
174
+
{% data reusables.actions.self-hosted-runner-groups-navigate-to-repo-org-enterprise %}
175
+
{% data reusables.actions.settings-sidebar-actions-runner-groups-selection %}
176
+
1. Change the runner group name.
177
+
178
+
{% elsif ghae or ghes < 3.4 %}
179
+
{% data reusables.actions.self-hosted-runner-configure-runner-group %}
180
+
1. Change the runner group name.
181
+
{% endif %}
182
+
146
183
{% ifversion ghec or ghes or ghae %}
147
184
## Agregar ejecutores auto-hospedados a un grupo automáticamente
Copy file name to clipboardExpand all lines: translations/es-ES/content/actions/learn-github-actions/contexts.md
+5Lines changed: 5 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -183,6 +183,7 @@ The `github` context contains information about the workflow run and the event t
183
183
|`github.action_path`|`string`| The path where an action is located. This property is only supported in composite actions. You can use this path to access files located in the same repository as the action. |
184
184
|`github.action_ref`|`string`| For a step executing an action, this is the ref of the action being executed. For example, `v2`. |
185
185
|`github.action_repository`|`string`| For a step executing an action, this is the owner and repository name of the action. For example, `actions/checkout`. |
186
+
|`github.action_status`|`string`| For a composite action, the current result of the composite action. |
186
187
|`github.actor`|`string`| The username of the user that initiated the workflow run. |
187
188
|`github.api_url`|`string`| The URL of the {% data variables.product.prodname_dotcom %} REST API. |
188
189
|`github.base_ref`|`string`| The `base_ref` or target branch of the pull request in a workflow run. This property is only available when the event that triggers a workflow run is either `pull_request` or `pull_request_target`. |
Copy file name to clipboardExpand all lines: translations/es-ES/content/actions/learn-github-actions/environment-variables.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -156,7 +156,7 @@ We strongly recommend that actions use environment variables to access the files
156
156
| `GITHUB_RUN_ID` | {% data reusables.actions.run_id_description %} For example, `1658821493`. |
157
157
| `GITHUB_RUN_NUMBER` | {% data reusables.actions.run_number_description %} For example, `3`. |
158
158
| `GITHUB_SERVER_URL`| The URL of the {% data variables.product.product_name %} server. For example: `https://{% data variables.product.product_url %}`.
159
-
| `GITHUB_SHA` | The commit SHA that triggered the workflow. For example, `ffac537e6cbbf934b08745a378932722df287a53`. |
159
+
| `GITHUB_SHA` | The commit SHA that triggered the workflow. The value of this commit SHA depends on the event that triggered the workflow. For more information, see [Events that trigger workflows](/actions/using-workflows/events-that-trigger-workflows). For example, `ffac537e6cbbf934b08745a378932722df287a53`. |
160
160
| `GITHUB_WORKFLOW` | The name of the workflow. For example, `My test workflow`. If the workflow file doesn't specify a `name`, the value of this variable is the full path of the workflow file in the repository. |
161
161
| `GITHUB_WORKSPACE` | The default working directory on the runner for steps, and the default location of your repository when using the [`checkout`](https://github.com/actions/checkout) action. For example, `/home/runner/work/my-repo-name/my-repo-name`. |
0 commit comments