Skip to content

Commit c91b6d8

Browse files
Merge branch 'github:main' into main
2 parents b8718fb + 2f88a09 commit c91b6d8

File tree

66 files changed

+406
-132
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+406
-132
lines changed

translations/es-ES/content/actions/creating-actions/creating-a-javascript-action.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ En tu directorio `hello-world-javascript-action`, crea un archivo `README.md` qu
141141
- Variables de entorno que utiliza la acción.
142142
- Un ejemplo de cómo usar tu acción en un flujo de trabajo.
143143

144-
```markdown
144+
```markdown{:copy}
145145
# Hello world docker action
146146
147147
Esta acción imprime "Hello World" o "Hello" + el nombre de una persona a quien saludar en el registro.
@@ -193,7 +193,7 @@ Ingresar tu directorio de `node_modules` puede causar problemas. Como alternativ
193193
1. Si ya has comprobado tu directorio `node_modules`, eliminínalo. `rm -rf node_modules/*`
194194

195195
1. Desde tu terminal, confirma las actualizaciones para tu `action.yml`, `dist/index.js` y `node_modules`.
196-
```shell
196+
```shell{:copy}
197197
git add action.yml dist/index.js node_modules/*
198198
git commit -m "Use vercel/ncc"
199199
git tag -a -m "My first action release" v1.1

translations/es-ES/content/actions/deployment/about-deployments/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ shortTitle: About deployments
44
intro: 'Learn how deployments can run with {% data variables.product.prodname_actions %} workflows.'
55
versions:
66
fpt: '*'
7-
ghae: issue-4856
7+
ghes: '*'
8+
ghae: '*'
89
ghec: '*'
910
children:
1011
- /about-continuous-deployment

translations/es-ES/content/actions/deployment/deploying-xcode-applications/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ shortTitle: Desplegar aplicaciones de Xcode
44
intro: 'Puedes firmar apps de Xcode dentro de tu flujo de integración continua (IC) si instalas un certificado de firma de código de Apple en los ejecutores de {% data variables.product.prodname_actions %}.'
55
versions:
66
fpt: '*'
7-
ghae: issue-4856
7+
ghes: '*'
8+
ghae: '*'
89
ghec: '*'
910
children:
1011
- /installing-an-apple-certificate-on-macos-runners-for-xcode-development

translations/es-ES/content/actions/deployment/managing-your-deployments/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ shortTitle: Managing your deployments
44
intro: You can review the past activity of your deployments.
55
versions:
66
fpt: '*'
7-
ghae: issue-4856
7+
ghes: '*'
8+
ghae: '*'
89
ghec: '*'
910
children:
1011
- /viewing-deployment-history

translations/es-ES/content/actions/deployment/targeting-different-environments/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,8 @@ shortTitle: Apuntar a ambientes diferentes
44
intro: Puedes configurr ambientes con reglas de protección y secretos. Un job de flujo de trabajo que referencie a un ambiente debe seguir cualquier regla de protección para el ambiente antes de ejecutar o acceder a los secretos de dicho ambiente.
55
versions:
66
fpt: '*'
7-
ghae: issue-4856
7+
ghes: '*'
8+
ghae: '*'
89
ghec: '*'
910
children:
1011
- /using-environments-for-deployment

translations/es-ES/content/actions/hosting-your-own-runners/about-self-hosted-runners.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,8 @@ For more information about installing and using self-hosted runners, see "[Addin
5151
- Can use cloud services or local machines that you already pay for.
5252
- Are customizable to your hardware, operating system, software, and security requirements.
5353
- Don't need to have a clean instance for every job execution.
54-
- Are free to use with {% data variables.product.prodname_actions %}, but you are responsible for the cost of maintaining your runner machines.
54+
- Are free to use with {% data variables.product.prodname_actions %}, but you are responsible for the cost of maintaining your runner machines.{% ifversion ghec or ghes or ghae %}
55+
- Can be organized into groups to restrict access to specific {% if restrict-groups-to-workflows %}workflows, {% endif %}organizations and repositories. For more information, see "[Managing access to self-hosted runners using groups](/actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups)."{% endif %}
5556

5657
## Requirements for self-hosted runner machines
5758

@@ -186,7 +187,7 @@ github-registry-files.githubusercontent.com
186187

187188
In addition, your workflow may require access to other network resources. For example, if your workflow installs packages or publishes containers to {% data variables.product.prodname_dotcom %} Packages, then the runner will also require access to those network endpoints.
188189

189-
If you use an IP address allow list for your {% data variables.product.prodname_dotcom %} organization or enterprise account, you must add your self-hosted runner's IP address to the allow list. For more information, see "[Managing allowed IP addresses for your organization](/organizations/keeping-your-organization-secure/managing-allowed-ip-addresses-for-your-organization#using-github-actions-with-an-ip-allow-list)" or "[Enforcing policies for security settings in your enterprise](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise)".
190+
If you use an IP address allow list for your {% data variables.product.prodname_dotcom %} organization or enterprise account, you must add your self-hosted runner's IP address to the allow list. For more information, see "[Managing allowed IP addresses for your organization](/{% ifversion fpt %}enterprise-cloud@latest/{% endif %}/organizations/keeping-your-organization-secure/managing-allowed-ip-addresses-for-your-organization#using-github-actions-with-an-ip-allow-list)" or "[Enforcing policies for security settings in your enterprise](/{% ifversion fpt %}enterprise-cloud@latest/{% endif %}admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise){% ifversion fpt %}" in the {% data variables.product.prodname_ghe_cloud %} documentation.{% else %}."{% endif %}
190191

191192
{% else %}
192193

translations/es-ES/content/actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups.md

Lines changed: 44 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,12 @@ versions:
99
ghae: '*'
1010
ghec: '*'
1111
type: tutorial
12-
shortTitle: Administrar grupos de ejecutores
12+
shortTitle: Manage access to runners
1313
---
1414

1515
{% data reusables.actions.enterprise-beta %}
1616
{% data reusables.actions.enterprise-github-hosted-runners %}
17+
{% data reusables.actions.restrict-runner-workflow-beta %}
1718

1819
## Acerca de los grupos de ejecutores auto-hospedados
1920

@@ -31,9 +32,10 @@ Si utilizas
3132
{% endif %}
3233

3334
{% ifversion ghec or ghes or ghae %}
34-
Los grupos de ejecutores auto-hospedados se utilizan para controlar el acceso a los ejecutores auto-hospedados a nivel de empresas y organizaciones. Los administradores de la empresa pueden configurar políticas de acceso que controlan qué organizaciones en la empresa tienen acceso al grupo de ejecutores. Los administradores de las organizaciones pueden configurar políticas de acceso que controlen qué repositorios en una organización tienen acceso al grupo de ejecutores.
35+
Los grupos de ejecutores auto-hospedados se utilizan para controlar el acceso a los ejecutores auto-hospedados a nivel de empresas y organizaciones. Enterprise owners can configure access policies that control which organizations
36+
{% if restrict-groups-to-workflows %}and workflows {% endif %}in an enterprise have access to the runner group. Organization owners can configure access policies that control which repositories{% if restrict-groups-to-workflows %} and workflows{% endif %} in an organization have access to the runner group.
3537

36-
Cuando un administrador de empresa otorga acceso a una organización para un grupo de ejecutores, los administradores de organización pueden ver que dicho grupo se lista en la configuración del ejecutor auto-hospedado de la organización. Los administradores de la organización pueden entonces asignar políticas de acceso adicionales para repositorios granulares en el grupo de ejecutores de la empresa.
38+
When an enterprise owner grants an organization access to a runner group, organization owners can see the runner group listed in the organization's self-hosted runner settings. The organization owners can then assign additional granular repository{% if restrict-groups-to-workflows %} and workflow{% endif %} access policies to the enterprise runner group.
3739

3840
Cuando se crean nuevos ejecutores, se asignan automáticamente al grupo predeterminado. Los ejecutores solo pueden estar en un grupo a la vez. Puedes mover los ejecutores del grupo predeterminado a otro grupo. Para obtener más información, consulta la sección "[Mover un ejecutor auto-hospedado a un grupo](#moving-a-self-hosted-runner-to-a-group)".
3941

@@ -43,13 +45,14 @@ Todas las organizaciones tienen un solo grupo predeterminado de ejecutores auto-
4345

4446
Los ejecutores auto-hospedados se asignan automáticamente al grupo predeterminado cuando se crean y solo pueden ser mimebros de un grupo a la vez. Puedes mover un ejecutor del grupo predeterminado a cualquier grupo que crees.
4547

46-
Cuando creas un grupo, debes elegir una política que defina qué repositorios tienen acceso al grupo ejecutor.
48+
When creating a group, you must choose a policy that defines which repositories{% if restrict-groups-to-workflows %} and workflows{% endif %} have access to the runner group.
4749

4850
{% ifversion ghec or ghes > 3.3 or ghae-issue-5091 %}
4951
{% data reusables.organizations.navigate-to-org %}
5052
{% data reusables.organizations.org_settings %}
5153
{% data reusables.actions.settings-sidebar-actions-runner-groups %}
5254
1. En la sección de "Grupos de ejecutores", haz clic en **Grupo de ejecutores nuevo**.
55+
1. Enter a name for your runner group.
5356
{% data reusables.actions.runner-group-assign-policy-repo %}
5457

5558
{% warning %}
@@ -59,6 +62,7 @@ Cuando creas un grupo, debes elegir una política que defina qué repositorios t
5962
Para obtener más información, consulta "[Acerca de los ejecutores autoalojados](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories)."
6063

6164
{% endwarning %}
65+
{% data reusables.actions.runner-group-assign-policy-workflow %}{%- if restrict-groups-to-workflows %} Organization-owned runner groups cannot access workflows from a different organization in the enterprise; instead, you must create an enterprise-owned runner group.{% endif %}
6266
{% data reusables.actions.self-hosted-runner-create-group %}
6367
{% elsif ghae or ghes < 3.4 %}
6468
{% data reusables.organizations.navigate-to-org %}
@@ -89,7 +93,7 @@ Cuando creas un grupo, debes elegir una política que defina qué repositorios t
8993

9094
## Crear un grupo de ejecutores auto-hospedados para una empresa
9195

92-
Las empresas pueden agregar sus ejecutores auto-hospedados a grupos para su administración de accesos. Las empresas pueden crear grupos de ejecutores auto-hospedados a los cuales puedan acceder organizaciones específicas en la cuenta empresarial. Los administradores de la organización pueden entonces asignar políticas de acceso adicionales para los repositorios granulares a estos grupos de ejecutores para las empresas. Para obtener más información sobre cómo crear un grupo de ejecutores auto-hospedados con la API de REST, consulta las terminales empresariales en la [API de REST de {% data variables.product.prodname_actions %}](/rest/reference/actions#self-hosted-runner-groups).
96+
Las empresas pueden agregar sus ejecutores auto-hospedados a grupos para su administración de accesos. Enterprises can create groups of self-hosted runners that are accessible to specific organizations in the enterprise account{% if restrict-groups-to-workflows %} or to specific workflows{% endif %}. Organization owners can then assign additional granular repository{% if restrict-groups-to-workflows %} or workflow{% endif %} access policies to the enterprise runner groups. Para obtener más información sobre cómo crear un grupo de ejecutores auto-hospedados con la API de REST, consulta las terminales empresariales en la [API de REST de {% data variables.product.prodname_actions %}](/rest/reference/actions#self-hosted-runner-groups).
9397

9498
Los ejecutores auto-hospedados se asignan automáticamente al grupo predeterminado cuando se crean y solo pueden ser mimebros de un grupo a la vez. Puedes asignar el ejecutor a un grupo específico durante el proceso de registro o puedes moverlo después desde el grupo predeterminado a un grupo personalizado.
9599

@@ -116,17 +120,21 @@ Cuando creas un grupo, debes elegir la política que defina qué organizaciones
116120

117121
![Agregar opciones de un grupo de ejecutores](/assets/images/help/settings/actions-enterprise-account-add-runner-group-options-ae.png)
118122
{%- endif %}
123+
{% data reusables.actions.runner-group-assign-policy-workflow %}
119124
1. Da clic en **Guardar grupo** para crear el grupo y aplicar la política.
120125

121126
{% endif %}
122127

123128
## Cambiar la política de acceso de un grupo de ejecutores auto-hospedados
124129

125-
Puedes actualizar la política de acceso de un grupo ejecutor o renombrarlo.
130+
For runner groups in an enterprise, you can change what organizations in the enterprise can access a runner group{% if restrict-groups-to-workflows %} or restrict what workflows a runner group can run{% endif %}. For runner groups in an organization, you can change what repositories in the organization can access a runner group{% if restrict-groups-to-workflows %} or restrict what workflows a runner group can run{% endif %}.
131+
132+
### Changing what organizations or repositories can access a runner group
133+
126134
{% ifversion fpt or ghec or ghes > 3.3 or ghae-issue-5091 %}
127135
{% data reusables.actions.self-hosted-runner-groups-navigate-to-repo-org-enterprise %}
128136
{% data reusables.actions.settings-sidebar-actions-runner-groups-selection %}
129-
1. Modifica las opciones de acceso o cambia el nombre del grupo de ejecutores.
137+
1. For runner groups in an enterprise, under **Organization access**, modify what organizations can access the runner group. For runner groups in an organization, under **Repository access**, modify what repositories can access the runner group.
130138

131139
{%- ifversion fpt or ghec or ghes %}
132140
{% warning %}
@@ -143,6 +151,35 @@ Puedes actualizar la política de acceso de un grupo ejecutor o renombrarlo.
143151
{% data reusables.actions.self-hosted-runner-configure-runner-group-access %}
144152
{% endif %}
145153

154+
{% if restrict-groups-to-workflows %}
155+
### Changing what workflows can access a runner group
156+
You can configure a self-hosted runner group to run either selected workflows or all workflows. For example, you might use this setting to protect secrets that are stored on self-hosted runners or to standardize deployment workflows by restricting a runner group to run only a specific reusable workflow. This setting cannot be overridden if you are configuring an organization's runner group that was shared by an enterprise.
157+
{% data reusables.actions.self-hosted-runner-groups-navigate-to-repo-org-enterprise %}
158+
{% data reusables.actions.settings-sidebar-actions-runner-groups-selection %}
159+
1. Under **Workflow access**, select the dropdown menu and click **Selected workflows**.
160+
1. Da clic en {% octicon "gear" aria-label="the gear icon" %}.
161+
1. Enter a comma separated list of the workflows that can access the runner group. Use the full path, including the repository name and owner. Pin the workflow to a branch, tag, or full SHA. For example: `octo-org/octo-repo/.github/workflows/build.yml@v2, octo-org/octo-repo/.github/workflows/deploy.yml@d6dc6c96df4f32fa27b039f2084f576ed2c5c2a5, monalisa/octo-test/.github/workflows/test.yml@main`.
162+
163+
Only jobs directly defined within the selected workflows will have access to the runner group.
164+
165+
Organization-owned runner groups cannot access workflows from a different organization in the enterprise; instead, you must create an enterprise-owned runner group.
166+
167+
1. Haz clic en **Save ** (guardar).
168+
169+
{% endif %}
170+
171+
## Changing the name of a runner group
172+
173+
{% ifversion fpt or ghec or ghes > 3.3 or ghae-issue-5091 %}
174+
{% data reusables.actions.self-hosted-runner-groups-navigate-to-repo-org-enterprise %}
175+
{% data reusables.actions.settings-sidebar-actions-runner-groups-selection %}
176+
1. Change the runner group name.
177+
178+
{% elsif ghae or ghes < 3.4 %}
179+
{% data reusables.actions.self-hosted-runner-configure-runner-group %}
180+
1. Change the runner group name.
181+
{% endif %}
182+
146183
{% ifversion ghec or ghes or ghae %}
147184
## Agregar ejecutores auto-hospedados a un grupo automáticamente
148185

translations/es-ES/content/actions/learn-github-actions/contexts.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -183,6 +183,7 @@ The `github` context contains information about the workflow run and the event t
183183
| `github.action_path` | `string` | The path where an action is located. This property is only supported in composite actions. You can use this path to access files located in the same repository as the action. |
184184
| `github.action_ref` | `string` | For a step executing an action, this is the ref of the action being executed. For example, `v2`. |
185185
| `github.action_repository` | `string` | For a step executing an action, this is the owner and repository name of the action. For example, `actions/checkout`. |
186+
| `github.action_status` | `string` | For a composite action, the current result of the composite action. |
186187
| `github.actor` | `string` | The username of the user that initiated the workflow run. |
187188
| `github.api_url` | `string` | The URL of the {% data variables.product.prodname_dotcom %} REST API. |
188189
| `github.base_ref` | `string` | The `base_ref` or target branch of the pull request in a workflow run. This property is only available when the event that triggers a workflow run is either `pull_request` or `pull_request_target`. |
@@ -766,10 +767,14 @@ on:
766767
deploy_target:
767768
required: true
768769
type: string
770+
perform_deploy:
771+
required: true
772+
type: boolean
769773
770774
jobs:
771775
deploy:
772776
runs-on: ubuntu-latest
777+
if: ${{ inputs.perform_deploy == 'true' }}
773778
steps:
774779
- name: Deploy build to target
775780
run: deploy --build ${{ inputs.build_id }} --target ${{ inputs.deploy_target }}

translations/es-ES/content/actions/learn-github-actions/environment-variables.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ We strongly recommend that actions use environment variables to access the files
156156
| `GITHUB_RUN_ID` | {% data reusables.actions.run_id_description %} For example, `1658821493`. |
157157
| `GITHUB_RUN_NUMBER` | {% data reusables.actions.run_number_description %} For example, `3`. |
158158
| `GITHUB_SERVER_URL`| The URL of the {% data variables.product.product_name %} server. For example: `https://{% data variables.product.product_url %}`.
159-
| `GITHUB_SHA` | The commit SHA that triggered the workflow. For example, `ffac537e6cbbf934b08745a378932722df287a53`. |
159+
| `GITHUB_SHA` | The commit SHA that triggered the workflow. The value of this commit SHA depends on the event that triggered the workflow. For more information, see [Events that trigger workflows](/actions/using-workflows/events-that-trigger-workflows). For example, `ffac537e6cbbf934b08745a378932722df287a53`. |
160160
| `GITHUB_WORKFLOW` | The name of the workflow. For example, `My test workflow`. If the workflow file doesn't specify a `name`, the value of this variable is the full path of the workflow file in the repository. |
161161
| `GITHUB_WORKSPACE` | The default working directory on the runner for steps, and the default location of your repository when using the [`checkout`](https://github.com/actions/checkout) action. For example, `/home/runner/work/my-repo-name/my-repo-name`. |
162162
{%- if actions-runner-arch-envvars %}

0 commit comments

Comments
 (0)