Skip to content

Commit

Permalink
Merge pull request #34976 from github/repo-sync
Browse files Browse the repository at this point in the history
Repo sync
  • Loading branch information
docs-bot authored Oct 17, 2024
2 parents bfaa324 + 91c395b commit 16da534
Show file tree
Hide file tree
Showing 6 changed files with 16 additions and 15 deletions.
3 changes: 1 addition & 2 deletions .github/workflows/azure-prod-build-deploy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -61,12 +61,11 @@ jobs:

# Create a temporary token for the Azure Container Registry
# and set it as a GitHub Actions environment variable
# Then clean up by deleting the temp token.
# Created token are viewable in the ACR resource UI
# under Repository permissions > Tokens
- name: 'Create Azure Container Registry Token'
env:
PROD_REGISTRY_SERVER: ${{ secrets.PROD_REGISTRY_SERVER }}
CONTAINER_REGISTRY_SERVER: ${{ secrets.PROD_REGISTRY_SERVER }}
run: npm run create-acr-token

- name: 'Docker login'
Expand Down
19 changes: 10 additions & 9 deletions .github/workflows/validate-github-github-docs-urls.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,15 +8,16 @@ on:
workflow_dispatch:
schedule:
- cron: '20 16 * * 1' # Run every Monday at 16:20 UTC / 8:20 PST
pull_request:
paths:
- 'content/**'
# In case a relevant dependency changes
- 'package*.json'
# The scripts
- 'src/links/scripts/validate-github-github-docs-urls/**'
# The workflow
- .github/workflows/validate-github-github-docs-urls.yml
# See https://gh.io/AAsyyao before uncommenting:
# pull_request:
# paths:
# - 'content/**'
# # In case a relevant dependency changes
# - 'package*.json'
# # The scripts
# - 'src/links/scripts/validate-github-github-docs-urls/**'
# # The workflow
# - .github/workflows/validate-github-github-docs-urls.yml

permissions:
contents: read
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Managing access to self-hosted runners using groups
shortTitle: Manage access with runner groups
intro: You can use policies to limit access to self-hosted runners that have been added to an organization{% ifversion ghec or ghes %} or enterprise{% endif %}.
permissions: 'Enterprise accounts, organizations owned by enterprise accounts, and organizations using {% data variables.product.prodname_team %} can create and manage additional runner groups.<br><br>{% ifversion custom-org-roles %}Users with the "Manage organization runners and runner groups" permission can manage runner groups at the organization level.{% endif %}'
permissions: 'Enterprise accounts, organizations owned by enterprise accounts, and organizations using {% data variables.product.prodname_team %} or {% data variables.product.prodname_free_user %} plans can create and manage additional runner groups using self-hosted runners.<br><br>{% ifversion custom-org-roles %}Users with the "Manage organization runners and runner groups" permission can manage runner groups at the organization level.{% endif %}'
redirect_from:
- /actions/hosting-your-own-runners/managing-self-hosted-runners/managing-access-to-self-hosted-runners
- /actions/hosting-your-own-runners/managing-access-to-self-hosted-runners
Expand Down
1 change: 1 addition & 0 deletions data/reusables/actions/azure-vnet-supported-regions.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ The {% data variables.product.prodname_actions %} service supports a subset of a
<li><code>SwitzerlandNorth</code></li>
<li><code>UkSouth</code></li>
<li><code>SoutheastAsia</code></li>
<li><code>KoreaCentral</code></li>
</ul>

Azure private networking supports GPU runners in the following regions.
Expand Down
2 changes: 1 addition & 1 deletion src/audit-logs/lib/config.json
Original file line number Diff line number Diff line change
Expand Up @@ -3,5 +3,5 @@
"apiOnlyEvents": "This event is not available in the web interface, only via the REST API, audit log streaming, or JSON/CSV exports.",
"apiRequestEvent": "This event is only available via audit log streaming."
},
"sha": "cdccf7613c6f26c2c5542d8481cf8dacb617a94b"
"sha": "d5e464291d8f2559b1c5b7398c16d43c61f79548"
}
4 changes: 2 additions & 2 deletions src/workflows/acr-create-token.ts
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ type IsoDateString = string
dotenv.config()

const acrTokenName = process.env.ACR_TOKEN_NAME
const acrProdRegistryServer = process.env.PROD_REGISTRY_SERVER
const acrServer = process.env.CONTAINER_REGISTRY_SERVER
const repo = process.env.GITHUB_REPOSITORY

function main() {
Expand All @@ -23,7 +23,7 @@ function main() {
try {
const cmd = `az acr token create \
--name ${acrTokenName} \
--registry ${acrProdRegistryServer} \
--registry ${acrServer} \
--repository ${repo} \
content/write \
content/read \
Expand Down

0 comments on commit 16da534

Please sign in to comment.