Packages with granular permissions are scoped to a personal user or organization account. You can change the access control and visibility of a package separately from the repository that it is connected (or linked) to.
Currently, you can only use granular permissions with the Container registry. Granular permissions are not supported in our other package registries, such as the RubyGems registry.
For more information about permissions for repository-scoped packages, packages-related scopes for PATs, or managing permissions for your actions workflows, see "About permissions for GitHub Packages."
Visibility and access permissions for container images
Si tienes permisos administrativos en una imagen de contenedor, peudes configurar los permisos de acceso para la imagen de contenedor en privados o públicos. Las imágenes públicas permiten el acceso anónimo y pueden extraerse sin autenticación o ingresar a ellas através del CLI.
Como administrador, también puedes otorgar permisos de acceso para una imagen de contenedor que esté separada de los permisos que configuraste a nivel de organización y de repositorio.
Para las imágenes de contenedor publicadas y propiedad de una cuenta personal, puedes conceder a cualquier persona un rol de acceso. Puedes otorgar un rol de acceso a cualquier persona o equipo en la organización para las imágenes de contenedor que pertenecen a, o que publica una cuenta de usuario.
Permiso | Descripción del acceso |
---|---|
Lectura | Puede descargar el paquete. Puede leer los metadatos del paquete. |
Escritura | Puede cargar y descargar este paquete. Puede leer y escribir metadatos del paquete. |
Administración | Puede cargar, descargar, borrar y administrar este paquete. Puede leer y escribir metadatos del paquete. Puede conceder permisos de paquete. |
Configuring access to container images for your personal account
If you have admin permissions to a container image that's owned by a personal account, you can assign read, write, or admin roles to other users. For more information about these permission roles, see "Visibility and access permissions for container images."
If your package is private or internal and owned by an organization, then you can only give access to other organization members or teams.
- Busca y selecciona tu paquete.
- En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
- On the package settings page, click Invite teams or people and enter the name, username, or email of the person you want to give access. Teams cannot be given access to a container image owned by a personal account.
- Next to the username or team name, use the "Role" drop-down menu to select a desired permission level.
The selected users will automatically be given access and don't need to accept an invitation first.
Configuring access to container images for an organization
If you have admin permissions to an organization-owned container image, you can assign read, write, or admin roles to other users and teams. For more information about these permission roles, see "Visibility and access permissions for container images."
If your package is private or internal and owned by an organization, then you can only give access to other organization members or teams.
- En GitHub, navega a la página principal de tu organización.
- Debajo del nombre del organización, haga clic en Packages.
- Busca y selecciona tu paquete.
- En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
- On the package settings page, click Invite teams or people and enter the name, username, or email of the person you want to give access. You can also enter a team name from the organization to give all team members access.
- Next to the username or team name, use the "Role" drop-down menu to select a desired permission level.
The selected users or teams will automatically be given access and don't need to accept an invitation first.
Inheriting access for a container image from a repository
To simplify package management through GitHub Actions workflows, you can enable a container image to inherit the access permissions of a repository by default.
If you inherit the access permissions of the repository where your package's workflows are stored, then you can adjust access to your package through the repository's permissions.
Once a repository is synced, you can't access the package's granular access settings. To customize the package's permissions through the granular package access settings, you must remove the synced repository first.
- En GitHub, navega a la página principal de tu organización.
- Debajo del nombre del organización, haga clic en Packages.
- Busca y selecciona tu paquete.
- En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
- Under "Repository source", select Inherit access from repository (recommended).
Ensuring workflow access to your package
To ensure that a GitHub Actions workflow has access to your package, you must give explicit access to the repository where the workflow is stored.
The specified repository does not need to be the repository where the source code for the package is kept. You can give multiple repositories workflow access to a package.
Note: Syncing your container image with a repository through the Actions access menu option is different than connecting your container to a repository. For more information about linking a repository to your container, see "Connecting a repository to a package."
GitHub Actions access for user-account-owned container images
- Busca y selecciona tu paquete.
- En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
- In the left sidebar, click Actions access.
- To ensure your workflow has access to your container package, you must add the repository where the workflow is stored. Click Add repository and search for the repository you want to add.
- Using the "role" drop-down menu, select the default access level that you'd like the repository to have to your container image.
To further customize access to your container image, see "Configuring access to container images for your personal account."
GitHub Actions access for organization-owned container images
- En GitHub, navega a la página principal de tu organización.
- Debajo del nombre del organización, haga clic en Packages.
- Busca y selecciona tu paquete.
- En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
- In the left sidebar, click Actions access.
- Click Add repository and search for the repository you want to add.
- Using the "role" drop-down menu, select the default access level that you'd like repository members to have to your container image. Outside collaborators will not be included.
To further customize access to your container image, see "Configuring access to container images for an organization."
Configuring visibility of container images for your personal account
When you first publish a package, the default visibility is private and only you can see the package. You can modify a private or public container image's access by changing the access settings.
A public package can be accessed anonymously without authentication. Once you make your package public, you cannot make your package private again.
-
Busca y selecciona tu paquete.
-
En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
-
Under "Danger Zone", choose a visibility setting:
-
To make the container image visible to anyone, click Make public.
Warning: Once you make a package public, you cannot make it private again.
-
To make the container image visible to a custom selection of people, click Make private.
-
Container creation visibility for organization members
You can choose the visibility of containers that organization members can publish by default.
- En la esquina superior derecha de GitHub Enterprise Server, haga clic en la foto de perfil y luego en Your organizations.
- Junto a la organización, haga clic en Settings.
- On the left, click Packages.
- Under "Container creation", choose whether you want to enable the creation of public, private, or internal container images.
- To enable organization members to create public container images, click Public.
- To enable organization members to create private container images that are only visible to other organization members, click Private. You can further customize the visibility of private container images.
- To enable organization members to create internal container images that are visible to all organization members, click Internal. If the organization belongs to an enterprise, the container images will be visible to all enterprise members.
Configuring visibility of container images for an organization
When you first publish a package, the default visibility is private and only you can see the package. You can grant users or teams different access roles for your container image through the access settings.
A public package can be accessed anonymously without authentication. Once you make your package public, you cannot make your package private again.
-
En GitHub, navega a la página principal de tu organización.
-
Debajo del nombre del organización, haga clic en Packages.
-
Busca y selecciona tu paquete.
-
En la parte superior derecha de la página de aterrizaje del paquete, haga clic en Package settings (Configuración del paquete).
-
Under "Danger Zone", choose a visibility setting:
-
To make the container image visible to anyone, click Make public.
Warning: Once you make a package public, you cannot make it private again.
-
To make the container image visible to a custom selection of people, click Make private.
-