Packages with granular permissions are scoped to a personal user or organization account. You can change the access control and visibility of a package separately from the repository that it is connected (or linked) to.
Currently, you can only use granular permissions with the Container registry. Granular permissions are not supported in our other package registries, such as the RubyGems registry.
For more information about permissions for repository-scoped packages, packages-related scopes for PATs, or managing permissions for your actions workflows, see "About permissions for GitHub Packages."
Visibility and access permissions for container images
Se você tiver permissões de administrador para a imagem de um contêiner, você poderá definir as permissões de acesso para a imagem do contêiner como privada ou pública. As imagens públicas permitem acesso anônimo e podem ser carregadas sem autenticação ou login via CLI.
Como administrador, você também pode conceder permissões de acesso para uma imagem contêiner separada das permissões que você configurou nos níveis da organização e repositório.
No caso de imagens de contêiner publicadas e de propriedade de uma conta pessoal, você pode dar a qualquer pessoa uma função de acesso. Para imagens de contêineres publicadas e pertencentes a uma organização, você pode dar uma função de acesso a qualquer pessoa ou equipe na organização.
Permissão | Descrição de acesso |
---|---|
Ler | Pode fazer o download do pacote. Pode ler metadados do pacote. |
Gravar | Pode fazer upload e download deste pacote. Pode ler e gravar metadados do pacote. |
Admin | Pode fazer upload, download, excluir e gerenciar este pacote. Pode ler e gravar metadados do pacote. Pode conceder permissões de pacote. |
Configuring access to container images for your personal account
If you have admin permissions to a container image that's owned by a personal account, you can assign read, write, or admin roles to other users. For more information about these permission roles, see "Visibility and access permissions for container images."
If your package is private or internal and owned by an organization, then you can only give access to other organization members or teams.
- Procurar e selecionar o seu pacote.
- No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
- On the package settings page, click Invite teams or people and enter the name, username, or email of the person you want to give access. Teams cannot be given access to a container image owned by a personal account.
- Next to the username or team name, use the "Role" drop-down menu to select a desired permission level.
The selected users will automatically be given access and don't need to accept an invitation first.
Configuring access to container images for an organization
If you have admin permissions to an organization-owned container image, you can assign read, write, or admin roles to other users and teams. For more information about these permission roles, see "Visibility and access permissions for container images."
If your package is private or internal and owned by an organization, then you can only give access to other organization members or teams.
- Em GitHub, acesse a página principal da sua organização.
- No nome da sua organização, clique em Pacotes.
- Procurar e selecionar o seu pacote.
- No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
- On the package settings page, click Invite teams or people and enter the name, username, or email of the person you want to give access. You can also enter a team name from the organization to give all team members access.
- Next to the username or team name, use the "Role" drop-down menu to select a desired permission level.
The selected users or teams will automatically be given access and don't need to accept an invitation first.
Inheriting access for a container image from a repository
To simplify package management through GitHub Actions workflows, you can enable a container image to inherit the access permissions of a repository by default.
If you inherit the access permissions of the repository where your package's workflows are stored, then you can adjust access to your package through the repository's permissions.
Once a repository is synced, you can't access the package's granular access settings. To customize the package's permissions through the granular package access settings, you must remove the synced repository first.
- Em GitHub, acesse a página principal da sua organização.
- No nome da sua organização, clique em Pacotes.
- Procurar e selecionar o seu pacote.
- No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
- Under "Repository source", select Inherit access from repository (recommended).
Ensuring workflow access to your package
To ensure that a GitHub Actions workflow has access to your package, you must give explicit access to the repository where the workflow is stored.
The specified repository does not need to be the repository where the source code for the package is kept. You can give multiple repositories workflow access to a package.
Note: Syncing your container image with a repository through the Actions access menu option is different than connecting your container to a repository. For more information about linking a repository to your container, see "Connecting a repository to a package."
GitHub Actions access for user-account-owned container images
- Procurar e selecionar o seu pacote.
- No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
- In the left sidebar, click Actions access.
- To ensure your workflow has access to your container package, you must add the repository where the workflow is stored. Click Add repository and search for the repository you want to add.
- Using the "role" drop-down menu, select the default access level that you'd like the repository to have to your container image.
To further customize access to your container image, see "Configuring access to container images for your personal account."
GitHub Actions access for organization-owned container images
- Em GitHub, acesse a página principal da sua organização.
- No nome da sua organização, clique em Pacotes.
- Procurar e selecionar o seu pacote.
- No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
- In the left sidebar, click Actions access.
- Click Add repository and search for the repository you want to add.
- Using the "role" drop-down menu, select the default access level that you'd like repository members to have to your container image. Outside collaborators will not be included.
To further customize access to your container image, see "Configuring access to container images for an organization."
Configuring visibility of container images for your personal account
When you first publish a package, the default visibility is private and only you can see the package. You can modify a private or public container image's access by changing the access settings.
A public package can be accessed anonymously without authentication. Once you make your package public, you cannot make your package private again.
-
Procurar e selecionar o seu pacote.
-
No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
-
Under "Danger Zone", choose a visibility setting:
-
To make the container image visible to anyone, click Make public.
Warning: Once you make a package public, you cannot make it private again.
-
To make the container image visible to a custom selection of people, click Make private.
-
Container creation visibility for organization members
You can choose the visibility of containers that organization members can publish by default.
- No canto superior direito do GitHub Enterprise Server, clique na foto do seu perfil e clique em Suas organizações.
- Ao lado da organização, clique em Configurações.
- On the left, click Packages.
- Under "Container creation", choose whether you want to enable the creation of public, private, or internal container images.
- To enable organization members to create public container images, click Public.
- To enable organization members to create private container images that are only visible to other organization members, click Private. You can further customize the visibility of private container images.
- To enable organization members to create internal container images that are visible to all organization members, click Internal. If the organization belongs to an enterprise, the container images will be visible to all enterprise members.
Configuring visibility of container images for an organization
When you first publish a package, the default visibility is private and only you can see the package. You can grant users or teams different access roles for your container image through the access settings.
A public package can be accessed anonymously without authentication. Once you make your package public, you cannot make your package private again.
-
Em GitHub, acesse a página principal da sua organização.
-
No nome da sua organização, clique em Pacotes.
-
Procurar e selecionar o seu pacote.
-
No canto superior direito da página de aterrissagem do pacote, clique em Configurações do pacote.
-
Under "Danger Zone", choose a visibility setting:
-
To make the container image visible to anyone, click Make public.
Warning: Once you make a package public, you cannot make it private again.
-
To make the container image visible to a custom selection of people, click Make private.
-