You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: content/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-user-account-settings/managing-accessibility-settings.md
+1-5
Original file line number
Diff line number
Diff line change
@@ -16,9 +16,7 @@ type: how_to
16
16
17
17
To create an experience on {% data variables.product.github %} that fits your needs, you can customize the user interface. Accessibility settings can be essential for people with disabilities, but can be useful to anyone. For example, customization of keyboard shortcuts is essential to people who navigate using voice control, but can be useful to anyone when a keyboard shortcut for {% data variables.product.github %} clashes with another application shortcut.
18
18
19
-
You can decide whether you want to use some or all keyboard shortcuts, and control the display of animated images{% ifversion link-underlines %} and how links are displayed{% endif %}.
20
-
21
-
{% ifversion link-underlines %}
19
+
You can decide whether you want to use some or all keyboard shortcuts, and control the display of animated images and how links are displayed.
22
20
23
21
## Managing the appearance of links
24
22
@@ -32,8 +30,6 @@ You can control whether links in text blocks are underlined and therefore more d
32
30
* To disable underlines on links in text blocks, under "Link underlines", select **Hide link underlines**.
33
31
* To disable hovercards for previewing link content, deselect **Hovercards**.
34
32
35
-
{% endif %}
36
-
37
33
## Managing keyboard shortcuts
38
34
39
35
You can perform actions across the {% data variables.product.github %} website by using your keyboard alone. Keyboard shortcuts can be useful to save time, but can be activated accidentally or interfere with assistive technology.
Copy file name to clipboardexpand all lines: content/actions/managing-workflow-runs-and-deployments/managing-deployments/managing-environments-for-deployment.md
+3-4
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ Third-party systems can be observability systems, change management systems, cod
51
51
52
52
Use required reviewers to require a specific person or team to approve workflow jobs that reference the environment. You can list up to six users or teams as reviewers. The reviewers must have at least read access to the repository. Only one of the required reviewers needs to approve the job for it to proceed.
53
53
54
-
{% ifversion deployments-prevent-self-approval %}You also have the option to prevent self-reviews for deployments to protected environments. If you enable this setting, users who initiate a deployment cannot approve the deployment job, even if they are a required reviewer. This ensures that deployments to protected environments are always reviewed by more than one person.{% endif %}
54
+
You also have the option to prevent self-reviews for deployments to protected environments. If you enable this setting, users who initiate a deployment cannot approve the deployment job, even if they are a required reviewer. This ensures that deployments to protected environments are always reviewed by more than one person.
55
55
56
56
For more information on reviewing jobs that reference an environment with required reviewers, see [AUTOTITLE](/actions/managing-workflow-runs/reviewing-deployments).
57
57
@@ -82,12 +82,11 @@ Use deployment branches{% ifversion deployment-protections-tag-patterns %} and t
82
82
{%- else %}
83
83
***All branches:** All branches in the repository can deploy to the environment.
84
84
{%- endif %}
85
-
***Protected branches{% ifversion deployment-protections-tag-patterns %} only{% endif %}:** Only branches with branch protection rules enabled can deploy to the environment. If no branch protection rules are defined for any branch in the repository, then all branches can deploy. For more information about branch protection rules, see [AUTOTITLE](/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches).{% ifversion actions-protected-branches-restrictions %}
85
+
***Protected branches{% ifversion deployment-protections-tag-patterns %} only{% endif %}:** Only branches with branch protection rules enabled can deploy to the environment. If no branch protection rules are defined for any branch in the repository, then all branches can deploy. For more information about branch protection rules, see [AUTOTITLE](/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches).
86
86
87
87
> [!NOTE]
88
88
> Deployment workflow runs triggered by tags with the same name as a protected branch and forks with branches that match the protected branch name cannot deploy to the environment.
89
89
90
-
{% endif %}
91
90
***Selected branches{% ifversion deployment-protections-tag-patterns %} and tags{% endif %}:** Only branches{% ifversion deployment-protections-tag-patterns %} and tags{% endif %} that match your specified name patterns can deploy to the environment.
92
91
93
92
If you specify `releases/*` as a deployment branch{% ifversion deployment-protections-tag-patterns %} or tag{% endif %} rule, only a branch{% ifversion deployment-protections-tag-patterns %} or tag{% endif %} whose name begins with `releases/` can deploy to the environment. (Wildcard characters will not match `/`. To match branches{% ifversion deployment-protections-tag-patterns %} or tags{% endif %} that begin with `release/` and contain an additional single slash, use `release/*/*`.) If you add `main` as a branch rule, a branch named `main` can also deploy to the environment. For more information about syntax options for deployment branches, see the [Ruby `File.fnmatch` documentation](https://ruby-doc.org/core-2.5.1/File.html#method-c-fnmatch).
@@ -180,7 +179,7 @@ Variables stored in an environment are only available to workflow jobs that refe
180
179
1. Optionally, specify people or teams that must approve workflow jobs that use this environment. For more information, see [Required reviewers](#required-reviewers).
181
180
1. Select **Required reviewers**.
182
181
1. Enter up to 6 people or teams. Only one of the required reviewers needs to approve the job for it to proceed.
183
-
{% ifversion deployments-prevent-self-approval %}1. Optionally, to prevent users from approving workflows runs that they triggered, select **Prevent self-review**.{% endif %}
182
+
1. Optionally, to prevent users from approving workflows runs that they triggered, select **Prevent self-review**.
184
183
1. Click **Save protection rules**.
185
184
1. Optionally, specify the amount of time to wait before allowing workflow jobs that use this environment to proceed. For more information, see [Wait timer](#wait-timer).
Copy file name to clipboardexpand all lines: content/actions/managing-workflow-runs-and-deployments/managing-deployments/reviewing-deployments.md
-4
Original file line number
Diff line number
Diff line change
@@ -27,13 +27,9 @@ For more information about environments and required approvals, see [AUTOTITLE](
27
27
* To approve the job, click **Approve and deploy**. Once a job is approved (and any other deployment protection rules have passed), the job will proceed. At this point, the job can access any secrets stored in the environment.
28
28
* To reject the job, click **Reject**. If a job is rejected, the workflow will fail.
29
29
30
-
{% ifversion deployments-prevent-self-approval %}
31
-
32
30
> [!NOTE]
33
31
> If the targeted environment is configured to prevent self-approvals for deployments, you will not be able to approve a deployment from a workflow run you initiated. For more information, see [AUTOTITLE](/actions/deployment/targeting-different-environments/managing-environments-for-deployment#required-reviewers).
34
32
35
-
{% endif %}
36
-
37
33
## Bypassing deployment protection rules
38
34
39
35
If you have configured deployment protection rules that control whether software can be deployed to an environment, you can bypass these rules and force all pending jobs referencing the environment to proceed.
@@ -49,17 +48,3 @@ By default, the deployments page shows currently active deployments from select
49
48
1. Depending on the qualifier you chose, fill out information in the "Operator" and "Value" columns.
50
49
1. Optionally, click **{% octicon "plus" aria-hidden="true" %} Add a filter** to add another filter.
51
50
1. Click **Apply**.{% endif %}
52
-
53
-
{% else %}
54
-
55
-
{% data reusables.actions.about-deployment-with-github-actions %}
56
-
57
-
To view current and past deployments, click **Environments** in the sidebar of the home page of your repository.
58
-
59
-
The deployments page displays the last active deployment of each environment for your repository. If the deployment includes an environment URL, a **View deployment** button that links to the URL is shown next to the deployment.
60
-
61
-
The activity log shows the deployment history for your environments. By default, only the most recent deployment for an environment has an `Active` status; all previously active deployments have an `Inactive` status. For more information on automatic inactivation of deployments, see [AUTOTITLE](/rest/deployments#inactive-deployments).
62
-
63
-
You can also use the REST API to get information about deployments. For more information, see [AUTOTITLE](/rest/repos#deployments).
Copy file name to clipboardexpand all lines: content/actions/sharing-automations/creating-actions/creating-a-javascript-action.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Once you complete this project, you should understand how to build your own Java
36
36
37
37
Before you begin, you'll need to download Node.js and create a public {% data variables.product.prodname_dotcom %} repository.
38
38
39
-
1. Download and install Node.js {% ifversion actions-node20-support %}20.x{% else %}16.x{% endif %}, which includes npm.
39
+
1. Download and install Node.js 20.x, which includes npm.
40
40
41
41
https://nodejs.org/en/download/
42
42
1. Create a new public repository on {% data variables.product.github %} and call it "hello-world-javascript-action". For more information, see [AUTOTITLE](/repositories/creating-and-managing-repositories/creating-a-new-repository).
Copy file name to clipboardexpand all lines: content/actions/writing-workflows/choosing-what-your-workflow-does/control-the-concurrency-of-workflows-and-jobs.md
Copy file name to clipboardexpand all lines: content/actions/writing-workflows/choosing-what-your-workflow-does/controlling-permissions-for-github_token.md
+3-5
Original file line number
Diff line number
Diff line change
@@ -4,14 +4,12 @@ shortTitle: Permissions for `GITHUB_TOKEN`
4
4
intro: Modify the default permissions granted to `GITHUB_TOKEN`.
Copy file name to clipboardexpand all lines: content/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions.md
-4
Original file line number
Diff line number
Diff line change
@@ -649,13 +649,9 @@ You can make an environment variable available to any subsequent steps in a work
649
649
650
650
{% data reusables.actions.environment-variables-are-fixed %} For more information about the default environment variables, see [AUTOTITLE](/actions/learn-github-actions/environment-variables#default-environment-variables).
651
651
652
-
{% ifversion github-env-node-options %}
653
-
654
652
> [!NOTE]
655
653
> Due to security restrictions, `GITHUB_ENV` cannot be used to set the `NODE_OPTIONS` environment variable.
656
654
657
-
{% endif %}
658
-
659
655
### Example of writing an environment variable to `GITHUB_ENV`
Copy file name to clipboardexpand all lines: content/admin/administering-your-instance/administering-your-instance-from-the-command-line/command-line-utilities.md
-2
Original file line number
Diff line number
Diff line change
@@ -543,7 +543,6 @@ This utility returns webhook delivery logs for administrators to review and iden
543
543
ghe-webhook-logs
544
544
```
545
545
546
-
{% ifversion ghes > 3.10 %}
547
546
To show all hook deliveries filtered by a given event:
548
547
549
548
```shell
@@ -554,7 +553,6 @@ To show all hook deliveries filtered by a given event and action:
554
553
555
554
```shell
556
555
ghe-webhook-logs --event issues.opened
557
-
{% endif %}
558
556
To show all failed hook deliveries in the past day:
Copy file name to clipboardexpand all lines: content/admin/configuring-settings/hardening-security-for-your-enterprise/configuring-host-keys-for-your-instance.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Configuring host keys for your instance
3
3
shortTitle: Configure host keys
4
4
intro: 'You can increase the security of {% data variables.location.product_location %} by configuring the algorithms that your instance uses to generate and advertise host keys for incoming SSH connections.'
Copy file name to clipboardexpand all lines: content/admin/configuring-settings/hardening-security-for-your-enterprise/configuring-ssh-connections-to-your-instance.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
title: Configuring SSH connections to your instance
3
3
shortTitle: Configure SSH connections
4
4
intro: 'You can increase the security of {% data variables.location.product_location %} by configuring the SSH algorithms that clients can use to establish a connection.'
Copy file name to clipboardexpand all lines: content/admin/managing-github-actions-for-your-enterprise/enabling-github-actions-for-github-enterprise-server/managing-self-hosted-runners-for-dependabot-updates.md
Copy file name to clipboardexpand all lines: content/admin/managing-iam/using-saml-for-enterprise-iam/enabling-encrypted-assertions.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -2,9 +2,9 @@
2
2
title: Enabling encrypted assertions
3
3
shortTitle: Enable encrypted assertions
4
4
intro: 'You can improve {% data variables.location.product_location %}''s security with SAML single sign-on (SSO) by encrypting the messages that your SAML identity provider (IdP) sends.'
0 commit comments