Skip to content

Commit 74806c8

Browse files
Desere CrawfordDesere Crawford
authored andcommitted
adding release notes
1 parent 872c475 commit 74806c8

File tree

5 files changed

+128
-0
lines changed

5 files changed

+128
-0
lines changed
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
date: '2022-08-30'
2+
sections:
3+
bugs:
4+
- Prevents duplication of admin SSH keys showing up in Management Console and admin/.ssh/authorized_keys
5+
- Some background tasks could deadlock preventing them from making progress caused by `enterprise-crypto` which has now been modified to be thread safe.
6+
changes:
7+
- Performance improvements to the GitHub Enterprise Support Bundle generation process. This modifies the `sanitize_logs` function in `ghe-support-bundle` to run `psed` in parallel vs. serially. This is based on an analysis of bundle generation on `ghe.io` where it was observed we spent 36% of our time in `psed` sanitizing logs.
8+
known_issues:
9+
- On a freshly set up {% data variables.product.prodname_ghe_server %} instance without any users, an attacker could create the first admin user.
10+
- Custom firewall rules are removed during the upgrade process.
11+
- Git LFS tracked files [uploaded through the web interface](https://github.com/blog/2105-upload-files-to-your-repositories) are incorrectly added directly to the repository.
12+
- Issues cannot be closed if they contain a permalink to a blob in the same repository, where the blob's file path is longer than 255 characters.
13+
- When "Users can search GitHub.com" is enabled with {% data variables.product.prodname_github_connect %}, issues in private and internal repositories are not included in {% data variables.product.prodname_dotcom_the_website %} search results.
14+
- The {% data variables.product.prodname_registry %} npm registry no longer returns a time value in metadata responses. This was done to allow for substantial performance improvements. We continue to have all the data necessary to return a time value as part of the metadata response and will resume returning this value in the future once we have solved the existing performance issues.
15+
- Resource limits that are specific to processing pre-receive hooks may cause some pre-receive hooks to fail.
16+
- '{% data reusables.release-notes.ghas-3.4-secret-scanning-known-issue %}'
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
date: '2022-08-30'
2+
sections:
3+
bugs:
4+
- Site administrators were not able to manage security products settings for repositories they had unlocked.
5+
- Prevents duplication of admin SSH keys showing up in Management Console and admin/.ssh/authorized_keys
6+
- Adding a check for running replication before updating configuration files on replica stand-up before running `ghe-cluster-config-apply`. This prevents cases where unconfigured nodes could replicate their configuration to the rest of the cluster, potentially removing configurations from the existing cluster nodes.
7+
- The validation phase of the config apply run would incorrectly mark some Nomad jobs as invalid.
8+
- The symlinks for self-signed TLS certificates were no created which caused various failures in the GitHub UI.
9+
- Some background tasks could deadlock preventing them from making progress caused by `enterprise-crypto` which has now been modified to be thread safe.
10+
changes:
11+
- Performance improvements to the GitHub Enterprise Support Bundle generation process. This modifies the `sanitize_logs` function in `ghe-support-bundle` to run `psed` in parallel vs. serially. This is based on an analysis of bundle generation on `ghe.io` where it was observed we spent 36% of our time in `psed` sanitizing logs.
12+
- User generated audit-logs events, such as `repo.create`, are now correctly returned from the REST API availabe at `api.github.com/enterprises/{enterprise}/audit-log`. In addition to that, more types of user generated events, such as `project.create`, are now available on both the enterprise audit-log UI (available at `github.com/enterprises/{enterprise}/settings/audit-log`) and REST API (same endpoint as above).
13+
known_issues:
14+
- After upgrading to {% data variables.product.prodname_ghe_server %} 3.3, {% data variables.product.prodname_actions %} may fail to start automatically. To resolve this issue, connect to the appliance via SSH and run the `ghe-actions-start` command.
15+
- On a freshly set up {% data variables.product.prodname_ghe_server %} instance without any users, an attacker could create the first admin user.
16+
- Custom firewall rules are removed during the upgrade process.
17+
- Git LFS tracked files [uploaded through the web interface](https://github.com/blog/2105-upload-files-to-your-repositories) are incorrectly added directly to the repository.
18+
- Issues cannot be closed if they contain a permalink to a blob in the same repository, where the blob's file path is longer than 255 characters.
19+
- When "Users can search GitHub.com" is enabled with {% data variables.product.prodname_github_connect %}, issues in private and internal repositories are not included in {% data variables.product.prodname_dotcom_the_website %} search results.
20+
- The {% data variables.product.prodname_registry %} npm registry no longer returns a time value in metadata responses. This was done to allow for substantial performance improvements. We continue to have all the data necessary to return a time value as part of the metadata response and will resume returning this value in the future once we have solved the existing performance issues.
21+
- Resource limits that are specific to processing pre-receive hooks may cause some pre-receive hooks to fail.
22+
- '{% data variables.product.prodname_actions %} storage settings cannot be validated and saved in the {% data variables.enterprise.management_console %} when "Force Path Style" is selected, and must instead be configured with the `ghe-actions-precheck` command line utility.'
23+
- '{% data reusables.release-notes.ghas-3.4-secret-scanning-known-issue %}'
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
date: '2022-08-30'
2+
sections:
3+
bugs:
4+
- Site administrators were not able to manage security products settings for repositories they had unlocked.
5+
- Prevents duplication of admin SSH keys showing up in Management Console and admin/.ssh/authorized_keys
6+
- Adding a check for running replication before updating configuration files on replica stand-up before running `ghe-cluster-config-apply`. This prevents cases where unconfigured nodes could replicate their configuration to the rest of the cluster, potentially removing configurations from the existing cluster nodes.
7+
- The validation phase of the config apply run would incorrectly mark some Nomad jobs as invalid.
8+
- The symlinks for self-signed TLS certificates were no created which caused various failures in the GitHub UI.
9+
- Some background tasks could deadlock preventing them from making progress caused by `enterprise-crypto` which has now been modified to be thread safe.
10+
changes:
11+
- Performance improvements to the GitHub Enterprise Support Bundle generation process. This modifies the `sanitize_logs` function in `ghe-support-bundle` to run `psed` in parallel vs. serially. This is based on an analysis of bundle generation on `ghe.io` where it was observed we spent 36% of our time in `psed` sanitizing logs.
12+
- Change the `/organizations/`, `/orgs/` API routes to accept organization slugs or IDs. Previously, they only accepted slugs which was inconsistent with the `/enterprises/` routes and caused `Link` headers on GitHub Advanced Security API endpoints, that use IDs not slugs, to be inaccessible to users.
13+
- User generated audit-logs events, such as `repo.create`, are now correctly returned from the REST API availabe at `api.github.com/enterprises/{enterprise}/audit-log`. In addition to that, more types of user generated events, such as `project.create`, are now available on both the enterprise audit-log UI (available at `github.com/enterprises/{enterprise}/settings/audit-log`) and REST API (same endpoint as above).
14+
- The page at `/stafftools/users/:login/admin` contained functionality not intended for GitHub Enterprise Server.
15+
known_issues:
16+
- On a freshly set up {% data variables.product.prodname_ghe_server %} instance without any users, an attacker could create the first admin user.
17+
- Custom firewall rules are removed during the upgrade process.
18+
- Git LFS tracked files [uploaded through the web interface](https://github.com/blog/2105-upload-files-to-your-repositories) are incorrectly added directly to the repository.
19+
- Issues cannot be closed if they contain a permalink to a blob in the same repository, where the blob's file path is longer than 255 characters.
20+
- When "Users can search GitHub.com" is enabled with {% data variables.product.prodname_github_connect %}, issues in private and internal repositories are not included in {% data variables.product.prodname_dotcom_the_website %} search results.
21+
- The {% data variables.product.prodname_registry %} npm registry no longer returns a time value in metadata responses. This was done to allow for substantial performance improvements. We continue to have all the data necessary to return a time value as part of the metadata response and will resume returning this value in the future once we have solved the existing performance issues.
22+
- Resource limits that are specific to processing pre-receive hooks may cause some pre-receive hooks to fail.
23+
- |
24+
After registering a self-hosted runner with the `--ephemeral` parameter on more than one level (for example, both enterprise and organization), the runner may get stuck in an idle state and require re-registration. [Updated: 2022-06-17]
25+
- After upgrading to {% data variables.product.prodname_ghe_server %} 3.4, releases may appear to be missing from repositories. This can occur when the required Elasticsearch index migrations have not successfully completed.
26+
- '{% data reusables.release-notes.ghas-3.4-secret-scanning-known-issue %}'
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
date: '2022-08-30'
2+
sections:
3+
bugs:
4+
- Site administrators were not able to manage security products settings for repositories they had unlocked.
5+
- Prevents duplication of admin SSH keys showing up in Management Console and admin/.ssh/authorized_keys
6+
- Adding a check for running replication before updating configuration files on replica stand-up before running `ghe-cluster-config-apply`. This prevents cases where unconfigured nodes could replicate their configuration to the rest of the cluster, potentially removing configurations from the existing cluster nodes.
7+
- The validation phase of the config apply run would incorrectly mark some Nomad jobs as invalid.
8+
- The symlinks for self-signed TLS certificates were no created which caused various failures in the GitHub UI.
9+
- The top site admin bar contained a broken link to the SHA for the currently running version of the application.
10+
- Some background tasks could deadlock preventing them from making progress caused by `enterprise-crypto` which has now been modified to be thread safe.
11+
- The list of organizations on the fork screen would overflow its box when a user was in many organizations.
12+
changes:
13+
- In some cases, GitHub Advanced Security customers who skipped an upgrade to GitHub Enterprise Server 3.4 may have noticed that alerts from secret scanning were missing in the web UI and REST API. This fix recovers those impacted alerts.
14+
- Performance improvements to the GitHub Enterprise Support Bundle generation process. This modifies the `sanitize_logs` function in `ghe-support-bundle` to run `psed` in parallel vs. serially. This is based on an analysis of bundle generation on `ghe.io` where it was observed we spent 36% of our time in `psed` sanitizing logs.
15+
- Change the `/organizations/`, `/orgs/` API routes to accept organization slugs or IDs. Previously, they only accepted slugs which was inconsistent with the `/enterprises/` routes and caused `Link` headers on GitHub Advanced Security API endpoints, that use IDs not slugs, to be inaccessible to users.
16+
- User generated audit-logs events, such as `repo.create`, are now correctly returned from the REST API availabe at `api.github.com/enterprises/{enterprise}/audit-log`. In addition to that, more types of user generated events, such as `project.create`, are now available on both the enterprise audit-log UI (available at `github.com/enterprises/{enterprise}/settings/audit-log`) and REST API (same endpoint as above).
17+
- The page at `/stafftools/users/:login/admin` contained functionality not intended for GitHub Enterprise Server.
18+
- Cache replicas could intermittently reject some git operations on recently updated repositories.
19+
known_issues:
20+
- On a freshly set up {% data variables.product.prodname_ghe_server %} instance without any users, an attacker could create the first admin user.
21+
- Custom firewall rules are removed during the upgrade process.
22+
- Git LFS tracked files [uploaded through the web interface](https://github.com/blog/2105-upload-files-to-your-repositories) are incorrectly added directly to the repository.
23+
- Issues cannot be closed if they contain a permalink to a blob in the same repository, where the blob's file path is longer than 255 characters.
24+
- When "Users can search GitHub.com" is enabled with GitHub Connect, issues in private and internal repositories are not included in GitHub.com search results.
25+
- The {% data variables.product.prodname_registry %} npm registry no longer returns a time value in metadata responses. This was done to allow for substantial performance improvements. We continue to have all the data necessary to return a time value as part of the metadata response and will resume returning this value in the future once we have solved the existing performance issues.
26+
- Resource limits that are specific to processing pre-receive hooks may cause some pre-receive hooks to fail.
27+
- Actions services need to be restarted after restoring an appliance from a backup taken on a different host.
28+
- '{% data reusables.release-notes.ghas-3.4-secret-scanning-known-issue %}'
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
date: '2022-08-30'
2+
sections:
3+
bugs:
4+
- Site administrators were not able to manage security products settings for repositories they had unlocked.
5+
- Prevents duplication of admin SSH keys showing up in Management Console and admin/.ssh/authorized_keys
6+
- Adding a check for running replication before updating configuration files on replica stand-up before running `ghe-cluster-config-apply`. This prevents cases where unconfigured nodes could replicate their configuration to the rest of the cluster, potentially removing configurations from the existing cluster nodes.
7+
- The validation phase of the config apply run would incorrectly mark some Nomad jobs as invalid.
8+
- The symlinks for self-signed TLS certificates were no created which caused various failures in the GitHub UI.
9+
- Fixes an issue where organization admins were unable to set the level of access required for creating discussions.
10+
- Fixes an issue where some users were incorrectly seeing a message that they needed to verify their email before creating a discussion.
11+
- Fixes an issue with the hydro payload value. It use to not have quotes, so the problematic file name isnt being handled properly which created a potential security vulnerability in the file tree
12+
- Fixes an issue where enterprise users were incorrectly seeing a link to the GitHub.com community guidelines.
13+
- Some background tasks could deadlock preventing them from making progress caused by `enterprise-crypto` which has now been modified to be thread safe.
14+
- The top site admin bar contained a broken link to the SHA for the currently running version of the application.
15+
changes:
16+
- In some cases, GitHub Advanced Security customers who skipped an upgrade to GitHub Enterprise Server 3.4 may have noticed that alerts from secret scanning were missing in the web UI and REST API. This fix recovers those impacted alerts.
17+
- Performance improvements to the GitHub Enterprise Support Bundle generation process. This modifies the `sanitize_logs` function in `ghe-support-bundle` to run `psed` in parallel vs. serially. This is based on an analysis of bundle generation on `ghe.io` where it was observed we spent 36% of our time in `psed` sanitizing logs.
18+
- Change the `/organizations/`, `/orgs/` API routes to accept organization slugs or IDs. Previously, they only accepted slugs which was inconsistent with the `/enterprises/` routes and caused `Link` headers on GitHub Advanced Security API endpoints, that use IDs not slugs, to be inaccessible to users.
19+
- User generated audit-logs events, such as `repo.create`, are now correctly returned from the REST API availabe at `api.github.com/enterprises/{enterprise}/audit-log`. In addition to that, more types of user generated events, such as `project.create`, are now available on both the enterprise audit-log UI (available at `github.com/enterprises/{enterprise}/settings/audit-log`) and REST API (same endpoint as above).
20+
- The page at `/stafftools/users/:login/admin` contained functionality not intended for GitHub Enterprise Server.
21+
- Cache replicas could intermittently reject some git operations on recently updated repositories.
22+
- Adds support for creating dismissible announcements via the API.
23+
known_issues:
24+
- On a freshly set up {% data variables.product.prodname_ghe_server %} instance without any users, an attacker could create the first admin user.
25+
- Custom firewall rules are removed during the upgrade process.
26+
- Git LFS tracked files [uploaded through the web interface](https://github.com/blog/2105-upload-files-to-your-repositories) are incorrectly added directly to the repository.
27+
- Issues cannot be closed if they contain a permalink to a blob in the same repository, where the blob's file path is longer than 255 characters.
28+
- When "Users can search GitHub.com" is enabled with GitHub Connect, issues in private and internal repositories are not included in GitHub.com search results.
29+
- The {% data variables.product.prodname_registry %} npm registry no longer returns a time value in metadata responses. This was done to allow for substantial performance improvements. We continue to have all the data necessary to return a time value as part of the metadata response and will resume returning this value in the future once we have solved the existing performance issues.
30+
- Resource limits that are specific to processing pre-receive hooks may cause some pre-receive hooks to fail.
31+
- Actions services need to be restarted after restoring an instance from a backup taken on a different host.
32+
- In a repository's settings, enabling the option to allow users with read access to create discussions does not enable this functionality.
33+
- In some cases, users cannot convert existing issues to discussions.
34+
- Custom patterns for secret scanning have `.*` as an end delimiter, specifically in the "After secret" field. This delimiter causes inconsistencies in scans for secrets across repositories, and you may notice gaps in a repository's history where no scans completed. Incremental scans may also be impacted. To prevent issues with scans, modify the end of the pattern to remove the `.*` delimiter.
35+
- '{% data reusables.release-notes.ghas-3.4-secret-scanning-known-issue %}'

0 commit comments

Comments
 (0)