Skip to content

Commit d5bd8c1

Browse files
authored
Merge pull request #37562 from github/repo-sync
Repo sync
2 parents c1462ec + da6b6ec commit d5bd8c1

File tree

15 files changed

+174
-14
lines changed

15 files changed

+174
-14
lines changed

content/account-and-profile/managing-subscriptions-and-notifications-on-github/setting-up-notifications/configuring-notifications.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,6 +160,17 @@ The `reply-to` address on each email notification identifies the thread and the
160160

161161
## Automatic watching
162162

163+
<!-- expires 2025-05-18 -->
164+
165+
<!-- When this expires, remove the Automatic watching section for FPT/GHEC but keep it for GHES <=3.17 -->
166+
167+
{% ifversion fpt or ghec %}
168+
169+
>[!WARNING] Starting May 18, 2025, {% data variables.product.company_short %} will deprecate automatic watching of repositories and teams. Existing subscriptions will remain unaffected, ensuring you can stay subscribed to repositories or teams that you were previously watching.
170+
171+
{% endif %}
172+
<!-- end expires 2025-05-18 -->
173+
163174
By default, anytime you gain access to a new repository, you will automatically begin watching that repository. Anytime you join a new team, you will automatically be subscribed to updates and receive notifications when that team is @mentioned. If you don't want to automatically be subscribed, you can unselect the automatic watching options in your notification settings.
164175

165176
{% ifversion update-notification-settings-22 %}

content/actions/security-for-github-actions/security-guides/automatic-token-authentication.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@ The following table shows the permissions granted to the `GITHUB_TOKEN` by defau
9292
| {% endif %} |
9393
| issues | read/write | none | read |
9494
| metadata | read | read | read |
95+
| models | read | none | none |
9596
| packages | read/write | read | read |
9697
| pages | read/write | none | read |
9798
| pull-requests | read/write | none | read |

content/actions/security-for-github-actions/using-artifact-attestations/enforcing-artifact-attestations-with-a-kubernetes-admission-controller.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ First, install the Helm chart that deploys the Sigstore Policy Controller:
5555
helm upgrade policy-controller --install --atomic \
5656
--create-namespace --namespace artifact-attestations \
5757
oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller \
58-
--version v0.12.0-github10
58+
--version v0.12.0-github12
5959
```
6060

6161
This installs the Policy Controller into the `artifact-attestations` namespace. At this point, no policies have been configured, and it will not enforce any attestations.
@@ -139,7 +139,7 @@ To see the full set of options you may configure with the Helm chart, you can ru
139139
For policy controller options:
140140

141141
```bash copy
142-
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller --version v0.12.0-github10
142+
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller --version v0.12.0-github12
143143
```
144144

145145
For trust policy options:

src/audit-logs/data/fpt/organization.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2814,6 +2814,16 @@
28142814
"description": "Branch protections were enabled for this repository.",
28152815
"docs_reference_links": "/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/managing-a-branch-protection-rule"
28162816
},
2817+
{
2818+
"action": "repository_code_security.disable",
2819+
"description": "Code security was disabled for a repository.",
2820+
"docs_reference_links": "N/A"
2821+
},
2822+
{
2823+
"action": "repository_code_security.enable",
2824+
"description": "Code security was enabled for a repository.",
2825+
"docs_reference_links": "N/A"
2826+
},
28172827
{
28182828
"action": "repository_content_analysis.disable",
28192829
"description": "Data use settings were disabled for a private repository.",

src/audit-logs/data/ghec/enterprise.json

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -222,12 +222,12 @@
222222
{
223223
"action": "business.code_scanning_autofix_third_party_tools_policy_update",
224224
"description": "The policy for Code scanning autofix third party tools was updated for an enterprise.",
225-
"docs_reference_links": "N/A"
225+
"docs_reference_links": "/code-security/getting-started/github-security-features#available-with-github-code-security"
226226
},
227227
{
228228
"action": "business.code_security_enablement_policy_update",
229229
"description": "The policy for Code Security enablement was updated for an enterprise.",
230-
"docs_reference_links": "N/A"
230+
"docs_reference_links": "/code-security/getting-started/github-security-features#available-with-github-code-security"
231231
},
232232
{
233233
"action": "business.connect_usage_metrics_export",
@@ -3569,6 +3569,16 @@
35693569
"description": "Branch protections were enabled for this repository.",
35703570
"docs_reference_links": "/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/managing-a-branch-protection-rule"
35713571
},
3572+
{
3573+
"action": "repository_code_security.disable",
3574+
"description": "Code security was disabled for a repository.",
3575+
"docs_reference_links": "N/A"
3576+
},
3577+
{
3578+
"action": "repository_code_security.enable",
3579+
"description": "Code security was enabled for a repository.",
3580+
"docs_reference_links": "N/A"
3581+
},
35723582
{
35733583
"action": "repository_content_analysis.disable",
35743584
"description": "Data use settings were disabled for a private repository.",

src/audit-logs/data/ghec/organization.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2814,6 +2814,16 @@
28142814
"description": "Branch protections were enabled for this repository.",
28152815
"docs_reference_links": "/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/managing-a-branch-protection-rule"
28162816
},
2817+
{
2818+
"action": "repository_code_security.disable",
2819+
"description": "Code security was disabled for a repository.",
2820+
"docs_reference_links": "N/A"
2821+
},
2822+
{
2823+
"action": "repository_code_security.enable",
2824+
"description": "Code security was enabled for a repository.",
2825+
"docs_reference_links": "N/A"
2826+
},
28172827
{
28182828
"action": "repository_content_analysis.disable",
28192829
"description": "Data use settings were disabled for a private repository.",

src/audit-logs/data/ghes-3.16/enterprise.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@
167167
{
168168
"action": "business.code_scanning_autofix_third_party_tools_policy_update",
169169
"description": "The policy for Code scanning autofix third party tools was updated for an enterprise.",
170-
"docs_reference_links": "N/A"
170+
"docs_reference_links": "/code-security/getting-started/github-security-features#available-with-github-code-security"
171171
},
172172
{
173173
"action": "business.create",

src/audit-logs/data/ghes-3.17/enterprise.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,12 +167,12 @@
167167
{
168168
"action": "business.code_scanning_autofix_third_party_tools_policy_update",
169169
"description": "The policy for Code scanning autofix third party tools was updated for an enterprise.",
170-
"docs_reference_links": "N/A"
170+
"docs_reference_links": "/code-security/getting-started/github-security-features#available-with-github-code-security"
171171
},
172172
{
173173
"action": "business.code_security_enablement_policy_update",
174174
"description": "The policy for Code Security enablement was updated for an enterprise.",
175-
"docs_reference_links": "N/A"
175+
"docs_reference_links": "/code-security/getting-started/github-security-features#available-with-github-code-security"
176176
},
177177
{
178178
"action": "business.create",

src/audit-logs/lib/config.json

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,5 @@
33
"apiOnlyEvents": "This event is not available in the web interface, only via the REST API, audit log streaming, or JSON/CSV exports.",
44
"apiRequestEvent": "This event is only available via audit log streaming."
55
},
6-
"sha": "d6aa2c08e5ced4ad92d2d6563fabaa683a9a7663"
7-
}
8-
6+
"sha": "ae4d8faa66c3986541a6db3a45bcf66e839fd773"
7+
}

src/graphql/data/fpt/changelog.json

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,18 @@
11
[
2+
{
3+
"schemaChanges": [
4+
{
5+
"title": "The GraphQL schema includes these changes:",
6+
"changes": [
7+
"<p>Type <code>RepositorySuggestedActorFilter</code> was added</p>",
8+
"<p>Argument 'capabilities: [RepositorySuggestedActorFilter!]!<code>added to field</code>Repository.suggestedActors'</p>"
9+
]
10+
}
11+
],
12+
"previewChanges": [],
13+
"upcomingChanges": [],
14+
"date": "2025-04-15"
15+
},
216
{
317
"schemaChanges": [
418
{

0 commit comments

Comments
 (0)