Skip to content

Commit d951e3b

Browse files
committed
Merge branch 'discussions-edits' of github.com:github/docs into discussions-edits
2 parents 35aa205 + 67c614c commit d951e3b

File tree

18 files changed

+210
-28
lines changed

18 files changed

+210
-28
lines changed

.github/workflows/sync-audit-logs.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,8 +87,8 @@ jobs:
8787
echo "Creating pull request..."
8888
gh pr create \
8989
--title "Update audit log event data" \
90-
--body '👋 humans. This PR updates the audit log event data with the latest changes. (Synced from github/audit-log-allowlists)
91-
90+
--body '👋 Docs First Responder. This PR updates the audit log event data with the latest changes, synced from github/audit-log-allowlists.
91+
Make sure the PR builds successfully and there are no gross errors (for example, a file is deleted). You do not need to validate the contents (that is the responsibility of product teams).
9292
If CI does not pass or other problems arise, contact #docs-engineering on slack.' \
9393
--repo github/docs-internal \
9494
--label audit-log-pipeline \

.github/workflows/sync-openapi.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,8 @@ jobs:
110110
--title "Update OpenAPI Description" \
111111
--body '👋 humans. This PR updates the OpenAPI description with the latest changes. (Synced from github/rest-api-description@${{ steps.rest-api-description.outputs.OPENAPI_COMMIT_SHA }})
112112
113+
Docs First Responders should follow [the acting-as-the-first-responder instructions](https://github.com/github/docs-team/blob/main/contributing-to-docs/first-responder/acting-as-the-first-responder.md?plain=1#L156).
114+
113115
If CI does not pass or other problems arise, contact #docs-engineering on slack.' \
114116
--repo github/docs-internal \
115117
--label github-openapi-bot \
60.8 KB
Loading
17.5 KB
Loading
167 KB
Loading

content/actions/hosting-your-own-runners/managing-self-hosted-runners-with-actions-runner-controller/authenticating-to-the-github-api.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,46 @@ ARC can use {% data variables.product.pat_v1_plural %} to register self-hosted r
8585
8686
{% data reusables.actions.actions-runner-controller-helm-chart-options %}
8787
88+
## Authenticating ARC with a {% data variables.product.pat_v2 %}
89+
90+
ARC can use {% data variables.product.pat_v2_plural %} to register self-hosted runners.
91+
92+
{% ifversion ghec or ghes %}
93+
94+
> [!NOTE]
95+
> Authenticating ARC with a {% data variables.product.pat_v1 %} is the only supported authentication method to register runners at the enterprise level.
96+
97+
{% endif %}
98+
99+
1. Create a {% data variables.product.pat_v2 %} with the required scopes. The required scopes are different depending on whether you are registering runners at the repository or organization level. For more information on how to create a {% data variables.product.pat_v2 %}, see [AUTOTITLE](/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token#creating-a-fine-grained-personal-access-token).
100+
101+
The following is the list of required {% data variables.product.pat_generic %} scopes for ARC runners.
102+
103+
* Repository runners:
104+
* **Administration:** Read and write
105+
106+
* Organization runners:
107+
* **Administration:** Read
108+
* **Self-hosted runners:** Read and write
109+
110+
1. To create a Kubernetes secret with the value of your {% data variables.product.pat_v2 %}, use the following command.
111+
112+
{% data reusables.actions.arc-runners-namespace %}
113+
114+
```bash copy
115+
kubectl create secret generic pre-defined-secret \
116+
--namespace=arc-runners \
117+
--from-literal=github_token='YOUR-PAT'
118+
```
119+
120+
1. In your copy of the [`values.yaml`](https://github.com/actions/actions-runner-controller/blob/master/charts/gha-runner-scale-set/values.yaml) file, pass the secret name as a reference.
121+
122+
```yaml
123+
githubConfigSecret: pre-defined-secret
124+
```
125+
126+
{% data reusables.actions.actions-runner-controller-helm-chart-options %}
127+
88128
## Authenticating ARC with vault secrets
89129
90130
> [!NOTE]

content/admin/configuring-settings/hardening-security-for-your-enterprise/enabling-private-mode.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,5 @@ With private mode enabled, you can allow unauthenticated Git operations (and any
3131

3232
{% data reusables.enterprise_site_admin_settings.access-settings %}
3333
{% data reusables.enterprise_site_admin_settings.management-console %}
34-
{% data reusables.enterprise_management_console.privacy %}
3534
1. Select **Private mode**.
3635
{% data reusables.enterprise_management_console.save-settings %}

content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-github-actions-in-your-enterprise.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@ When specifying actions{% ifversion actions-workflow-policy %} and reusable work
7777
* To allow all actions{% ifversion actions-workflow-policy %} and reusable workflows{% endif %} in organizations that start with `space-org`, use `space-org*/*`.
7878
* To allow all actions{% ifversion actions-workflow-policy %} and reusable workflows{% endif %} in repositories that start with octocat, use `*/octocat**@*`.
7979

80+
Policies never restrict access to local actions on the runner filesystem (where the `uses:` path start with `./`).
81+
8082
## Runners
8183

8284
By default, anyone with admin access to a repository can add a self-hosted runner for the repository, and self-hosted runners come with risks:

content/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -207,6 +207,9 @@ If your workflow does not contain a matrix called `language`, then {% data varia
207207
languages: c-cpp, csharp, python
208208
```
209209

210+
> [!NOTE]
211+
> When analyzing languages sequentially, the default build-mode for every language will be used. Alternatively, if you provide an explicit `autobuild` step, then every language that supports the `autobuild` mode will use it while other languages use their default mode. If a more complex build-mode configuration than this is required, then you will need to use a `language` matrix.
212+
210213
## Defining the alert severities that cause a check failure for a pull request
211214

212215
{% ifversion code-scanning-merge-protection-rulesets %}

content/get-started/learning-to-code/finding-and-fixing-your-first-code-vulnerability.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -79,3 +79,5 @@ To secure our project quickly and easily, let's use {% data variables.copilot.co
7979
## Next steps
8080

8181
Now that you've tried out {% data variables.product.prodname_code_scanning %} on a demo repository, **enable it on your own projects** to quickly find and fix current and future vulnerabilities.
82+
83+
Now that you've secured the code you've written yourself, take the next step towards secure code by checking the security of your **dependencies**. See [AUTOTITLE](/get-started/learning-to-code/finding-and-fixing-your-first-dependency-vulnerability).

0 commit comments

Comments
 (0)