Skip to content

Commit 5392c3b

Browse files
authored
Merge branch 'main' into rm-deprecated-substr
2 parents 464e527 + aa97005 commit 5392c3b

File tree

117 files changed

+1435
-770
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

117 files changed

+1435
-770
lines changed

.devcontainer/devcontainer.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222
"davidanson.vscode-markdownlint",
2323
"bierner.markdown-preview-github-styles",
2424
"streetsidesoftware.code-spell-checker",
25-
"docs.open-reusables"
25+
"alistairchristie.open-reusables"
2626
],
2727

2828
// Use 'forwardPorts' to make a list of ports inside the container available locally.

content/actions/security-guides/encrypted-secrets.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -227,6 +227,10 @@ steps:
227227
```
228228
{% endraw %}
229229
230+
Secrets cannot be directly referenced in `if:` conditionals. Instead, consider setting secrets as job-level environment variables, then referencing the environment variables to conditionally run steps in the job. For more information, see "[Context availability](/actions/learn-github-actions/contexts#context-availability)" and [`jobs.<job_id>.steps[*].if`](/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsif).
231+
232+
If a secret has not been set, the return value of an expression referencing the secret (such as {% raw %}`${{ secrets.SuperSecret }}`{% endraw %} in the example) will be an empty string.
233+
230234
Avoid passing secrets between processes from the command line, whenever possible. Command-line processes may be visible to other users (using the `ps` command) or captured by [security audit events](https://docs.microsoft.com/windows-server/identity/ad-ds/manage/component-updates/command-line-process-auditing). To help protect secrets, consider using environment variables, `STDIN`, or other mechanisms supported by the target process.
231235
232236
If you must pass secrets within a command line, then enclose them within the proper quoting rules. Secrets often contain special characters that may unintentionally affect your shell. To escape these special characters, use quoting with your environment variables. For example:

content/actions/using-workflows/workflow-syntax-for-github-actions.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -342,6 +342,31 @@ steps:
342342
uses: actions/[email protected]
343343
```
344344

345+
#### Example: Using secrets
346+
347+
Secrets cannot be directly referenced in `if:` conditionals. Instead, consider setting secrets as job-level environment variables, then referencing the environment variables to conditionally run steps in the job.
348+
349+
If a secret has not been set, the return value of an expression referencing the secret (such as {% raw %}`${{ secrets.SuperSecret }}`{% endraw %} in the example) will be an empty string.
350+
351+
{% raw %}
352+
```yaml
353+
name: Run a step if a secret has been set
354+
on: push
355+
jobs:
356+
my-jobname:
357+
runs-on: ubuntu-latest
358+
env:
359+
super_secret: ${{ secrets.SuperSecret }}
360+
steps:
361+
- if: ${{ env.super_secret != '' }}
362+
run: echo 'This step will only run if the secret has a value set.'
363+
- if: ${{ env.super_secret == '' }}
364+
run: echo 'This step will only run if the secret does not have a value set.'
365+
```
366+
{% endraw %}
367+
368+
For more information, see "[Context availability](/actions/learn-github-actions/contexts#context-availability)" and "[Encrypted secrets](/actions/security-guides/encrypted-secrets)."
369+
345370
### `jobs.<job_id>.steps[*].name`
346371

347372
A name for your step to display on {% data variables.product.prodname_dotcom %}.

content/code-security/dependabot/dependabot-alerts/about-dependabot-alerts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ redirect_from:
77
- /github/managing-security-vulnerabilities/about-alerts-for-vulnerable-dependencies
88
- /code-security/supply-chain-security/about-alerts-for-vulnerable-dependencies
99
- /code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies/about-alerts-for-vulnerable-dependencies
10-
- /code-security/supply-chain-security/managing-vulnerabilities-in-your-projects-dependencies
1110
versions:
1211
fpt: '*'
1312
ghes: '*'

content/code-security/supply-chain-security/understanding-your-software-supply-chain/about-supply-chain-security.md

Lines changed: 156 additions & 0 deletions
Large diffs are not rendered by default.

content/code-security/supply-chain-security/understanding-your-software-supply-chain/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ topics:
1111
- Repositories
1212
shortTitle: Understand your supply chain
1313
children:
14+
- /about-supply-chain-security
1415
- /about-the-dependency-graph
1516
- /about-dependency-review
1617
- /exploring-the-dependencies-of-a-repository

content/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -163,5 +163,5 @@ You can manage access to {% data variables.product.prodname_GH_advanced_security
163163

164164
- "[Securing your repository](/code-security/getting-started/securing-your-repository)"{% ifversion not fpt %}
165165
- "[About secret scanning](/github/administering-a-repository/about-secret-scanning)"{% endif %}{% ifversion not ghae %}
166-
- "[About the dependency graph](/github/visualizing-repository-data-with-graphs/about-the-dependency-graph)"{% endif %}{% ifversion fpt or ghec or ghes > 3.2 %}
167-
- "[Keeping your dependencies updated automatically](/github/administering-a-repository/keeping-your-dependencies-updated-automatically)"{% endif %}
166+
- "[About the dependency graph](/github/visualizing-repository-data-with-graphs/about-the-dependency-graph)"{% endif %}{% ifversion fpt or ghec or ghes or ghae-issue-4864 %}
167+
- "[About supply chain security](/code-security/supply-chain-security/understanding-your-software-supply-chain/about-supply-chain-security)"{% endif %}

content/pages/setting-up-a-github-pages-site-with-jekyll/testing-your-github-pages-site-locally-with-jekyll.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,12 @@ Before you can use Jekyll to test a site, you must:
5050
```
5151
3. To preview your site, in your web browser, navigate to `http://localhost:4000`.
5252

53+
{% note %}
54+
55+
**Note:** If you are using Ruby 3.0 and Jekyll 4.2.x or older, you will need to add the `webrick` gem to your project's Gemfile prior to running `bundle install`.
56+
57+
{% endnote %}
58+
5359
## Updating the {% data variables.product.prodname_pages %} gem
5460

5561
Jekyll is an active open source project that is updated frequently. If the `github-pages` gem on your computer is out of date with the `github-pages` gem on the {% data variables.product.prodname_pages %} server, your site may look different when built locally than when published on {% data variables.product.product_name %}. To avoid this, regularly update the `github-pages` gem on your computer.

data/reusables/secret-scanning/partner-secret-list-public-repo.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,7 @@ MessageBird | MessageBird API Key
5858
Meta | Facebook Access Token
5959
npm | npm Access Token
6060
NuGet | NuGet API Key
61+
Octopus Deploy | Octopus Deploy API Key
6162
OpenAI | OpenAI API Key
6263
Palantir | Palantir JSON Web Token
6364
PlanetScale | PlanetScale Database Password

0 commit comments

Comments
 (0)