Skip to content

Commit da83842

Browse files
authored
Merge branch 'main' into copilot-ga-megabranch
2 parents 258033c + ef1842e commit da83842

File tree

112 files changed

+193049
-8202
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+193049
-8202
lines changed

content/admin/identity-and-access-management/using-saml-for-enterprise-iam/saml-configuration-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ The following SAML attributes are available for {% data variables.product.produc
8080
| `NameID` | Yes | A persistent user identifier. Any persistent name identifier format may be used. {% ifversion ghec %}If you use an enterprise with {% data variables.product.prodname_emus %}, {% endif %}{% data variables.product.product_name %} will normalize the `NameID` element to use as a username unless one of the alternative assertions is provided. For more information, see "[Username considerations for external authentication](/admin/identity-and-access-management/managing-iam-for-your-enterprise/username-considerations-for-external-authentication)." |
8181
| `SessionNotOnOrAfter` | No | The date that {% data variables.product.product_name %} invalidates the associated session. After invalidation, the person must authenticate once again to access {% ifversion ghec or ghae %}your enterprise's resources{% elsif ghes %}{% data variables.product.product_location %}{% endif %}. For more information, see "[Session duration and timeout](#session-duration-and-timeout)." |
8282
{%- ifversion ghes or ghae %}
83-
| `administrator` | No | When the value is `true`, {% data variables.product.product_name %} will automatically promote the user to be a {% ifversion ghes %}site administrator{% elsif ghae %}enterprise owner{% endif %}. Any other value or a non-existent value will demote the account and remove administrative access. |
83+
| `administrator` | No | When the value is `true`, {% data variables.product.product_name %} will automatically promote the user to be a {% ifversion ghes %}site administrator{% elsif ghae %}enterprise owner{% endif %}. Setting this attribute to anything but `true` will result in demotion, as long as the value is not blank. Omitting this attribute or leaving the value blank will not change the role of the user. |
8484
| `username` | No | The username for {% data variables.product.product_location %}. |
8585
{%- endif %}
8686
| `full_name` | No | {% ifversion ghec %}If you configure SAML SSO for an enterprise and you use {% data variables.product.prodname_emus %}, the{% else %}The{% endif %} full name of the user to display on the user's profile page. |

content/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,19 @@ The dependency review feature becomes available when you enable the dependency g
5050

5151
{% data reusables.dependency-review.dependency-review-action-beta-note %}
5252

53-
You can use the Dependency Review GitHub Action in your repository to enforce dependency reviews on your pull requests. The action scans for vulnerable versions of dependencies introduced by package version changes in pull requests, and warns you about the associated security vulnerabilities. This gives you better visibility of what's changing in a pull request, and helps prevent vulnerabilities being added to your repository. For more information, see [`dependency-review-action`](https://github.com/actions/dependency-review-action).
53+
The action is available for all {% ifversion fpt or ghec %}public repositories, as well as private {% endif %}repositories that have {% data variables.product.prodname_GH_advanced_security %} enabled.
54+
55+
You can use the {% data variables.product.prodname_dependency_review_action %} in your repository to enforce dependency reviews on your pull requests. The action scans for vulnerable versions of dependencies introduced by package version changes in pull requests, and warns you about the associated security vulnerabilities. This gives you better visibility of what's changing in a pull request, and helps prevent vulnerabilities being added to your repository. For more information, see [`dependency-review-action`](https://github.com/actions/dependency-review-action).
5456

5557
![Dependency review action example](/assets/images/help/graphs/dependency-review-action.png)
5658

57-
The Dependency Review GitHub Action check will fail if it discovers any vulnerable package, but will only block a pull request from being merged if the repository owner has required the check to pass before merging. For more information, see "[About protected branches](/repositories/configuring-branches-and-merges-in-your-repository/defining-the-mergeability-of-pull-requests/about-protected-branches#require-status-checks-before-merging)."
59+
By default, the {% data variables.product.prodname_dependency_review_action %} check will fail if it discovers any vulnerable packages. A failed check blocks a pull request from being merged when the repository owner requires the dependency review check to pass. For more information, see "[About protected branches](/repositories/configuring-branches-and-merges-in-your-repository/defining-the-mergeability-of-pull-requests/about-protected-branches#require-status-checks-before-merging)."
5860

5961
The action uses the Dependency Review REST API to get the diff of dependency changes between the base commit and head commit. You can use the Dependency Review API to get the diff of dependency changes, including vulnerability data, between any two commits on a repository. For more information, see "[Dependency review](/rest/reference/dependency-graph#dependency-review)."
62+
63+
{% ifversion dependency-review-action-configuration %}
64+
You can configure the {% data variables.product.prodname_dependency_review_action %} to better suit your needs. For example, you can specify the severity level that will make the action fail, or set an allow or deny list for licenses to scan. For more information, see "[Configuring dependency review](/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review#configuring-the-dependency-review-github-action)."
6065
{% endif %}
66+
67+
{% endif %}
68+

content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review.md

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,3 +50,56 @@ Dependency review is available when dependency graph is enabled for {% data vari
5050
![Screenshot of "Code security and analysis" features"](/assets/images/enterprise/3.2/repository/code-security-and-analysis-enable-ghas-3.2.png){% endif %}{% ifversion ghes > 3.2 %}
5151
![Screenshot of "Code security and analysis" features"](/assets/images/enterprise/3.4/repository/code-security-and-analysis-enable-ghas-3.4.png){% endif %}
5252
{% endif %}
53+
54+
{% ifversion dependency-review-action-configuration %}
55+
## Configuring the {% data variables.product.prodname_dependency_review_action %}
56+
57+
{% data reusables.dependency-review.dependency-review-action-beta-note %}
58+
{% data reusables.dependency-review.dependency-review-action-overview %}
59+
60+
The following configuration options are available.
61+
62+
| Option | Required | Usage |
63+
|------------------|-------------------------------|--------|
64+
| `fail-on-severity` | Optional | Defines the threshold for level of severity (`low`, `moderate`, `high`, `critical`).</br>The action will fail on any pull requests that introduce vulnerabilities of the specified severity level or higher. |
65+
| `allow-licenses` | Optional | Contains a list of allowed licenses. You can find the possible values for this parameter in the [Licenses](/rest/licenses) page of the API documentation.</br>The action will fail on pull requests that introduce dependencies with licenses that do not match the list.|
66+
| `deny-licenses` | Optional | Contains a list of prohibited licenses. You can find the possible values for this parameter in the [Licenses](/rest/licenses) page of the API documentation.</br>The action will fail on pull requests that introduce dependencies with licenses that match the list.|
67+
68+
{% tip %}
69+
70+
**Tip:** The `allow-licenses` and `deny-licenses` options are mutually exclusive.
71+
72+
{% endtip %}
73+
74+
This {% data variables.product.prodname_dependency_review_action %} example file illustrates how you can use these configuration options.
75+
76+
```yaml{:copy}
77+
name: 'Dependency Review'
78+
on: [pull_request]
79+
80+
permissions:
81+
contents: read
82+
83+
jobs:
84+
dependency-review:
85+
runs-on: ubuntu-latest
86+
steps:
87+
- name: 'Checkout Repository'
88+
uses: {% data reusables.actions.action-checkout %}
89+
- name: Dependency Review
90+
uses: actions/dependency-review-action@v2
91+
with:
92+
# Possible values: "critical", "high", "moderate", "low"
93+
fail-on-severity: critical
94+
# You can only can only include one of these two options: `allow-licenses` and `deny-licences`
95+
# ([String]). Only allow these licenses (optional)
96+
# Possible values: Any `spdx_id` value(s) from https://docs.github.com/en/rest/licenses
97+
# allow-licenses: GPL-3.0, BSD-3-Clause, MIT
98+
99+
# ([String]). Block the pull request on these licenses (optional)
100+
# Possible values: Any `spdx_id` value(s) from https://docs.github.com/en/rest/licenses
101+
# deny-licenses: LGPL-2.0, BSD-2-Clause
102+
```
103+
104+
For further details about the configuration options, see [`dependency-review-action`](https://github.com/actions/dependency-review-action#readme).
105+
{% endif %}

content/get-started/exploring-projects-on-github/saving-repositories-with-stars.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,16 @@ Starring a repository is a simple two-step process.
4141
![Untarring a repository](/assets/images/help/stars/unstarring-a-repository.png)
4242

4343
{% ifversion fpt or ghec %}
44+
45+
## Viewing who has starred a repository
46+
47+
48+
You can view everyone who has starred a public repository or a private repository you have access to.
49+
50+
51+
To view everyone who has starred a repository, add `/stargazers` to the end of the URL of a repository. For example, to view stargazers for the github/docs repository, visit https://github.com/github/docs/stargazers.
52+
53+
4454
## Organizing starred repositories with lists
4555

4656
{% note %}

content/get-started/quickstart/contributing-to-projects.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ gh repo fork <em>repository</em> --clone=true
8282

8383
## Making and pushing changes
8484

85-
Go ahead and make a few changes to the project using your favorite text editor, like [Atom](https://atom.io). You could, for example, change the text in `index.html` to add your GitHub username.
85+
Go ahead and make a few changes to the project using your favorite text editor, like [Visual Studio Code](https://code.visualstudio.com). You could, for example, change the text in `index.html` to add your GitHub username.
8686

8787
When you're ready to submit your changes, stage and commit your changes. `git add .` tells Git that you want to include all of your changes in the next commit. `git commit` takes a snapshot of those changes.
8888

content/pull-requests/collaborating-with-pull-requests/reviewing-changes-in-pull-requests/reviewing-dependency-changes-in-a-pull-request.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,14 @@ shortTitle: Review dependency changes
3535
Dependency review allows you to "shift left". You can use the provided predictive information to catch vulnerable dependencies before they hit production. For more information, see "[About dependency review](/code-security/supply-chain-security/about-dependency-review)."
3636

3737
{% ifversion fpt or ghec or ghes > 3.5 or ghae-issue-6396 %}
38-
You can use the Dependency Review GitHub Action to help enforce dependency reviews on pull requests in your repository. For more information, see "[Dependency review enforcement](/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement)."
38+
39+
You can use the {% data variables.product.prodname_dependency_review_action %} to help enforce dependency reviews on pull requests in your repository. {% data reusables.dependency-review.dependency-review-action-overview %}
40+
41+
{% ifversion dependency-review-action-configuration %}
42+
You can configure the {% data variables.product.prodname_dependency_review_action %} to better suit your needs by specifying the type of dependency vulnerability you wish to catch. For more information, see "[Configuring dependency review](/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review#configuring-the-dependency-review-github-action)."
3943
{% endif %}
4044

45+
{% endif %}
4146
## Reviewing dependencies in a pull request
4247

4348
{% data reusables.repositories.sidebar-pr %}

content/pull-requests/collaborating-with-pull-requests/working-with-forks/syncing-a-fork.md

Lines changed: 2 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -77,14 +77,8 @@ Before you can sync your fork with an upstream repository, you must [configure a
7777
> 2 files changed, 7 insertions(+), 9 deletions(-)
7878
> delete mode 100644 README
7979
> create mode 100644 README.md
80-
``` If your local branch didn't have any unique commits, Git will instead perform a "fast-forward":
81-
```shell
82-
$ git merge upstream/main
83-
> Updating 34e91da..16c56ad
84-
> Fast-forward
85-
> README.md | 5 +++--
86-
> 1 file changed, 3 insertions(+), 2 deletions(-)
87-
```
80+
```
81+
8882

8983
{% tip %}
9084

content/rest/overview/libraries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ topics:
2626

2727
{% warning %}
2828

29-
Warning: As of late October 2021, the offical Octokit libraries are not currently maintained. For more information, see [this discussion in the octokit.js repository](https://github.com/octokit/octokit.js/discussions/620).
29+
Warning: As of late October 2021, the official Octokit libraries are not currently maintained. For more information, see [this discussion in the octokit.js repository](https://github.com/octokit/octokit.js/discussions/620).
3030

3131
{% endwarning %}
3232

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
# Reference: Issue #7061 Configuring the dependency review action - [Public Beta]
2+
versions:
3+
fpt: '*'
4+
ghec: '*'
5+
ghes: '>3.5'
6+
ghae: 'issue-7061'

data/release-notes/enterprise-server/3-1/0.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,11 @@ sections:
163163
- heading: Deprecation of XenServer Hypervisor support
164164
notes:
165165
- Beginning in {% data variables.product.prodname_ghe_server %} 3.1, we will begin discontinuing support for Xen Hypervisor. The complete deprecation is scheduled for {% data variables.product.prodname_ghe_server %} 3.3, following the standard one year deprecation window.
166+
- heading: Change to the format of authentication tokens affects GitHub Connect
167+
notes:
168+
# https://github.com/github/releases/issues/1235
169+
- |
170+
GitHub Connect will no longer work after June 3rd for instances running GitHub Enterprise Server 3.1 or older, due to the format of GitHub authentication tokens changing. To continue using GitHub Connect, upgrade to GitHub Enterprise Server 3.2 or later. For more information, see the [GitHub Blog](https://github.blog/2022-05-20-action-needed-by-github-connect-customers-using-ghes-3-1-and-older-to-adopt-new-authentication-token-format-updates/). [Updated: 2022-06-14]
166171
167172
backups:
168173
- '{% data variables.product.prodname_ghe_server %} 3.1 requires at least [GitHub Enterprise Backup Utilities 3.1.0](https://github.com/github/backup-utils) for [Backups and Disaster Recovery](/[email protected]/admin/configuration/configuring-backups-on-your-appliance).'

0 commit comments

Comments
 (0)