Skip to content

Commit a0109b6

Browse files
authored
Merge branch 'main' into patch-2
2 parents 2b5dab3 + ab39225 commit a0109b6

File tree

59 files changed

+7547
-7009
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+7547
-7009
lines changed

content/actions/hosting-your-own-runners/about-self-hosted-runners.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,12 @@ Your runner machine connects to {% data variables.product.product_name %} using
3131

3232
For more information about installing and using self-hosted runners, see "[Adding self-hosted runners](/github/automating-your-workflow-with-github-actions/adding-self-hosted-runners)" and "[Using self-hosted runners in a workflow](/github/automating-your-workflow-with-github-actions/using-self-hosted-runners-in-a-workflow)."
3333

34-
## {% ifversion fpt or ghes %}Differences between {% data variables.product.prodname_dotcom %}-hosted and {% elsif ghae %}Characteristics of {% endif %}self-hosted runners
34+
## {% ifversion fpt or ghec or ghes %}Differences between {% data variables.product.prodname_dotcom %}-hosted and {% elsif ghae %}Characteristics of {% endif %}self-hosted runners
3535

36-
{% ifversion fpt or ghes %}
36+
{% ifversion fpt or ghec or ghes %}
3737
{% data variables.product.prodname_dotcom %}-hosted runners offer a quicker, simpler way to run your workflows, while self-hosted{% elsif ghae %}Self-hosted{% endif %} runners are a highly configurable way to run workflows in your own custom environment. {% ifversion ghae %}Self-hosted runners:{% endif %}
3838

39-
{% ifversion fpt or ghes %}
39+
{% ifversion fpt or ghec or ghes %}
4040
**{% data variables.product.prodname_dotcom %}-hosted runners:**
4141
- Receive automatic updates for the operating system, preinstalled packages and tools, and the self-hosted runner application.
4242
- Are managed and maintained by {% data variables.product.prodname_dotcom %}.

content/actions/security-guides/security-hardening-for-github-actions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -265,13 +265,13 @@ This list describes the recommended approaches for accessing repository data wit
265265

266266
## Hardening for self-hosted runners
267267

268-
{% ifversion fpt %}
268+
{% ifversion fpt or ghec %}
269269
**{% data variables.product.prodname_dotcom %}-hosted** runners execute code within ephemeral and clean isolated virtual machines, meaning there is no way to persistently compromise this environment, or otherwise gain access to more information than was placed in this environment during the bootstrap process.
270270
{% endif %}
271271

272-
{% ifversion fpt %}**Self-hosted**{% elsif ghes or ghae %}Self-hosted{% endif %} runners for {% data variables.product.product_name %} do not have guarantees around running in ephemeral clean virtual machines, and can be persistently compromised by untrusted code in a workflow.
272+
{% ifversion fpt or ghec %}**Self-hosted**{% elsif ghes or ghae %}Self-hosted{% endif %} runners for {% data variables.product.product_name %} do not have guarantees around running in ephemeral clean virtual machines, and can be persistently compromised by untrusted code in a workflow.
273273

274-
{% ifversion fpt %}As a result, self-hosted runners should almost [never be used for public repositories](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories) on {% data variables.product.product_name %}, because any user can open pull requests against the repository and compromise the environment. Similarly, be{% elsif ghes or ghae %}Be{% endif %} cautious when using self-hosted runners on private or internal repositories, as anyone who can fork the repository and open a pull request (generally those with read-access to the repository) are able to compromise the self-hosted runner environment, including gaining access to secrets and the `GITHUB_TOKEN` which{% ifversion fpt or ghes > 3.1 or ghae or ghec %}, depending on its settings, can grant {% else %} grants {% endif %}write-access permissions on the repository. Although workflows can control access to environment secrets by using environments and required reviews, these workflows are not run in an isolated environment and are still susceptible to the same risks when run on a self-hosted runner.
274+
{% ifversion fpt or ghec %}As a result, self-hosted runners should almost [never be used for public repositories](/actions/hosting-your-own-runners/about-self-hosted-runners#self-hosted-runner-security-with-public-repositories) on {% data variables.product.product_name %}, because any user can open pull requests against the repository and compromise the environment. Similarly, be{% elsif ghes or ghae %}Be{% endif %} cautious when using self-hosted runners on private or internal repositories, as anyone who can fork the repository and open a pull request (generally those with read-access to the repository) are able to compromise the self-hosted runner environment, including gaining access to secrets and the `GITHUB_TOKEN` which{% ifversion fpt or ghes > 3.1 or ghae or ghec %}, depending on its settings, can grant {% else %} grants {% endif %}write-access permissions on the repository. Although workflows can control access to environment secrets by using environments and required reviews, these workflows are not run in an isolated environment and are still susceptible to the same risks when run on a self-hosted runner.
275275

276276
When a self-hosted runner is defined at the organization or enterprise level, {% data variables.product.product_name %} can schedule workflows from multiple repositories onto the same runner. Consequently, a security compromise of these environments can result in a wide impact. To help reduce the scope of a compromise, you can create boundaries by organizing your self-hosted runners into separate groups. For more information, see "[Managing access to self-hosted runners using groups](/actions/hosting-your-own-runners/managing-access-to-self-hosted-runners-using-groups)."
277277

content/admin/configuration/configuring-your-enterprise/command-line-utilities.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Allows you to find the universally unique identifier (UUID) of your node in `clu
114114
```
115115

116116
{% ifversion ghes %}
117-
Allows you to exempt a list of users from API rate limits. For more information, see "[Resources in the REST API](/rest/overview/resources-in-the-rest-api#rate-limiting)."
117+
Allows you to exempt a list of users from API rate limits. A hard limit of 120,000 requests will still apply to these users. For more information, see "[Resources in the REST API](/rest/overview/resources-in-the-rest-api#rate-limiting)."
118118

119119
``` shell
120120
$ ghe-config app.github.rate-limiting-exempt-users "<em>hubot</em> <em>github-actions</em>"

content/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,9 +129,11 @@ You can also configure allowed IP addresses for an individual organization. For
129129

130130
You can use a SSH certificate authorities (CA) to allow members of any organization owned by your enterprise to access that organization's repositories using SSH certificates you provide. {% data reusables.organizations.can-require-ssh-cert %} For more information, see "[About SSH certificate authorities](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities)."
131131

132+
{% data reusables.organizations.add-extension-to-cert %}
133+
132134
### Adding an SSH certificate authority
133135

134-
{% data reusables.organizations.add-extension-to-cert %}
136+
If you require SSH certificates for your enterprise, enterprise members should use a special URL for Git operations over SSH. For more information, see "[About SSH certificate authorities](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities#about-ssh-urls-with-ssh-certificates)."
135137

136138
{% data reusables.enterprise-accounts.access-enterprise %}
137139
{% data reusables.enterprise-accounts.settings-tab %}

content/authentication/managing-commit-signature-verification/checking-for-existing-gpg-keys.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,12 @@ shortTitle: Existing GPG keys
2727
{% data reusables.gpg.list-keys-with-note %}
2828
3. Check the command output to see if you have a GPG key pair.
2929
* If there are no GPG key pairs or you don't want to use any that are available for signing commits and tags, then [generate a new GPG key](/articles/generating-a-new-gpg-key).
30-
* If there's an existing GPG key pair and you want to use it to sign commits and tags, then [add your GPG key to your GitHub account](/articles/adding-a-new-gpg-key-to-your-github-account).
30+
* If there's an existing GPG key pair and you want to use it to sign commits and tags, you can display the public key using the following command, substituting in the GPG key ID you'd like to use. In this example, the GPG key ID is `3AA5C34371567BD2`:
31+
```shell
32+
$ gpg --armor --export <em>3AA5C34371567BD2</em>
33+
# Prints the GPG key ID, in ASCII armor format
34+
```
35+
You can then [add your GPG key to your GitHub account](/articles/adding-a-new-gpg-key-to-your-github-account).
3136

3237
## Further reading
3338

content/authentication/managing-commit-signature-verification/telling-git-about-your-signing-key.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,12 @@ If you have multiple GPG keys, you need to tell Git which one to use.
4444
$ if [ -r ~/.bash_profile ]; then echo 'export GPG_TTY=$(tty)' >> ~/.bash_profile; \
4545
else echo 'export GPG_TTY=$(tty)' >> ~/.profile; fi
4646
```
47+
1. Optionally, to prompt you to enter a PIN or passphrase when required, install `pinentry-mac`. For example, using [Homebrew](https://brew.sh/):
48+
```shell
49+
$ brew install pinentry-mac
50+
$ echo "pinentry-program $(which pinentry-mac)" >> ~/.gnupg/gpg-agent.conf
51+
$ killall gpg-agent
52+
```
4753

4854
{% data reusables.gpg.x-509-key %}
4955

content/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,15 @@ For example, you can build an internal system that issues a new certificate to y
2828
Organization members can use their signed certificates for authentication even if you've enforced SAML single sign-on. Unless you make SSH certificates a requirement, organization members can continue to use other means of authentication to access your organization's resources with Git, including their username and password, personal access tokens, and their own SSH keys.
2929
{% endif %}
3030

31-
Members will not be able to use their certificates to access forks of your repositories that are owned by their user accounts.
31+
Members will not be able to use their certificates to access forks of your repositories that are owned by their personal accounts.
3232

33-
To prevent authentication errors, organization members should use a special URL that includes the organization ID to clone repositories using signed certificates. Anyone with read access to the repository can find this URL on the repository page. For more information, see "[Cloning a repository](/articles/cloning-a-repository)."
33+
## About SSH URLs with SSH certificates
34+
35+
If your organization requires SSH certificates, to prevent authentication errors, organization members should use a special URL that includes the organization ID when performing Git operations over SSH. This special URL allows the client and server to more easily negotiate which key on the member's computer should be used for authentication. If a member uses the normal URL, which starts with `[email protected]`, the SSH client might offer the wrong key, causing the operation to fail.
36+
37+
Anyone with read access to the repository can find this URL by selecting the **Code** dropdown menu on the main page of the repository, then clicking **Use SSH**.
38+
39+
If your organization doesn't require SSH certificates, members can continue to use their own SSH keys, or other means of authentication. In that case, either the special URL or the normal URL, which starts with `[email protected]`, will work.
3440

3541
## Issuing certificates
3642

content/organizations/managing-git-access-to-your-organizations-repositories/managing-your-organizations-ssh-certificate-authorities.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,11 @@ Organization owners can manage an organization's SSH certificate authorities (CA
2020

2121
You can allow members to access your organization's repositories using SSH certificates you provide by adding an SSH CA to your organization. {% data reusables.organizations.can-require-ssh-cert %} For more information, see "[About SSH certificate authorities](/articles/about-ssh-certificate-authorities)."
2222

23+
{% data reusables.organizations.add-extension-to-cert %}
24+
2325
## Adding an SSH certificate authority
2426

25-
{% data reusables.organizations.add-extension-to-cert %}
27+
If you require SSH certificates for your enterprise, enterprise members should use a special URL for Git operations over SSH. For more information, see "[About SSH certificate authorities](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities#about-ssh-urls-with-ssh-certificates)."
2628

2729
{% data reusables.profile.access_org %}
2830
{% data reusables.profile.org_settings %}

content/repositories/releasing-projects-on-github/automatically-generated-release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ topics:
1212
shortTitle: Automated release notes
1313
communityRedirect:
1414
name: Provide GitHub Feedback
15-
href: 'https://github.com/github/feedback/discussions/categories/releases-feedback'
15+
href: 'https://github.com/github/feedback/discussions/categories/general-feedback'
1616
---
1717

1818
## About automatically generated release notes
@@ -100,4 +100,4 @@ changelog:
100100

101101
## Further reading
102102

103-
- "[Managing labels](/issues/using-labels-and-milestones-to-track-work/managing-labels)"
103+
- "[Managing labels](/issues/using-labels-and-milestones-to-track-work/managing-labels)"

data/graphql/ghae/graphql_upcoming_changes.public-ghae.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -114,3 +114,17 @@ upcoming_changes:
114114
date: '2021-10-01T00:00:00+00:00'
115115
criticality: breaking
116116
owner: synthead
117+
- location: PullRequest.viewerCanOverrideMergeQueue
118+
description:
119+
'`viewerCanOverrideMergeQueue` will be removed. Use PullRequest.viewerCanMergeAsAdmin
120+
instead.'
121+
reason: '`viewer_can_override_merge_queue` will be removed'
122+
date: '2022-04-01'
123+
criticality: breaking
124+
owner: cbeaman
125+
- location: Repository.defaultMergeQueue
126+
description: '`defaultMergeQueue` will be removed. Use `Repository.mergeQueue` instead.'
127+
reason: '`defaultMergeQueue` will be removed.'
128+
date: '2022-04-01'
129+
criticality: breaking
130+
owner: colinshum

0 commit comments

Comments
 (0)