Skip to content

Commit 497659b

Browse files
authored
Merge pull request #44053 from github/repo-sync
Repo sync
2 parents 9cea44a + de8dd04 commit 497659b

150 files changed

Lines changed: 42587 additions & 727 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

content/actions/concepts/security/openid-connect.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -166,6 +166,8 @@ You can use the `repo_property_*` claims in your cloud provider's trust conditio
166166

167167
{% endif %}
168168

169+
{% ifversion dependabot-oidc-support %}
170+
169171
## OIDC support for {% data variables.product.prodname_dependabot %}
170172

171173
{% data variables.product.prodname_dependabot %} can use OIDC to authenticate with private registries, eliminating the need to store long-lived credentials as repository secrets. With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider.
@@ -180,6 +182,8 @@ The benefits of OIDC authentication for {% data variables.product.prodname_depen
180182

181183
For more information, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot#using-oidc-for-authentication).
182184

185+
{% endif %}
186+
183187
## Next steps
184188

185189
For more information about configuring OIDC, see [AUTOTITLE](/actions/how-tos/security-for-github-actions/security-hardening-your-deployments).

content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-security-settings-in-your-enterprise.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,8 @@ Before you require secure methods of two-factor authentication, we recommend not
7676

7777
You can use a SSH certificate authority (CA) to allow members of any organization owned by your enterprise to access that organization's repositories using SSH certificates you provide. {% ifversion ssh-user-ca %}{% ifversion ghec %}If your enterprise uses {% data variables.product.prodname_emus %}, enterprise{% elsif ghes %}Enterprise{% endif %} members can also be allowed to use the certificate to access personally-owned repositories.{% endif %} {% data reusables.organizations.can-require-ssh-cert %} For more information, see [AUTOTITLE](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities).
7878

79+
{% data variables.product.github %} uses OpenSSH-format SSH user certificates to authenticate Git operations over SSH by validating the certificate's signature and fields (including its validity period) against a trusted SSH certificate authority (CA) configured at the organization and/or enterprise level.
80+
7981
{% data reusables.organizations.add-extension-to-cert %}
8082

8183
### Adding an SSH certificate authority
@@ -104,7 +106,9 @@ You can enable or disable access to user-owned repositories with an SSH certific
104106

105107
### Deleting an SSH certificate authority
106108

107-
Deleting a CA cannot be undone. If you want to use the same CA in the future, you'll need to upload the CA again.
109+
Deleting an SSH certificate authority (CA) from your enterprise settings on {% data variables.product.github %} can't be undone. If you want to trust the same CA again in the future, you'll need to add the CA back to {% data variables.product.github %} by uploading the CA's public key again in your enterprise's SSH certificate authority settings.
110+
111+
Deleting a CA immediately prevents {% data variables.product.github %} from accepting SSH certificates signed by that CA, including certificates that have not yet expired. For CA rotation guidance, see [AUTOTITLE](/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities#certificate-revocation-and-ca-rotation).
108112

109113
{% data reusables.enterprise-accounts.access-enterprise %}
110114
{% data reusables.enterprise-accounts.settings-tab %}

content/admin/managing-github-actions-for-your-enterprise/enabling-github-actions-for-github-enterprise-server/enabling-github-actions-with-google-cloud-storage.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,9 @@ Before enabling {% data variables.product.prodname_actions %}, make sure you hav
2727
{% data reusables.actions.enterprise-common-prereqs %}
2828
{% data reusables.actions.enterprise-oidc-prereqs %}
2929

30+
> [!WARNING]
31+
> The GCS bucket used for {% data variables.product.prodname_actions %} blob storage must use Google-managed encryption keys. Customer-Managed Encryption Keys (CMEK) are not currently supported and will cause {% data variables.product.prodname_actions %} database migrations to fail with a hash mismatch error. This restriction applies only to the {% data variables.product.prodname_actions %} blob storage bucket; CMEK may still be used on VM disks and other GCP resources.
32+
3033
## Enabling {% data variables.product.prodname_actions %} with Google Cloud Storage using OIDC (recommended)
3134

3235
To configure {% data variables.product.prodname_ghe_server %} to use OIDC with Google Cloud Storage, you must first create a Google Cloud service account, then create a Google Cloud identity pool and identity provider, and finally configure {% data variables.product.prodname_ghe_server %} to use the provider and service account to access your Google Cloud Storage bucket.

content/code-security/concepts/secret-security/about-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ contentType: concepts
2020

2121
## About {% ifversion fpt or ghec %}user alerts {% else %}{% data variables.secret-scanning.alerts %}{% endif %}
2222

23-
{% data reusables.secret-scanning.secret-scanning-about-alerts %} {% data reusables.secret-scanning.repository-alert-location %}
23+
{% data reusables.secret-scanning.secret-scanning-about-alerts %} {% data reusables.secret-scanning.repository-alert-location %} If the same secret appears multiple times within a single file, only one alert is created.
2424

2525
To help you triage alerts more effectively, {% data variables.product.company_short %} separates alerts into two lists:
2626

content/code-security/concepts/supply-chain-security/about-dependabot-alerts.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,25 @@ See [AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-dependab
5454

5555
## Alert ownership and assignments
5656

57-
Users with write access or higher can assign {% data variables.product.prodname_dependabot_alerts %} to repository collaborators, teams, or {% data variables.product.prodname_copilot_short %} to establish clear ownership for vulnerability remediation. Assignments help track who's responsible for each alert and prevent vulnerabilities from being overlooked.
57+
Users with write access or higher can assign {% data variables.product.prodname_dependabot_alerts %} to repository collaborators, teams, or AI agents to establish clear ownership for vulnerability remediation. Assignments help track who's responsible for each alert and prevent vulnerabilities from being overlooked.
5858

59-
When an alert is assigned, the assignee receives a notification and the alert displays their name in the alert list. You can filter alerts by assignee to track progress. Assigning an alert to {% data variables.product.prodname_copilot_short %} automatically generates a fix and opens a draft pull request for review.
59+
You can assign alerts to the following types of agents:
60+
61+
* **{% data variables.product.prodname_copilot_short %}**, {% data variables.product.github %}'s built-in AI agent.
62+
* **Third-party agents**,such as Codex or Claude, when enabled in your repository settings.
63+
64+
When an alert is assigned to a person or team, the assignee receives a notification and the alert displays their name in the alert list. You can filter alerts by assignee to track progress.
65+
66+
When an alert is assigned to an agent, the agent automatically creates a session and opens a draft pull request with a proposed fix. If the agent can't generate a fix, it remains as an assignee, and you can click **View Session** on the alert timeline to review the agent's log.
67+
68+
> [!NOTE]
69+
> Assignment visibility is currently scoped to the repository-level alerts view. The organization-wide security overview does not display alert assignments.
70+
71+
When an alert's assignees change, {% data variables.product.github %} sends an `assignees_changed` webhook event. You can use this event to trigger workflows or sync assignment data with external systems. For more information, see [AUTOTITLE](/webhooks/webhook-events-and-payloads#dependabot_alert).
72+
73+
### Automation and integrations
74+
75+
You can manage alert assignments programmatically using the REST API. For more information, see [AUTOTITLE](/rest/dependabot/alerts).
6076

6177
For information about assigning alerts, see [AUTOTITLE](/code-security/how-tos/manage-security-alerts/manage-dependabot-alerts/viewing-and-updating-dependabot-alerts#viewing-and-prioritizing-dependabot-alerts).
6278

content/code-security/how-tos/manage-security-alerts/manage-dependabot-alerts/viewing-and-updating-dependabot-alerts.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,12 @@ By default, alerts are sorted by **Most important**, which helps you prioritize
3838

3939
{% data reusables.dependabot.where-to-view-dependabot-alerts %}
4040

41+
{% ifversion dependabot-alerts-assignees %}
42+
43+
When you assign an alert to an AI agent, the agent automatically creates a session and opens a draft pull request with a proposed fix. If the agent can't generate a fix, it remains as an assignee of the alert. You can click **View Session** on the alert timeline to review the agent's log and understand why no pull request was created. Only a user can remove the agent as an assignee.
44+
45+
{% endif %}
46+
4147
{% data reusables.repositories.navigate-to-repo %}
4248
{% data reusables.repositories.sidebar-security %}
4349
{% data reusables.repositories.sidebar-dependabot-alerts %}
@@ -58,7 +64,14 @@ By default, alerts are sorted by **Most important**, which helps you prioritize
5864
![Screenshot showing the "Tags" section in the alert details page.](/assets/images/help/repository/dependabot-alerts-tags-section.png)
5965

6066
{% ifversion dependabot-alerts-assignees %}
61-
1. On the right panel, select an assignee by using the **Assignees** dropdown list. You can assign the alert to a user or team to establish clear ownership, or assign it to {% data variables.product.prodname_copilot_short %} to automatically generate a fix. This clearly communicates who is responsible for triaging the alert and helps you avoid repetitive analysis. It also ensures that alerts are not missed.
67+
1. On the right panel, assign ownership for the alert:
68+
* Click the {% octicon "gear" aria-label="Show options" %} dropdown menu next to "Assignees" to select a user, team, or AI agent from the list. You can also click **Assign to Agent** to assign directly to an agent.
69+
70+
When you assign an alert to an agent, a dialog appears where you can optionally:
71+
* Add a custom prompt with additional context about the fix.
72+
* Select a different repository.
73+
* Select the AI model to use.
74+
* Select a custom agent you have configured (recommended for specialized tasks).
6275
{% endif %}
6376

6477
1. Optionally, to suggest an improvement to the related security advisory, on the right-hand side of the alert details page, click **Suggest improvements for this advisory on the {% data variables.product.prodname_advisory_database %}**. See [AUTOTITLE](/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/editing-security-advisories-in-the-github-advisory-database).

content/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -124,6 +124,8 @@ If your private registry is configured with an IP allow list, you can find the I
124124

125125
{% endif %}
126126

127+
{% ifversion dependabot-oidc-support %}
128+
127129
## Using OIDC for authentication
128130

129131
{% data variables.product.prodname_dependabot %} can use OpenID Connect (OIDC) to authenticate with private registries, eliminating the need to store long-lived credentials as repository secrets.
@@ -191,6 +193,8 @@ registries:
191193

192194
For more information about how OIDC works, see [AUTOTITLE](/actions/concepts/security/openid-connect).
193195

196+
{% endif %}
197+
194198
## Allowing external code execution
195199

196200
When you give {% data variables.product.prodname_dependabot %} access to one or more registries, external code execution is automatically disabled to protect your code from compromised packages. However, some version updates may fail.
@@ -430,6 +434,8 @@ registries:
430434

431435
{% endraw %}
432436

437+
{% ifversion dependabot-oidc-support %}
438+
433439
You can also use OIDC authentication to access JFrog Artifactory. {% data reusables.dependabot.dependabot-oidc-credentials %}
434440

435441
{% raw %}
@@ -446,6 +452,8 @@ registries:
446452

447453
{% endraw %}
448454

455+
{% endif %}
456+
449457
### `npm-registry`
450458

451459
The `npm-registry` type supports username and password, or token. {% data reusables.dependabot.password-definition %}
@@ -516,6 +524,8 @@ registries:
516524

517525
{% endraw %}
518526

527+
{% ifversion dependabot-oidc-support %}
528+
519529
You can also use OIDC authentication to access Azure DevOps Artifacts. {% data reusables.dependabot.dependabot-oidc-credentials %}
520530

521531
{% raw %}
@@ -533,6 +543,8 @@ registries:
533543

534544
The `AZURE_TENANT_ID` and `AZURE_CLIENT_ID` values can be obtained from the overview page of your Entra ID app registration.
535545

546+
{% endif %}
547+
536548
### `pub-repository`
537549

538550
The `pub-repository` type supports a URL and a token.
@@ -590,6 +602,8 @@ registries:
590602

591603
{% endraw %}
592604

605+
{% ifversion dependabot-oidc-support %}
606+
593607
You can also use OIDC authentication to access Azure DevOps Artifacts. {% data reusables.dependabot.dependabot-oidc-credentials %}
594608

595609
{% raw %}
@@ -606,6 +620,8 @@ registries:
606620

607621
{% endraw %}
608622

623+
{% endif %}
624+
609625
### `rubygems-server`
610626

611627
The `rubygems-server` type supports username and password, or token. {% data reusables.dependabot.password-definition %}

content/code-security/reference/supply-chain-security/dependabot-options-reference.md

Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -980,6 +980,8 @@ updates:
980980

981981
The parameters used to provide authentication details for access to a private registry vary according to the registry `type`.
982982

983+
{% ifversion dependabot-oidc-support %}
984+
983985
| Registry `type` | Required authentication parameters |
984986
|--|--|
985987
| `cargo-registry` | `token` |
@@ -996,13 +998,37 @@ The parameters used to provide authentication details for access to a private re
996998
| `rubygems-server` | `username` and `password`<br>or `token`<br>or OIDC with `tenant-id` and `client-id` |
997999
| `terraform-registry` | `token` |
9981000

1001+
{% else %}
1002+
1003+
| Registry `type` | Required authentication parameters |
1004+
|--|--|
1005+
| `cargo-registry` | `token` |
1006+
| `composer-repository` | `username` and `password` |
1007+
| `docker-registry` | `username` and `password` |
1008+
| `git` | `username` and `password` |
1009+
| `hex-organization` | `organization` and `key` |
1010+
| `hex-repository` | `repo` and `auth-key` optionally with the corresponding `public-key-fingerprint` |
1011+
| `maven-repository` | `username` and `password` |
1012+
| `npm-registry` | `username` and `password`<br>or `token` |
1013+
| `nuget-feed` | `username` and `password`<br>or `token` |
1014+
| `pub-registry` | `token` |
1015+
| `python-index` | `username` and `password`<br>or `token` |
1016+
| `rubygems-server` | `username` and `password`<br>or `token` |
1017+
| `terraform-registry` | `token` |
1018+
1019+
{% endif %}
1020+
9991021
All sensitive data used for authentication should be stored securely and referenced from that secure location, see [AUTOTITLE](/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot).
10001022

10011023
> [!TIP]
10021024
> {% data reusables.dependabot.password-definition %}
10031025

1026+
{% ifversion dependabot-oidc-support %}
1027+
10041028
For more information about OIDC support for {% data variables.product.prodname_dependabot %}, see [AUTOTITLE](/actions/concepts/security/openid-connect#oidc-support-for-dependabot) and [AUTOTITLE](/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot#using-oidc-for-authentication).
10051029

1030+
{% endif %}
1031+
10061032
### `url` and `replaces-base`
10071033

10081034
The `url` parameter defines where to access a registry. When the optional `replaces-base` parameter is enabled (`true`), {% data variables.product.prodname_dependabot %} resolves dependencies using the value of `url` rather than the base URL of that specific ecosystem.

content/copilot/concepts/agents/cloud-agent/about-cloud-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ With {% data variables.copilot.copilot_cloud_agent %}, {% data variables.product
4040
When you delegate tasks to {% data variables.copilot.copilot_cloud_agent %}, you can:
4141

4242
* Use the agents panel or other agents entry points on {% data variables.product.prodname_dotcom_the_website %} to have {% data variables.product.prodname_copilot_short %} research, plan, and make code changes on a branch, then iterate before creating a pull request. You can also specify in your prompt that you want a pull request created right away. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/research-plan-iterate).
43-
* Ask {% data variables.product.prodname_copilot_short %} to open a new pull request from other entry points, including {% data variables.product.prodname_github_issues %} and {% data variables.product.prodname_vscode %}. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/create-a-pr).
43+
* Ask {% data variables.product.prodname_copilot_short %} to open a new pull request from other entry points, including {% data variables.product.prodname_github_issues %} and {% data variables.product.prodname_vscode %}. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/start-copilot-sessions).
4444
* Mention `@copilot` in a comment on an existing pull request to ask it to make changes. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/make-changes-to-an-existing-pr).
4545
{% ifversion security-campaigns-assign-to-cca %}* Assign security alerts to {% data variables.product.prodname_copilot_short %} from security campaigns. See [AUTOTITLE](/code-security/code-scanning/managing-code-scanning-alerts/fixing-alerts-in-security-campaign#assigning-alerts-to-copilot-cloud-agent).{% endif %}
4646

content/copilot/concepts/agents/cloud-agent/agent-management.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ To learn more about {% data variables.copilot.copilot_cloud_agent %}, see [AUTOT
3434

3535
From the Agents tab, you can:
3636

37-
* **Kick off new agent tasks**: Select an AI model of your choice, and optionally choose from third-party agents or {% data variables.copilot.custom_agents_short %} best suited for the task. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/create-a-pr).
37+
* **Kick off new agent tasks**: Select an AI model of your choice, and optionally choose from third-party agents or {% data variables.copilot.custom_agents_short %} best suited for the task. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/start-copilot-sessions).
3838
* **Monitor live session logs**: Once the agent starts working, you can click any agent session to open the session log and follow its progress and thought process in real time.
3939
* **Track active sessions**: You can view all active agent sessions that have been started in the repository.
4040
* **Steer agents mid-session**: If you realize you didn't scope a request correctly, or want the agent to use a specific tool or service, you can step in and provide **steering input** without stopping the run. Steering uses **one premium request** per message. See [AUTOTITLE](/copilot/how-tos/use-copilot-agents/cloud-agent/track-copilot-sessions#steering-a-copilot-session-from-the-agents-tab).

0 commit comments

Comments
 (0)