Skip to content

Commit def03d8

Browse files
Merge branch 'main' into patch-2
2 parents 97f8362 + 6296c70 commit def03d8

File tree

4 files changed

+32
-6
lines changed

4 files changed

+32
-6
lines changed

content/actions/security-for-github-actions/security-hardening-your-deployments/about-security-hardening-with-openid-connect.md

+22-1
Original file line numberDiff line numberDiff line change
@@ -297,7 +297,8 @@ To help improve security, compliance, and standardization, you can customize the
297297
Customizing the claims results in a new format for the entire `sub` claim, which replaces the default predefined `sub` format in the token described in "[AUTOTITLE](/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#example-subject-claims)."
298298

299299
> [!NOTE]
300-
> The `sub` claim uses the shortened form `repo` (for example, `repo:ORG-NAME/REPO-NAME`) instead of `repository` to reference the repository.
300+
> The `sub` claim uses the shortened form `repo` (for example, `repo:ORG-NAME/REPO-NAME`) instead of `repository` to reference the repository. {% ifversion fpt or ghec or ghes > 3.15 %}
301+
> Any `:` within the context value will be replaced with `%3A`. {% endif %}
301302
302303
The following example templates demonstrate various ways to customize the subject claim. To configure these settings on {% data variables.product.prodname_dotcom %}, admins use the REST API to specify a list of claims that must be included in the subject (`sub`) claim.
303304

@@ -420,6 +421,26 @@ or:
420421

421422
In your cloud provider's OIDC configuration, configure the `sub` condition to require a `repository_owner_id` claim that matches the required value.
422423

424+
{% ifversion fpt or ghec or ghes > 3.15 %}
425+
426+
#### Example: Context value with `:`
427+
428+
This example demonstrates how to handle context value with `:`. For example, when the job references an environment named `production:eastus`.
429+
430+
{% data reusables.actions.use-request-body-api %}
431+
432+
```json
433+
{
434+
"include_claim_keys": [
435+
"environment",
436+
"repository_owner"
437+
]
438+
}
439+
```
440+
441+
In your cloud provider's OIDC configuration, configure the `sub` condition to require that claims must include a specific value for `environment` and `repository_owner`. For example: `"sub": "environment:production%3Aeastus:repository_owner:octo-org"`.
442+
{% endif %}
443+
423444
#### Resetting organization template customizations
424445

425446
This example template resets the subject claims to the default format. This template effectively opts out of any organization-level customization policy.

data/release-notes/enterprise-server/3-14/2.yml

+6
Original file line numberDiff line numberDiff line change
@@ -82,3 +82,9 @@ sections:
8282
{% data reusables.release-notes.2024-11-ghe-repl-promote-primary-down %}
8383
8484
[Updated: 2024-11-13]
85+
86+
deprecations:
87+
- |
88+
The option to "copy Storage settings from Actions" in the Management Console ("GitHub Packages" > "Packages Storage Settings") has been removed. [Updated: 2024-11-20]
89+
90+

data/release-notes/enterprise-server/3-15/0-rc1.yml

+2
Original file line numberDiff line numberDiff line change
@@ -226,6 +226,8 @@ sections:
226226
# https://github.com/github/releases/issues/4878
227227
- |
228228
The Management Console API has been removed. The Manage GHES API reached feature parity with the Management Console API in {% data variables.product.prodname_ghe_server %} version 3.12. For information about the Manage GHES API, see "[AUTOTITLE](/rest/enterprise-admin/manage-ghes)."
229+
- |
230+
The option to "copy Storage settings from Actions" in the Management Console ("GitHub Packages" > "Packages Storage Settings") has been removed. [Updated: 2024-11-20]
229231
230232
errata:
231233
# https://github.com/github/docs-content/issues/16489

data/reusables/code-scanning/run-additional-queries.md

+2-5
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,7 @@
11
When you use {% data variables.product.prodname_codeql %} to scan code, the {% data variables.product.prodname_codeql %} analysis engine generates a database from the code and runs queries on it. {% data variables.product.prodname_codeql %} analysis uses a default set of queries, but you can specify more queries to run, in addition to the default queries.
22

3-
{% tip %}
4-
5-
You can also specify the queries you want to exclude from analysis, or include in the analysis. This requires the use of a custom configuration file. For more information, see "[Using a custom configuration file](#using-a-custom-configuration-file)" and "[Excluding specific queries from analysis](#excluding-specific-queries-from-analysis)" below.
6-
7-
{% endtip %}
3+
> [!TIP]
4+
> You can also specify the queries you want to exclude from analysis, or include in the analysis. This requires the use of a custom configuration file. For more information, see "[Using a custom configuration file](#using-a-custom-configuration-file)" and "[Excluding specific queries from analysis](#excluding-specific-queries-from-analysis)" below.
85
96
You can run extra queries if they are part of a {% data variables.product.prodname_codeql %} pack published to the {% data variables.product.company_short %} {% data variables.product.prodname_container_registry %} or a {% data variables.product.prodname_codeql %} pack stored in a repository. For more information, see "[AUTOTITLE](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql#about-codeql-queries)."
107

0 commit comments

Comments
 (0)