Skip to content

Commit 677fd3f

Browse files
authored
Merge branch 'main' into 3814-master-main
2 parents a101b11 + a863bc4 commit 677fd3f

10 files changed

Lines changed: 30 additions & 3 deletions

File tree

content/github/administering-a-repository/about-dependabot-version-updates.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ When {% data variables.product.prodname_dependabot %} identifies an outdated dep
2222

2323
If you enable security updates, {% data variables.product.prodname_dependabot %} also raises pull requests to update vulnerable dependencies. For more information, see "[About {% data variables.product.prodname_dependabot_security_updates %}](/github/managing-security-vulnerabilities/about-dependabot-security-updates)."
2424

25+
{% data reusables.dependabot.pull-request-security-vs-version-updates %}
26+
2527
{% data reusables.dependabot.dependabot-tos %}
2628

2729
### Frequency of {% data variables.product.prodname_dependabot %} pull requests

content/github/managing-security-vulnerabilities/about-dependabot-security-updates.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,10 @@ The {% data variables.product.prodname_dependabot_security_updates %} feature is
2222

2323
{% endnote %}
2424

25+
You can enable a related feature, {% data variables.product.prodname_dependabot_version_updates %}, so that {% data variables.product.prodname_dependabot %} raises pull requests to update the manifest to the latest version of the dependency, whenever it detects an outdated dependency. For more information, see "[About {% data variables.product.prodname_dependabot %} version updates](/github/administering-a-repository/about-dependabot-version-updates)."
26+
27+
{% data reusables.dependabot.pull-request-security-vs-version-updates %}
28+
2529
### About pull requests for security updates
2630

2731
Each pull request contains everything you need to quickly and safely review and merge a proposed fix into your project. This includes information about the vulnerability like release notes, changelog entries, and commit details. Details of which vulnerability a pull request resolves are hidden from anyone who does not have access to {% data variables.product.prodname_dependabot_alerts %} for the repository.

content/github/setting-up-and-managing-organizations-and-teams/managing-security-and-analysis-settings-for-your-organization.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,8 @@ You can enable or disable features for all repositories. {% if currentVersion ==
7676
![Button to enable feature for all the eligible repositories in the organization](/assets/images/enterprise/github-ae/organizations/security-and-analysis-enable-secret-scanning-existing-repos-ghae.png)
7777
{% endif %}
7878

79+
{% data reusables.security.displayed-information %}
80+
7981
### Enabling or disabling a feature automatically when new repositories are added
8082

8183
1. Go to the security and analysis settings for your organization. For more information, see "[Displaying the security and analysis settings](#displaying-the-security-and-analysis-settings)."

content/github/setting-up-and-managing-your-github-user-account/managing-security-and-analysis-settings-for-your-user-account.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@ For an overview of repository-level security, see "[About securing your reposito
2828
7. Click **Disable FEATURE** or **Enable FEATURE** to disable or enable the feature for all the repositories you own.
2929
![Button to disable or enable feature](/assets/images/help/settings/security-and-analysis-enable-dependency-graph.png)
3030

31+
{% data reusables.security.displayed-information %}
32+
3133
### Enabling or disabling features for new repositories
3234

3335
{% data reusables.user_settings.access_settings %}

data/release-notes/3-0/0.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -128,6 +128,7 @@ sections:
128128
- Juypter Notebook rendering in the web UI may fail if the notebook includes non UTF-8 encoded characters.
129129
- Dependency graph fails to parse `setup.py` Python manifest files, resulting in HTTP 500 errors in logs. This, combined with the duplicated logging issue, results in increased root volume utilization.
130130
- A race condition can cause dependency graph database migrations to appear to fail.
131+
- Instances with a custom timezone that were upgraded from an earlier release of GitHub Enterprise Server may have incorrect timestamps in the web UI.
131132

132133
deprecations:
133134
- heading: Deprecation of GitHub Enterprise Server 2.19

data/release-notes/3-0/1.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,3 +40,4 @@ sections:
4040
- 'Repository [deploy keys](/developers/overview/managing-deploy-keys) are unable to be used with repositories containing LFS objects.'
4141
- 'Juypter Notebook rendering in the web UI may fail if the notebook includes non UTF-8 encoded characters.'
4242
- 'Dependency graph fails to parse `yarn.lock` Javascript manifest files, resulting in HTTP 500 errors in logs.'
43+
- 'Instances with a custom timezone that were upgraded from an earlier release of GitHub Enterprise Server may have incorrect timestamps in the web UI.'
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
When {% data variables.product.prodname_dependabot %} raises pull requests, these pull requests could be for _security_ or _version_ updates:
2+
3+
- {% data variables.product.prodname_dependabot_security_updates %} are automated pull requests that help you update dependencies with known vulnerabilities.
4+
- {% data variables.product.prodname_dependabot_version_updates %} are automated pull requests that keep your dependencies updated, even when they don’t have any vulnerabilities. To check the status of version updates, navigate to the Insights tab of your repository, then Dependency Graph, and {% data variables.product.prodname_dependabot %}.
Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
When you enable one or more security and analysis features for existing repositories, you will see any results displayed on {% data variables.product.prodname_dotcom %} within minutes:
2+
3+
- All the existing repositories will have the selected configuration.
4+
- New repositories will follow the selected configuration if you've enabled the checkbox for new repositories.{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
5+
- We use the permissions to scan for manifest files to apply the relevant services.
6+
- You'll see information on your dependency graph.
7+
- {% data variables.product.prodname_dotcom %} will generate {% data variables.product.prodname_dependabot_alerts %}{% endif %}{% if currentVersion == "free-pro-team@latest" %} and raise pull requests{% endif %}.

lib/webhooks/static/dotcom/repository_vulnerability_alert.create.payload.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,11 @@
44
"id": 91095730,
55
"affected_range": ">= 2.0.4, < 2.0.6",
66
"affected_package_name": "rack",
7+
"fixed_in": "2.0.6",
78
"external_reference": "https://nvd.nist.gov/vuln/detail/CVE-2018-16470",
89
"external_identifier": "CVE-2018-16470",
9-
"fixed_in": "2.0.6"
10+
"ghsa_id": "GHSA-hg78-4f6x-99wq",
11+
"created_at": "2021-03-01T01:23:45Z"
1012
},
1113
"repository": {
1214
"id": 186853002,

lib/webhooks/static/dotcom/repository_vulnerability_alert.dismiss.payload.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,9 +4,11 @@
44
"id": 7649605,
55
"affected_range": "0.2.0",
66
"affected_package_name": "many_versioned_gem",
7+
"fixed_in": "0.2.5",
78
"external_reference": "https://nvd.nist.gov/vuln/detail/CVE-2018-3728",
89
"external_identifier": "CVE-2018-3728",
9-
"fixed_in": "0.2.5",
10+
"ghsa_id": "GHSA-jp4x-w63m-7wgm",
11+
"created_at": "2017-10-24T00:00:00Z",
1012
"dismisser": {
1113
"login":"octocat",
1214
"id":1,
@@ -28,6 +30,6 @@
2830
"site_admin":true
2931
},
3032
"dismiss_reason": "No bandwidth to fix this",
31-
"dismissed_at": "2017-10-25T00:00:00+00:00"
33+
"dismissed_at": "2017-10-25T00:00:00Z"
3234
}
3335
}

0 commit comments

Comments
 (0)