Skip to content

Commit 7b2d060

Browse files
authored
Merge branch 'main' into scheduled-workflow-tests
2 parents f800ee9 + 78799b0 commit 7b2d060

6 files changed

Lines changed: 18 additions & 29 deletions

File tree

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,25 @@
11
---
2-
name: Status Update
2+
name: A Brief status Update
33
description: A brief status update.
44
body:
55
- type: dropdown
66
attributes:
7-
name: Status
7+
label: Status
88
options:
9-
- name: "GREEN \U0001F34F (All good, smooth sailing)"
9+
- label: "GREEN \U0001F34F (All good, smooth sailing)"
1010
value: 'Status: GREEN'
11-
- name: "YELLOW \U0001F7E1 (On track, with hurdles to work through)"
11+
- label: "YELLOW \U0001F7E1 (On track, with hurdles to work through)"
1212
value: 'Status: YELLOW'
13-
- name: "RED \U0001F534 (BLOCKED)"
13+
- label: "RED \U0001F534 (BLOCKED)"
1414
value: 'Status: RED'
15-
- type: input
15+
- type: textarea
1616
attributes:
17-
name: Update Summary
17+
label: Update Summary
1818
placeholder:
1919
Brief summary of the status and next steps. Any blockers should be
2020
called out specifically.
21-
inputType: longText
2221
- type: input
2322
attributes:
24-
name: 'Attribution'
23+
label: 'Attribution'
2524
value: '_created with :heart: by typing_ `/status`'
26-
inputType: text
25+
format: text

.github/ISSUE_COMMENT_TEMPLATE/target-date.yml

Lines changed: 0 additions & 14 deletions
This file was deleted.

content/github/administering-a-repository/renaming-a-branch.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ intro: You can change the name of a branch in a repository.
44
permissions: People with write permissions to a repository can rename a branch in the repository. People with admin permissions can rename the default branch.
55
versions:
66
free-pro-team: '*'
7-
enterprise-server: '>=3.1'
7+
enterprise-server: '>=3.2'
88
topics:
99
- repositories
1010
---
@@ -13,7 +13,9 @@ topics:
1313

1414
You can rename a branch in a repository on {% data variables.product.product_location %}. For more information about branches, see "[About branches](/github/collaborating-with-issues-and-pull-requests/about-branches)."
1515

16-
If you rename a branch, {% data variables.product.prodname_dotcom %} will automatically redirect links on {% if currentVersion == "free-pro-team@latest" %}{% data variables.product.prodname_dotcom_the_website %}{% else %}{% data variables.product.product_location_enterprise %}{% endif %} that contain the old branch name to the equivalent link on the renamed branch. {% data variables.product.prodname_dotcom %} will also update branch protection policies, as well as the base branch for open pull requests and draft releases.
16+
When you rename a branch on {% data variables.product.product_location %}, any URLs that contain the old branch name are automatically redirected to the equivalent URL for the renamed branch. Branch protection policies are also updated, as well as the base branch for open pull requests (including those for forks) and draft releases. After the rename is complete, {% data variables.product.prodname_dotcom %} provides instructions on the repository's home page directing contributors to update their local Git environments.
17+
18+
Although file URLs are automatically redirected, raw file URLs are not redirected. Also, {% data variables.product.prodname_dotcom %} does not perform any redirects if users perform a `git pull` for the previous branch name.
1719

1820
### Renaming a branch
1921

data/release-notes/2-21/18.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
date: '2021-04-01'
22
sections:
33
security_fixes:
4-
- "**HIGH:** An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated via a GitHub App's [web authentication flow](https://docs.github.com/en/developers/apps/identifying-and-authorizing-users-for-github-apps#web-application-flow) to read private repository metadata without requiring appropriate permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in 3.0.4, 2.22.10, and 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program and has been assigned CVE-2021-22865."
4+
- "**HIGH:** An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's [web authentication flow](https://docs.github.com/en/developers/apps/identifying-and-authorizing-users-for-github-apps#web-application-flow) to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability has been assigned CVE-2021-22865 and was reported via the [GitHub Bug Bounty Program](https://bounty.github.com)."
55
- Packages have been updated to the latest security versions.
66
bugs:
77
- Services were not transitioning to new log files as part of log rotation, resulting in increased disk usage.

data/release-notes/2-22/10.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
date: '2021-04-01'
22
sections:
33
security_fixes:
4-
- "**HIGH:** An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated via a GitHub App's [web authentication flow](https://docs.github.com/en/developers/apps/identifying-and-authorizing-users-for-github-apps#web-application-flow) to read private repository metadata without requiring appropriate permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in 3.0.4, 2.22.10, and 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program and has been assigned CVE-2021-22865."
4+
- "**HIGH:** An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's [web authentication flow](https://docs.github.com/en/developers/apps/identifying-and-authorizing-users-for-github-apps#web-application-flow) to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability has been assigned CVE-2021-22865 and was reported via the [GitHub Bug Bounty Program](https://bounty.github.com)."
55
- Packages have been updated to the latest security versions.
66
bugs:
77
- A timezone set on GitHub Enterprise 11.10.x or earlier was not being used by some services which were defaulting to UTC time.

data/release-notes/3-0/4.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ date: '2021-04-01'
22
intro: The minimum infrastructure requirements have increased for {% data variables.product.prodname_ghe_server %} 3.0+. For more information, see "[About minimum requirements for GitHub Enterprise Server 3.0 and later](/admin/enterprise-management/upgrading-github-enterprise-server#about-minimum-requirements-for-github-enterprise-server-30-and-later)."
33
sections:
44
security_fixes:
5-
- "**HIGH:** An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated via a GitHub App's [web authentication flow](https://docs.github.com/en/developers/apps/identifying-and-authorizing-users-for-github-apps#web-application-flow) to read private repository metadata without requiring appropriate permissions. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in 3.0.4, 2.22.10, and 2.21.18. This vulnerability was reported via the GitHub Bug Bounty program and has been assigned CVE-2021-22865."
5+
- "**HIGH:** An improper access control vulnerability was identified in GitHub Enterprise Server that allowed access tokens generated from a GitHub App's [web authentication flow](https://docs.github.com/en/developers/apps/identifying-and-authorizing-users-for-github-apps#web-application-flow) to read private repository metadata via the REST API without having been granted the appropriate permissions. To exploit this vulnerability, an attacker would need to create a GitHub App on the instance and have a user authorize the application through the web authentication flow. The private repository metadata returned would be limited to repositories owned by the user the token identifies. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.4 and was fixed in versions 3.0.4, 2.22.10, 2.21.18. This vulnerability has been assigned CVE-2021-22865 and was reported via the [GitHub Bug Bounty Program](https://bounty.github.com)."
66
- Packages have been updated to the latest security versions.
77
bugs:
88
- When maintenance mode was enabled, some services continued to be listed as "active processes" even though they were expected to be running, and should not have been listed.
@@ -20,3 +20,5 @@ sections:
2020
- Git LFS tracked files [uploaded through the web interface](https://github.com/blog/2105-upload-files-to-your-repositories) are incorrectly added directly to the repository.
2121
- Issues cannot be closed if they contain a permalink to a blob in the same repository where the file path is longer than 255 characters.
2222
- When "Users can search GitHub.com" is enabled with GitHub Connect, issues in private and internal repositories are not included in GitHub.com search results.
23+
- Jupyter Notebook rendering in the web UI may fail if the notebook includes non-ASCII UTF-8 characters.
24+
- reStructuredText (RST) rendering in the web UI may fail and instead display raw RST markup text.

0 commit comments

Comments
 (0)