Skip to content

Commit d18c0cc

Browse files
authored
Merge branch 'main' into bassa846-patch-1-1
2 parents f9018e1 + 5b163a2 commit d18c0cc

26 files changed

Lines changed: 610 additions & 115 deletions
89.2 KB
Loading

content/actions/reference/environment-variables.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ versions:
2222

2323
To set custom environment variables, you need to specify the variables in the workflow file. You can define environment variables for a step, job, or entire workflow using the [`jobs.<job_id>.steps[*].env`](/github/automating-your-workflow-with-github-actions/workflow-syntax-for-github-actions#jobsjob_idstepsenv), [`jobs.<job_id>.env`](/github/automating-your-workflow-with-github-actions/workflow-syntax-for-github-actions#jobsjob_idenv), and [`env`](/github/automating-your-workflow-with-github-actions/workflow-syntax-for-github-actions#env) keywords. For more information, see "[Workflow syntax for {% data variables.product.prodname_dotcom %}](/articles/workflow-syntax-for-github-actions/#jobsjob_idstepsenv)."
2424

25+
{% raw %}
2526
```yaml
2627
jobs:
2728
weekday_job:
@@ -30,13 +31,14 @@ jobs:
3031
DAY_OF_WEEK: Mon
3132
steps:
3233
- name: "Hello world when it's Monday"
33-
if: env.DAY_OF_WEEK == 'Mon'
34+
if: ${{ env.DAY_OF_WEEK == 'Mon' }}
3435
run: echo "Hello $FIRST_NAME $middle_name $Last_Name, today is Monday!"
3536
env:
3637
FIRST_NAME: Mona
3738
middle_name: The
3839
Last_Name: Octocat
3940
```
41+
{% endraw %}
4042
4143
To use the value of an environment variable in a workflow file, you should use the [`env` context](/actions/reference/context-and-expression-syntax-for-github-actions#env-context). If you want to use the value of an environment variable inside a runner, you can use the runner operating system's normal method for reading environment variables.
4244

content/actions/reference/environments.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ versions:
1616
You can configure environments with protection rules and secrets. When a workflow job references an environment, the job won't start until all of the environment's protection rules pass. A job also cannot access secrets that are defined in an environment until all the environment protection rules pass.
1717

1818
{% if currentVersion == "free-pro-team@latest" %}
19-
Environment protection rules and environment secrets are only available on public repositories. If you convert a repository from public to private, any configured protection rules or environment secrets will be ignored, and you will not be able to configure any environments. If you convert your repository back to public, you will have access to any previously configured protection rules and environment secrets.
19+
Environment protection rules and environment secrets are only available on public repositories and private repositories on an enterprise plan. If you convert a repository from public to private on a non-enterprise plan, any configured protection rules or environment secrets will be ignored, and you will not be able to configure any environments. If you convert your repository back to public, you will have access to any previously configured protection rules and environment secrets.
2020
{% endif %}
2121

2222
#### Environment protection rules
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Cherry-picking a commit
3+
intro: You can pick a specific commit on one branch and copy the commit to another branch.
4+
versions:
5+
free-pro-team: '*'
6+
---
7+
8+
### About Git cherry-pick
9+
10+
You can cherry-pick a commit on one branch to create a copy of the commit with the same changes on another branch. If you commit changes to the wrong branch or want to make the same changes to another branch, you can cherry-pick the commit to apply the changes to another branch. You can also use cherry-picking to apply specific changes before you are ready to create or merge a pull request. For example, if you commit a bug fix to a feature branch, you can cherry-pick the commit with the bug fix to other branches of your project.
11+
12+
You can also use cherry-picking when collaborating with a team. Some projects incorporate contributions by cherry-picking commits. For more information, see [Distributed Git - Maintaining a Project](https://git-scm.com/book/en/v2/Distributed-Git-Maintaining-a-Project#_rebase_cherry_pick) in the Git documentation.
13+
14+
### Cherry-picking a commit
15+
16+
{% data reusables.desktop.current-branch-menu %}
17+
2. In the list of branches, click the branch that has the commit that you want to cherry-pick.
18+
{% data reusables.desktop.history-tab %}
19+
4. Drag the commit that you want to cherry-pick to the {% octicon "git-branch" aria-label="The branch icon" %} **Current Branch** menu and drop the commit on the branch that you want to copy the commit to.
20+
![Dragging a commit to another branch in the Current Branch menu](/assets/images/help/desktop/cherry-picking.png)
21+
22+
### Further reading
23+
- [git-cherry-pick](https://git-scm.com/docs/git-cherry-pick) in the Git documentation

content/desktop/contributing-and-collaborating-using-github-desktop/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ versions:
2222
{% link_in_list /stashing-changes %}
2323
{% link_in_list /pushing-changes-to-github %}
2424
{% link_in_list /reverting-a-commit %}
25+
{% link_in_list /cherry-picking-a-commit %}
2526
{% link_in_list /managing-tags %}
2627
{% link_in_list /viewing-the-branch-history %}
2728
{% topic_link_in_list /working-with-your-remote-repository-on-github-or-github-enterprise %}

content/developers/webhooks-and-events/webhook-events-and-payloads.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -337,6 +337,60 @@ Key | Type | Description
337337
338338
{{ webhookPayloadsForCurrentVersion.deployment_status }}
339339
340+
{% if currentVersion == "free-pro-team@latest" %}
341+
### discussion
342+
343+
{% data reusables.webhooks.discussions-webhooks-beta %}
344+
345+
Activity related to a discussion. For more information, see the "[Using the GraphQL API for discussions](/graphql/guides/using-the-graphql-api-for-discussions)."
346+
#### Availability
347+
348+
- Repository webhooks
349+
- Organization webhooks
350+
- {% data variables.product.prodname_github_app %}s with the `discussions` permission
351+
352+
#### Webhook payload object
353+
354+
Key | Type | Description
355+
----|------|-------------
356+
`action` |`string` | The action performed. Can be `created`, `edited`, `deleted`, `pinned`, `unpinned`, `locked`, `unlocked`, `transferred`, `category_changed`, `answered`, or `unanswered`.
357+
{% data reusables.webhooks.discussion_desc %}
358+
{% data reusables.webhooks.repo_desc_graphql %}
359+
{% data reusables.webhooks.org_desc_graphql %}
360+
{% data reusables.webhooks.sender_desc %}
361+
362+
#### Webhook payload example
363+
364+
{{ webhookPayloadsForCurrentVersion.discussion.created }}
365+
366+
### discussion_comment
367+
368+
{% data reusables.webhooks.discussions-webhooks-beta %}
369+
370+
Activity related to a comment in a discussion. For more information, see "[Using the GraphQL API for discussions](/graphql/guides/using-the-graphql-api-for-discussions)."
371+
372+
#### Availability
373+
374+
- Repository webhooks
375+
- Organization webhooks
376+
- {% data variables.product.prodname_github_app %}s with the `discussions` permission
377+
378+
#### Webhook payload object
379+
380+
Key | Type | Description
381+
----|------|-------------
382+
`action` |`string` | The action performed. Can be `created`, `edited`, or `deleted`.
383+
`comment` | `object` | The [`discussion comment`](/graphql/guides/using-the-graphql-api-for-discussions#discussioncomment) resource.
384+
{% data reusables.webhooks.discussion_desc %}
385+
{% data reusables.webhooks.repo_desc_graphql %}
386+
{% data reusables.webhooks.org_desc_graphql %}
387+
{% data reusables.webhooks.sender_desc %}
388+
389+
#### Webhook payload example
390+
391+
{{ webhookPayloadsForCurrentVersion.discussion_comment.created }}
392+
{% endif %}
393+
340394
{% if enterpriseServerVersions contains currentVersion or currentVersion == "github-ae@latest" %}
341395
342396
### enterprise

content/github/working-with-github-pages/testing-your-github-pages-site-locally-with-jekyll.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ Before you can use Jekyll to test a site, you must:
3030

3131
{% data reusables.command_line.open_the_multi_os_terminal %}
3232
{% data reusables.pages.navigate-publishing-source %}
33+
3. Run `bundle install`.
3334
3. Run your Jekyll site locally.
3435
```shell
3536
$ bundle exec jekyll serve

content/github/working-with-github-pages/troubleshooting-custom-domains-and-github-pages.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,8 @@ Then, make sure the _CNAME_ file is formatted correctly.
2323

2424
- The _CNAME_ filename must be all uppercase.
2525
- The _CNAME_ file can contain only one domain. To point multiple domains to your site, you must set up a redirect through your DNS provider.
26-
- The _CNAME_ entry must be the bare domain. For example, `www.example.com`,`blog.example.com`, or `example.com`.
27-
- The _CNAME_ entry can only be used once on {% data variables.product.product_name %}. For example, if another repository's _CNAME_ file contains `example.com`, you cannot use `example.com` in the _CNAME_ file for your repository.
26+
- The _CNAME_ file must contain the domain name only. For example, `www.example.com`, `blog.example.com`, or `example.com`.
27+
- The domain name must be unique across all {% data variables.product.prodname_pages %} sites. For example, if another repository's _CNAME_ file contains `example.com`, you cannot use `example.com` in the _CNAME_ file for your repository.
2828

2929
### DNS misconfiguration
3030

data/glossaries/external.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@
9191
working tree is pointing to a new branch.
9292
- term: cherry-picking
9393
description: >-
94-
To choose a subset of changes from a series of changes (typically commits) and record them as a new series of changes on top of a different codebase. In Git, this is performed by the `git cherry-pick` command to extract the change introduced by an existing commit on another branch and to record it based on the tip of the current branch as a new commit.
94+
To choose a subset of changes from a series of changes (typically commits) and record them as a new series of changes on top of a different codebase. In Git, this is performed by the `git cherry-pick` command to extract the change introduced by an existing commit on another branch and to record it based on the tip of the current branch as a new commit. For more information, see [git-cherry-pick](https://git-scm.com/docs/git-cherry-pick) in the Git documentation.
9595
- term: child team
9696
description: >-
9797
Within nested teams, the subteam that inherits the parent team's access

data/release-notes/2-21/17.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
date: '2021-03-23'
2+
intro: Downloads have been disabled due to a major bug affecting multiple customers. A fix will be available in the next patch.
23
sections:
34
security_fixes:
45
- '**HIGH:** A remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration options used by GitHub Pages were not sufficiently restricted and made it possible to override environment variables leading to code execution on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.0.3 and was fixed in 3.0.3, 2.22.9, and 2.21.17. This vulnerability was reported via the GitHub Bug Bounty program and has been assigned CVE-2021-22864.'

0 commit comments

Comments
 (0)