GitHub AE release notes

Week of March 3, 2021

March 3, 2021 - These changes rolled out to enterprises during the week of March 3, 2021.

  • GitHub Actions beta

    • GitHub Actions is a powerful, flexible solution for CI/CD and workflow automation. For more information, see "Introduction to GitHub Actions."

      GitHub Actions on GitHub AE uses a new AE hosted runner, only available for GitHub AE, that enables you to customize the size, image, and networking configuration of the runners. These runners are a finished-service CI compute environment with auto-scaling and management, fully managed by GitHub. During the beta, the use AE hosted runners is free of charge. For more information, see "Adding AE hosted runners."

      Please note that when GitHub Actions is enabled during this upgrade, two organizations named "GitHub Actions" (@actions and @github) will appear in your enterprise. These organizations are required by GitHub Actions. Users named @ghost and @actions appear as the actors for creation of these organizations in the audit log.

  • GitHub Packages beta

    • GitHub Packages is a package hosting service, natively integrated with GitHub Actions, APIs, and webhooks. Create an end-to-end DevOps workflow that includes your code, continuous integration, and deployment solutions. During this beta, GitHub Packages is offered free of charge to GitHub AE customers.

  • GitHub Advanced Security beta

    • GitHub Advanced Security is available in beta and includes both code scanning and secret scanning. During this beta, GitHub Advanced Security features are being offered free of charge to GitHub AE customers. Repository and organization administrators can opt-in to use GitHub Advanced Security in the Security and Analysis tab under settings.

      Learn more about GitHub Advanced Security code scanning and secret scanning on GitHub AE.

  • Manage teams from your identity provider (IdP)

    • Customers using SCIM (System for Cross-domain Identity Management) can now sync security groups in Azure Active Directory with GitHub teams. Once a team has been linked to a security group, membership will be automatically updated in GitHub AE when a user is added or removed from their assigned security group.

  • IP allow lists beta

    • GitHub IP allow lists provide the ability to filter traffic from administrator-specified IP ranges, defined by CIDR notation. The allow list is defined at the enterprise or organization account level in Security > Settings. All traffic that attempts to reach resources within the enterprise account and organizations are filtered by the IP allow lists. This functionality is provided in addition to the ability to request network security group changes that filter traffic to the entirety of the GHAE tenant.

  • Developer Changes

    • Organization owners can now disable publication of GitHub Pages sites from repositories in the organization. This will not unpublish existing sites.

    • Repositories that use GitHub Pages can now build and deploy from any branch.

    • When writing an issue or pull request, the list syntax for bullets, numbers, and tasks will now be autocompleted after you press return or enter.

    • You can now delete a directory in a repository from the repository page. When navigating to a directory, a new kebab button next to the "Add file" button gives the option to delete the directory.

    • It's now easier and faster to reference issues or pull requests, with search across multiple words after the "#".

  • Administration changes

    • Enterprise owners can now publish a mandatory message. The message is shown to all users and they must acknowledge it. This can be used to display important information, terms of service or policies.

    • The GitHub App single file path permission can now support up to ten files.

    • When configuring a GitHub App, the authorization callback URL is a required field. Now we will permit the integrator to specify multiple callback URLs. GitHub AE denies authorization if the callback URL from the request is not listed.

    • A new API endpoint enables the exchange of a user to server token for a user to server token scoped to specific repositories.

    • Events are now logged in the audit log on promoting a team member to be a team maintainer and on demoting a team maintainer to be a team member.

    • The OAuth device authorization flow is now supported. This allows any CLI client or developer tool to authenticate using a secondary system.

    • A user can no longer delete their account if SCIM provisioning is enabled.

  • Default branch renaming

    • Enterprise and organization owners can now set the default branch name for new repositories. Enterprise owners can also enforce their choice of default branch name across all organizations or allow individual organizations to choose their own.

      Existing repositories are unaffected by these settings, and their default branch name will not be changed.

      This change is one of many changes GitHub is making to support projects and maintainers that want to rename their default branch. To learn more, see github/renaming.

  • Bug fixes

    • Users can no longer set a backup email address on their profile. Their email address is set through the IdP only.

    • You can no longer enable two-factor authentication after configuring authentication through your IdP.

    • GitHub AE can now connect to Azure Boards.

    • Version headers were missing from the APIs, and have now been set to "GitHub AE."

    • Links to documentation have been fixed.

    • Configuration of audit log forwarding within the enterprise's settings was failing.

    • Navigating to gists could result in a 500 error.

    • The Support email or URL was failing to save. It now saves after a period of a few minutes.

    • Organization level pull request templates were not being applied to all pull requests in the organization.

  • Known issues

    • Geographic location data is not shown in the audit log. Location information can otherwise be discerned from the IP address associated with each event.

    • The link to GitHub Packages from a repository page shows an incorrect search page when that repository does not have any packages.

Did this doc help you?Privacy policy

Help us make these docs great!

All GitHub docs are open source. See something that's wrong or unclear? Submit a pull request.

Make a contribution

Or, learn how to contribute.