Skip to main content
Frecuentemente publicamos actualizaciones de nuestra documentación. Es posible que la traducción de esta página esté en curso. Para conocer la información más actual, visita la documentación en inglés. Si existe un problema con las traducciones en esta página, por favor infórmanos.
GitHub AE está actualmente en un lanzamiento limitado. Por favor, contacta a nuestro equipo de ventas para conocer más sobre esto.

GitHub AE release notes

May 17, 2022

GitHub comenzó a implementar estos cambios en empresas en May 17, 2022.

    Features

    GitHub Advanced Security features are generally available

  • Code scanning and secret scanning are now generally available for GitHub AE. For more information, see "About code scanning" and "About secret scanning."

  • Custom patterns for secret scanning is now generally available. For more information, see "Defining custom patterns for secret scanning."

  • View all code scanning alerts for a pull request

  • You can now find all code scanning alerts associated with your pull request with the new pull request filter on the code scanning alerts page. The pull request checks page shows the alerts introduced in a pull request, but not existing alerts on the pull request branch. The new "View all branch alerts" link on the Checks page takes you to the code scanning alerts page with the specific pull request filter already applied, so you can see all the alerts associated with your pull request. This can be useful to manage lots of alerts, and to see more detailed information for individual alerts. For more information, see "Managing code scanning alerts for your repository."

  • Security overview for organizations

  • GitHub Advanced Security now offers an organization-level view of the application security risks detected by code scanning, Dependabot, and secret scanning. The security overview shows the enablement status of security features on each repository, as well as the number of alerts detected.

    In addition, the security overview lists all secret scanning alerts at the organization level. Similar views for Dependabot and code scanning alerts are coming in future releases. For more information, see "About the security overview."

    Screenshot of security overview

  • Dependency graph

  • Dependency graph is now available on GitHub AE. The dependency graph helps you understand the open source software that you depend on by parsing the dependency manifests checked into repositories. For more information, see "About the dependency graph."

  • Dependabot alerts

  • Dependabot alerts can now notify you of vulnerabilities in your dependencies on GitHub AE. You can enable Dependabot alerts by enabling the dependency graph, enabling GitHub Connect, and syncing vulnerabilities from the GitHub Advisory Database. This feature is in beta and subject to change. For more information, see "About alerts for vulnerable dependencies."

    After you enable Dependabot alerts, members of your organization will receive notifications any time a new vulnerability that affects their dependencies is added to the GitHub Advisory Database or a vulnerable dependency is added to their manifest. Members can customize notification settings. For more information, see "Configuring notifications for vulnerable dependencies."

  • Security manager role for organizations

  • Organizations can now grant teams permission to manage security alerts and settings on all their repositories. The "security manager" role can be applied to any team and grants the team's members the following permissions.

    • Read access on all repositories in the organization
    • Write access on all security alerts in the organization
    • Access to the organization-level security tab
    • Write access on security settings at the organization level
    • Write access on security settings at the repository level

    For more information, see "Managing security managers in your organization."

  • Ephemeral runners and autoscaling webhooks for GitHub Actions

  • GitHub AE now supports ephemeral (single job) self-hosted runners and a new workflow_job webhook to make autoscaling runners easier.

    Ephemeral runners are good for self-managed environments where each job is required to run on a clean image. After a job is run, GitHub AE automatically unregisteres ephemeral runners, allowing you to perform any post-job management.

    You can combine ephemeral runners with the new workflow_job webhook to automatically scale self-hosted runners in response to job requests from GitHub Actions.

    For more information, see "Autoscaling with self-hosted runners" and "Webhook events and payloads."

  • Composite actions for GitHub Actions

  • You can reduce duplication in your workflows by using composition to reference other actions. Previously, actions written in YAML could only use scripts. For more information, see "Creating a composite action."

  • New token scope for management of self-hosted runners

  • Managing self-hosted runners at the enterprise level no longer requires using personal access tokens with the admin:enterprise scope. You can instead use the new manage_runners:enterprise scope to restrict the permissions on your tokens. Tokens with this scope can authenticate to many REST API endpoints to manage your enterprise's self-hosted runners.

  • Audit log accessible via REST API

  • You can now use the REST API to programmatically interface with the audit log. While audit log forwarding provides you with the ability to retain and analyze data with your own toolkit and determine patterns over time, the new REST API will help you perform limited analysis on events of note that have happened in recent history. For more information, see "Reviewing the audit log for your organization."

  • Expiration dates for personal access tokens

  • You can now set an expiration date on new and existing personal access tokens. GitHub AE will send you an email when it's time to renew a token that's about to expire. Tokens that have expired can be regenerated, giving you a duplicate token with the same properties as the original. When using a token with the GitHub AE API, you'll see a new header, GitHub-Authentication-Token-Expiration, indicating the token's expiration date. You can use this in scripts, for example to log a warning message as the expiration date approaches. For more information, see "Creating a personal access token" and "Getting started with the REST API."

  • Export a list of people with access to a repository

  • Organization owners can now export a list of the people with access to a repository in CSV format. For more information, see "Viewing people with access to your repository."

  • Improved management of code review assignments

  • New settings to manage code review assignment code review assignment help distribute a team's pull request review across the team members so reviews aren't the responsibility of just one or two team members.

    • Child team members: Limit assignment to only direct members of the team. Previously, team review requests could be assigned to direct members of the team or members of child teams.
    • Count existing requests: Continue with automatic assignment even if one or more members of the team are already requested. Previously, a team member who was already requested would be counted as one of the team's automatic review requests.
    • Team review request: Keep a team assigned to review even if one or more members is newly assigned.

    For more information, see "Managing code review settings for your team."

  • New themes

  • Two new themes are available for the GitHub AE web UI.

    • A dark high contrast theme, with greater contrast between foreground and background elements
    • Light and dark colorblind, which swap colors such as red and green for orange and blue

    For more information, see "Managing your theme settings."

  • Markdown improvements

  • You can now use footnote syntax in any Markdown field to reference relevant information without disrupting the flow of your prose. Footnotes are displayed as superscript links. Click a footnote to jump to the reference, displayed in a new section at the bottom of the document. For more information, see "Basic writing and formatting syntax."

  • You can now toggle between the source view and rendered Markdown view through the web UI by clicking the button to "Display the source diff" at the top of any Markdown file. Previously, you needed to use the blame view to link to specific line numbers in the source of a Markdown file.

  • You can now add images and videos to Markdown files in gists by pasting them into the Markdown body or selecting them from the dialog at the bottom of the Markdown file. For information about supported file types, see "Attaching files."

  • GitHub AE now automatically generates a table of contents for Wikis, based on headings.

    Changes

    Performance

  • Page loads and jobs are now significantly faster for repositories with many Git refs.

  • Administration

  • The user impersonation process is improved. An impersonation session now requires a justification for the impersonation, actions are recorded in the audit log as being performed as an impersonated user, and the user who is impersonated will receive an email notification that they have been impersonated by an enterprise owner. For more information, see "Impersonating a user."

  • GitHub Actions

  • To mitigate insider man-in-the-middle attacks when using actions resolved through GitHub Connect to GitHub.com from GitHub AE, GitHub AE retires the actions namespace (OWNER/NAME) on use. Retiring the namespace prevents that namespace from being created in your enterprise, and ensures all workflows referencing the action will download it from GitHub.com. For more information, see "Enabling automatic access to GitHub.com actions using GitHub Connect."

  • The audit log now includes additional events for GitHub Actions. GitHub AE now records audit log entries for the following events.

    • A self-hosted runner is registered or removed.
    • A self-hosted runner is added to a runner group, or removed from a runner group.
    • A runner group is created or removed.
    • A workflow run is created or completed.
    • A workflow job is prepared. Importantly, this log includes the list of secrets that were provided to the runner.

    For more information, see "Security hardening for GitHub Actions."

  • GitHub Advanced Security

  • Code scanning will now map alerts identified in on:push workflows to show up on pull requests, when possible. The alerts shown on the pull request are those identified by comparing the existing analysis of the head of the branch to the analysis for the target branch that you are merging against. Note that if the pull request's merge commit is not used, alerts can be less accurate when compared to the approach that uses on:pull_request triggers. For more information, see "About code scanning with CodeQL."

    Some other CI/CD systems can exclusively be configured to trigger a pipeline when code is pushed to a branch, or even exclusively for every commit. Whenever such an analysis pipeline is triggered and results are uploaded to the SARIF API, code scanning will try to match the analysis results to an open pull request. If an open pull request is found, the results will be published as described above. For more information, see "Uploading a SARIF file to GitHub."

  • GitHub AE now detects secrets from additional providers. For more information, see "Secret scanning patterns."

  • Pull requests

  • The timeline and Reviewers sidebar on the pull request page now indicate if a review request was automatically assigned to one or more team members because that team uses code review assignment.

    Screenshot of indicator for automatic assignment of code review

  • You can now filter pull request searches to only include pull requests you are directly requested to review by choosing Awaiting review from you. For more information, see "Searching issues and pull requests."

  • If you specify the exact name of a branch when using the branch selector menu, the result now appears at the top of the list of matching branches. Previously, exact branch name matches could appear at the bottom of the list.

  • When viewing a branch that has a corresponding open pull request, GitHub AE now links directly to the pull request. Previously, there would be a prompt to contribute using branch comparison or to open a new pull request.

  • You can now click a button to copy the full raw contents of a file to the clipboard. Previously, you would need to open the raw file, select all, and then copy. To copy the contents of a file, navigate to the file and click in the toolbar. Note that this feature is currently only available in some browsers.

  • A warning is now displayed when viewing a file that contains bidirectional Unicode text. Bidirectional Unicode text can be interpreted or compiled differently than it appears in a user interface. For example, hidden bidirectional Unicode characters can be used to swap segments of text in a file. For more information about replacing these characters, see the GitHub Changelog.

  • Repositories

  • GitHub AE now includes enhanced support for CITATION.cff files. CITATION.cff files are plain text files with human- and machine-readable citation information. GitHub AE parses this information into convenient formats such as APA and BibTeX that can be copied by others. For more information, see "About CITATION files."

  • You can now add, delete, or view autolinks through the Repositories API's Autolinks endpoint. For more information, see "Autolinked references and URLs" and "Repositories" in the REST API documentation.

  • Releases

  • The tag selection component for GitHub releases is now a drop-down menu rather than a text field. For more information, see "Managing releases in a repository."

  • Markdown

  • When dragging and dropping files such as images and videos into a Markdown editor, GitHub AE now uses the mouse pointer location instead of the cursor location when placing the file.

December 6, 2021

GitHub comenzó a implementar estos cambios en empresas en December 6, 2021.

    Features

    Administration

  • Customers with active or trial subscriptions for GitHub AE can now provision GitHub AE resources from the Azure Portal. Your Azure subscription must be feature-flagged to access GitHub AE resources in the portal. Contact your account manager or Equipo de ventas de GitHub to validate your Azure subscription's eligibility. For more information, see "Setting up a trial of GitHub AE."

  • GitHub Actions

  • GitHub Actions is now generally available for GitHub AE. GitHub Actions is a powerful, flexible solution for CI/CD and workflow automation. For more information, see "Introduction to GitHub Actions."

  • Self-hosted runners are the default type of runner system on GitHub AE, and are now generally available for GitHub Actions. With self-hosted runners, you can manage your own machines or containers for the execution of GitHub Actions jobs. For more information, see "About self-hosted runners" and "Adding self-hosted runners."

  • Environments, environment protection rules, and environment secrets are now generally available for GitHub Actions on GitHub AE. For more information, see "Environments."

  • GitHub Actions can now generate a visual graph of your workflow on every run. With workflow visualization, you can achieve the following.

    • View and understand complex workflows.
    • Track progress of workflows in real-time.
    • Troubleshoot runs quickly by easily accessing logs and jobs metadata.
    • Monitor progress of deployment jobs and easily access deployment targets.

    For more information, see "Using the visualization graph."

  • GitHub Actions now lets you control the permissions granted to the GITHUB_TOKEN secret. The GITHUB_TOKEN is an automatically generated secret that lets you make authenticated calls to the API for GitHub AE in your workflow runs. GitHub Actions generates a new token for each job and expires the token when a job completes. The token has write permissions to a number of API endpoints except in the case of pull requests from forks, which are always read. These new settings allow you to follow a principle of least privilege in your workflows. For more information, see "Authentication in a workflow."

  • GitHub Actions now supports skipping push and pull_request workflows by looking for some common keywords in your commit message.

  • GitHub CLI 1.9 and later allows you to work with GitHub Actions in your terminal. For more information, see el blog de GitHub.

  • Code scanning

  • Code scanning is now in beta for GitHub AE. For more information, see "About code scanning."

  • Secret scanning

  • You can now specify your own patterns for secret scanning with the beta of custom patterns on GitHub AE. You can specify patterns for repositories, organizations, and your entire enterprise. When you specify a new pattern, secret scanning searches a repository's entire Git history for the pattern, as well as any new commits. For more information, see "Defining custom patterns for secret scanning."

  • GitHub Connect

  • GitHub Connect is now available in beta for GitHub AE. GitHub Connect brings the power of the world's largest open source community to tu empresa. You can allow users to view search results from GitHub.com on GitHub AE, show contribution counts from GitHub AE on GitHub.com, and use GitHub Actions from GitHub.com. For more information, see "Managing connections between your enterprise accounts."

  • GitHub Packages

  • You can now delete any package or package version for GitHub Packages from GitHub AE's web UI. You can also undo the deletion of any package or package version within 30 days. For more information, see "Deleting and restoring a package."

  • The npm registry for GitHub Packages and GitHub.com no longer returns a time value in metadata responses, providing substantial performance improvements. GitHub will continue returning the time value in the future.

  • Audit logging

  • Events for pull requests and pull request reviews are now included in the audit log for both enterprises and organizations. These events help administrators better monitor pull request activity and ensure security and compliance requirements are being met. Events can be viewed from the web UI, exported as CSV or JSON, or accessed via REST API. You can also search the audit log for specific pull request events.

  • Additional events for GitHub Actions are now included in the audit log for both enterprises and organizations.

    • A workflow is deleted or re-run.
    • A self-hosted runner's version is updated.
  • Authentication

  • GitHub AE now officially supports Okta for SAML single sign-on (SSO) and user provisioning with SCIM. You can also map groups in Okta to teams on GitHub AE. For more information, see "Configuring authentication and provisioning for your enterprise using Okta" and "Mapping Okta groups to teams."

  • The format of authentication tokens for GitHub AE has changed. The change affects the format of personal access tokens and access tokens for OAuth Apps, as well as user-to-server, server-to-server, and refresh tokens for GitHub Apps. GitHub recommends updating existing tokens as soon as possible to improve security and allow secret scanning to detect the tokens. For more information, see "About authentication to GitHub" and "About secret scanning."

  • You can now authenticate SSH connections to GitHub AE using a FIDO2 security key by adding an sk-ecdsa-sha2-nistp256@openssh.com SSH key to your account. SSH security keys store secret key material on a separate hardware device that requires verification, such as a tap, to operate. Storing the key on separate hardware and requiring physical interaction for your SSH key offers additional security. Since the key is stored on hardware and is non-extractable, the key can't be read or stolen by software running on the computer. The physical interaction prevents unauthorized use of the key since the security key will not operate until you physically interact with it. For more information, see "Generating a new SSH key and adding it to the ssh-agent."

  • Git Credential Manager (GCM) Core versions 2.0.452 and later now provide secure credential storage and multi-factor authentication support for GitHub AE. GCM Core with support for GitHub AE is included with Git for Windows versions 2.32 and later. GCM Core is not included with Git for macOS or Linux, but can be installed separately. For more information, see the latest release and installation instructions in the microsoft/Git-Credential-Manager-Core repository.

  • Notifications

  • You can now configure which events you would like to be notified about on GitHub AE. From any repository, select the Watch drop-down, then click Custom. For more information, see "Configuring notifications."

  • Issues and pull requests

  • With the latest version of Octicons, the states of issues and pull requests are now more visually distinct so you can scan status more easily. For more information, see el blog de GitHub.

  • You can now see all pull request review comments in the Files tab for a pull request by selecting the Conversations drop-down. You can also require that all pull request review comments are resolved before anyone merges the pull request. For more information, see "About pull request reviews" and "About protected branches." For more information about management of branch protection settings with the API, see "Branches" in the REST API documentation and "Mutations" in the GraphQL API documentation.

  • You can now upload video files everywhere you write Markdown on GitHub AE. Share demos, show reproduction steps, and more in issue and pull request comments, as well as in Markdown files within repositories, such as READMEs. For more information, see "Attaching files."

  • GitHub AE now shows a confirmation dialog when you request a review from a team with more than 100 members, allowing you to prevent unnecessary notifications for large teams.

  • When an issue or pull request has fewer than 30 possible assignees, the assignees control will list all potential users rather than a limited set of suggestions. This behavior helps people in small organizations to quickly find the right user. For more information about assigning users to issues and pull requests, see "Assigning issues and pull requests to other GitHub users."

  • You can now include multiple words after the # in a comment for an issue or pull request to further narrow your search. To dismiss the suggestions, press Esc.

  • To prevent the merge of unexpected changes after you enable auto-merge for a pull request, auto-merge is now disabled automatically when new changes are pushed by a user without write access to the repository. Users without write access can still update the pull request with changes from the base branch when auto-merge is enabled. To prevent a malicious user from using a merge conflict to introduce unexpected changes to the pull request, GitHub AE will disable auto-merge for the pull request if the update causes a merge conflict. For more information about auto-merge, see "Automatically merging a pull request."

  • People with maintain access can now manage the repository-level "Allow auto-merge" setting. This setting, which is off by default, controls whether auto-merge is available on pull requests in the repository. Previously, only people with admin access could manage this setting. Additionally, this setting can now by controlled using the "Create a repository" and "Update a repository" REST APIs. For more information, see "Managing auto-merge for pull requests in your repository."

  • The assignees selection for issues and pull requests now supports type ahead searching so you can find users in your organization faster. Additionally, search result rankings have been updated to prefer matches at the start of a person's username or profile name.

  • Repositories

  • When viewing the commit history for a file, you can now click to view the file at the specified time in the repository's history.

  • You can now use the web UI to synchronize an out-of-date branch for a fork with the fork's upstream branch. If there are no merge conflicts between the branches, GitHub AE updates your branch either by fast-forwarding or by merging from upstream. If there are conflicts, GitHub AE will prompt you to open pull request to resolve the conflicts. For more information, see "Syncing a fork."

  • You can now sort the repositories on a user or organization profile by star count.

  • The Repositories REST API's "compare two commits" endpoint, which returns a list of commits reachable from one commit or branch, but unreachable from another, now supports pagination. The API can also now return the results for comparisons over 250 commits. For more information, see the "Commits" REST API documentation and "Traversing with pagination."

  • When you define a submodule in tu empresa with a relative path, the submodule is now clickable in the web UI. Clicking the submodule in the web UI will take you to the linked repository. Previously, only submodules with absolute URLs were clickable. Relative paths for repositories with the same owner that follow the pattern ../REPOSITORY or relative paths for repositories with a different owner that follow the pattern ../OWNER/REPOSITORY are supported. For more information about working with submodules, see Working with submodules on el blog de GitHub.

  • By precomputing checksums, the amount of time a repository is under lock has reduced dramatically, allowing more write operations to succeed immediately and improving monorepo performance.

  • Releases

  • You can now react with emoji to all releases on GitHub AE. For more information, see "About releases."

  • Themes

  • Dark and dark dimmed themes are now available for the web UI. GitHub AE will match your system preferences when you haven't set theme preferences in GitHub AE. You can also customize the themes that are active during day and night. For more information, see "Managing your theme settings."

  • Markdown

  • Markdown files in your repositories now automatically generate a table of contents in the header the file has two or more headings. The table of contents is interactive and links to the corresponding section. All six Markdown heading levels are supported. For more information, see "About READMEs."

  • code markup is now supported in titles for issues and pull requests. Text within backticks (`) will appear rendered in a fixed-width font anywhere the issue or pull request title appears in the web UI for GitHub AE.

  • While editing Markdown in files, issues, pull requests, or comments, you can now use a keyboard shortcut to insert a code block. The keyboard shortcut is command + E on a Mac or Ctrl + E on other devices. For more information, see "Basic writing and formatting syntax."

  • You can append ?plain=1 to the URL for any Markdown file to display the file without rendering and with line numbers. You can use the plain view to link other users to specific lines. For example, appending ?plain=1#L52 will highlight line 52 of a plain text Markdown file. For more information, "Creating a permanent link to a code snippet."

  • GitHub Apps

  • API requests to create an installation access token now respect IP allow lists for an enterprise or organization. Any API requests made with an installation access token for a GitHub App installed on your organization already respect IP allow lists. This feature does not currently consider any Azure network security group (NSG) rules that GitHub Support has configured for tu empresa. For more information, see "Restricting network traffic to your enterprise," "Managing allowed IP addresses for your organization," and "Apps" in the REST API documentation.

  • Webhooks

  • You can now programmatically resend or check the status of webhooks through the REST API. For more information, see "Repositories," "Organizations," and "Apps" in the REST API documentation.

Semana del 3 de marzo de 2021

GitHub comenzó a implementar estos cambios en empresas en 3 de marzo de 2021.

    Features

    GitHub Actions beta

  • GitHub Actions es una solución flexible y poderosa para la automatización de flujos de trabajo y de IC/DC. Para obtener más información, consulta la sección "Introducción a las GitHub Actions."

    Por favor, toma en cuenta que, cuando se habilitan las GitHub Actions durante esta mejora, aparecerán dos organizaciones de nombre "GitHub Actions" (@actions and @github) en tu empresa. GitHub Actions requiere estas organizaciones. Los usuarios de nombre @ghost y @actions se mostrarán como los actores para crear estas organizaciones en la bitácora de auditoría.

  • GitHub Packages beta

  • El Registro del paquete de GitHub es un servicio de hospedaje de paquetes que se integra nativamente con GitHub Actions, con las API y los webhooks. Crea un flujo de trabajo de punto a punto de DevOps que incluya tu código, integración continua y soluciones de despliegue. Durante este beta, el Registro del paquete de GitHub se ofrece gratuitamente para los clientes de GitHub AE.

  • Seguridad Avanzada de GitHub beta

  • La GitHub Advanced Security se encuentra disponible en beta e incluye tanto el escaneo de código como el de secretos. Durante este beta, las características de la GitHub Advanced Security se ofrecen gratuitamente para los clientes de GitHub AE. Los administradores de repositorios y organizaciones pueden decidir unirse para utilizar la GitHub Advanced Security en la pestaña de Seguridad y Análisis debajo de la sección de configuración.

    Aprende más sobre la GitHub Advanced Security escaneo de códgo y escaneo de secretos en GitHub AE.

  • Administra equipos desde tu proveedor de identidad (IdP)

  • Los clientes que utilizan SCIM (Sistema para la Administración de Identidad entre Dominios, por sus siglas en inglés) ahora pueden sincronizar los grupos de seguridad en Azure Active Directory con los equipos de GitHub. Una vez que se haya ligado el equipo a un grupo de seguridad, la membrecía se actualizará automáticamente en GitHub AE cuando se agregue o elimine un usuario de su grupo de seguridad asignado.

  • Beta de listas de IP permitidas

  • Las Listas de direcciones IP permitidas de GitHub proporcionan la capacidad de filtrar el tráfico de los rangos de IP que especifican los administradores, los cuales se definen en notación CIDR. La lista de direcciones permitidas se define a nivel de la cuenta empresarial u organizacional en Seguridad > Configuración. Todo el tráfico que pretende llegar a los recursos dentro de la cuenta empresarial y de las organizaciones se filtra con las listas de direcciones IP permitidas. Esta funcionalidad se proporciona adicionalmente a la capacidad de solicitar cambios de grupo de seguridad de redes que filtran el tráfico a todo el inquilino GHAE.

    Changes

    Cambios de desarrollador

  • Los propietarios de la organización ahora pueden inhabilitar la publicación de los sitios de Páginas de GitHub desde los repositorios de la misma. Esto no dejará de publicar los sitios existentes.

  • Los repositorios que utilizan Páginas de GitHub ahora pueden crear y desplegar desde cualquier rama.

  • Cuando se escribe una propuesta o solicitud de cambios, la sintaxis de lista para las viñetas, números y tareas ahora se auto-completará después de que presiones return o enter.

  • Ahora puedes borrar un directorio en un repositorio desde la página del dicho repositorio. Cuando navegas a un directorio, el botón de kebab nuevo junto al botón de "Agregar archivo" proporciona la opción de borrar el directorio.

  • Ahora es más fácil y rápido referenciar las propuestas o solicitudes de cambios con búsquedas a lo largo de palabras múltiples después del "#".

  • Cambios en la administración

  • Los propietarios de empresas ahora pueden publicar un mensaje obligatorio. Este mensaje se muestra a todos los usuarios, los cuales deben aceptarlo. Esto puede utilizarse para mostrar información importante, políticas o condiciones de servicio.

  • El permiso de ruta de archivo sencilla de una GitHub App ahora puede ser compatible con hasta diez archivos.

  • Cuando configuras una GitHub App, la URL de rellamado de autorización constituye un campo requerido. Ahora permitiremos que el integrador especifique URL de rellamado múltiples. GitHub AE negará la autorización si no se lista la URL de rellamado de la solicitud.

  • Una terminal de API nueva permite el intercambio de un token de usuario a servidor por otro de este tipo que tenga alcance para repositorios específicos.

  • Ahora los eventos se registrarán en la bitácora de auditoría en promover a un miembro del equipo para que sea un mantenedor del mismo y en bajar de categoría a un mantenedor de equipo para que sea un miembro de equipo.

  • El Flujo de autorización para dispositivos OAuth ahora es compatible. Esto permite que cualquier cliente de CLI o herramienta de desarrollo se autentique utilizando un sistema secundario.

  • Los usuarios ya no pueden borrar sus cuentas si se habilita el aprovisionamiento de SCIM.

  • Renombrar la rama predeterminada

  • Los propietarios de las empresas y organizaciones ahora pueden configurar el nombre de la rama predeterminada para los repositorios nuevos. Los propietarios de las empresas también pueden requerir su elección de nombres de empresas predeterminadas a través de todas las organizaciones o permitir que las organizaciones individuales elijan el suyo propio.

    Esta configuración no afectará a los repositorios existentes y el nombre de sus ramas predeterminadas no cambiará.

    Este cambio es uno de muchos que GitHub está haciendo para apoyar a los proyectos y mantenedores que quieren renombrar su rama predeterminada. Para aprender más, consulta la sección github/renaming.

    Bug fixes

    Corrección de errores

  • Los usuarios ya no pueden configurar direcciones de correo electrónico de respaldo en sus perfiles. Sus direcciones de correo electrónico se configuran únicamente mediante el IdP.

  • Ya no puedes habilitar la autenticación bifactorial después de configurar la autenticación a través de tu IdP.

  • GitHub AE ahora puede conectarse a los tableros de Azure.

  • Los encabezados de versión no estaban en las API y ahora se configuraron en "GitHub AE".

  • Se arreglaron los enlaces a la documentación.

  • Estaba fallando la configuración para reenviar bitácoras de auditoría dentro de los ajustes de empresa.

  • El navegar hacia los gists podría resultar en un error 500.

  • La URL o el correo electrónico de soporte no podría guardar nada. Ahora guarda las cosas después de algunos minutos.

  • Las plantillas de solicitudes de cambio a nivel organizacional no se estaban aplicando a todas las solicitudes de cambio en la organización.

    Known issues

    Problemas conocidos

  • Los datos de ubicación geográfica no se muestran en la bitácora de auditoría. La información sobre la ubicación se puede discernir entonces desde la dirección IP asociada con cada evento.

  • El enlace al Registro del paquete de GitHub desde una página de repositorio muestra una página de búsqueda incorrecta cuando dicho repositorio no tiene paquetes.