GitHub AE release notes

Week of March 3, 2021

3 de março de 2021 - These changes rolled out to enterprises during the week of 3 de março de 2021.

  • GitHub Actions beta

    • GitHub Actions is a powerful, flexible solution for CI/CD and workflow automation. For more information, see "Introduction to GitHub Actions."

      GitHub Actions on GitHub AE uses a new AE hosted runner, only available for GitHub AE, that enables you to customize the size, image, and networking configuration of the runners. These runners are a finished-service CI compute environment with auto-scaling and management, fully managed by GitHub. During the beta, the use AE hosted runners is free of charge. For more information, see "Adding AE hosted runners."

      Please note that when GitHub Actions is enabled during this upgrade, two organizations named "GitHub Actions" (@actions and @github) will appear in a sua empresa. These organizations are required by GitHub Actions. Users named @ghost and @actions appear as the actors for creation of these organizations in the audit log.

  • GitHub Packages beta

    • GitHub Package Registry is a package hosting service, natively integrated with GitHub Actions, APIs, and webhooks. Create an end-to-end DevOps workflow that includes your code, continuous integration, and deployment solutions. During this beta, GitHub Package Registry is offered free of charge to GitHub AE customers.

  • GitHub Advanced Security beta

    • Segurança Avançada GitHub is available in beta and includes both code scanning and secret scanning. During this beta, Segurança Avançada GitHub features are being offered free of charge to GitHub AE customers. Repository and organization administrators can opt-in to use Segurança Avançada GitHub in the Security and Analysis tab under settings.

      Learn more about Segurança Avançada GitHub code scanning and secret scanning on GitHub AE.

  • Gerenciar equipes do seu provedor de identidade (IdP)

    • Customers using SCIM (System for Cross-domain Identity Management) can now sync security groups in Azure Active Directory with GitHub teams. Once a team has been linked to a security group, membership will be automatically updated in GitHub AE when a user is added or removed from their assigned security group.

  • Beta de listas de permissões de IP

    • GitHub IP allow lists provide the ability to filter traffic from administrator-specified IP ranges, defined by CIDR notation. The allow list is defined at the enterprise or organization account level in Security > Settings. All traffic that attempts to reach resources within the enterprise account and organizations are filtered by the IP allow lists. This functionality is provided in addition to the ability to request network security group changes that filter traffic to the entirety of the GHAE tenant.

  • Alterações de desenvolvedor

    • Organization owners can now disable publication of GitHub Pages sites from repositories in the organization. This will not unpublish existing sites.

    • Repositories that use GitHub Pages can now build and deploy from any branch.

    • When writing an issue or pull request, the list syntax for bullets, numbers, and tasks will now be autocompleted after you press return or enter.

    • You can now delete a directory in a repository from the repository page. When navigating to a directory, a new kebab button next to the "Add file" button gives the option to delete the directory.

    • It's now easier and faster to reference issues or pull requests, with search across multiple words after the "#".

  • Mudanças na administração

    • Enterprise owners can now publish a mandatory message. The message is shown to all users and they must acknowledge it. This can be used to display important information, terms of service or policies.

    • The aplicativo GitHub single file path permission can now support up to ten files.

    • When configuring a aplicativo GitHub, the authorization callback URL is a required field. Now we will permit the integrator to specify multiple callback URLs. GitHub AE denies authorization if the callback URL from the request is not listed.

    • A new API endpoint enables the exchange of a user to server token for a user to server token scoped to specific repositories.

    • Events are now logged in the audit log on promoting a team member to be a team maintainer and on demoting a team maintainer to be a team member.

    • The OAuth device authorization flow is now supported. This allows any CLI client or developer tool to authenticate using a secondary system.

    • Um usuário não pode mais excluir sua conta se o provisionamento de SCIM estiver habilitado.

  • Renomeação do branch padrão

    • Enterprise and organization owners can now set the default branch name for new repositories. Enterprise owners can also enforce their choice of default branch name across all organizations or allow individual organizations to choose their own.

      Existing repositories are unaffected by these settings, and their default branch name will not be changed.

      This change is one of many changes GitHub is making to support projects and maintainers that want to rename their default branch. To learn more, see github/renaming.

  • Correções de erros

    • Users can no longer set a backup email address on their profile. Their email address is set through the IdP only.

    • Você não pode mais habilitar a autenticação de dois fatores após a configuração de autenticação através do seu IdP.

    • GitHub AE agora pode conectar-se ao Azure Boards.

    • Os cabeçalhos de versão estavam ausentes nas APIs e agora foram definidos como "GitHub AE".

    • Foram corrigidos links na documentação.

    • Ocorreu uma falha na configuração de encaminhamento de log de auditoria nas configurações da empresa.

    • Acesar os gists pode gerar um "500 error".

    • The Support email or URL was failing to save. It now saves after a period of a few minutes.

    • Os modelos de pull request no nível de organização não estavam sendo aplicados em todos os pull requests na organização.

  • Problemas conhecidos

    • Geographic location data is not shown in the audit log. Location information can otherwise be discerned from the IP address associated with each event.

    • O link para GitHub Package Registry de uma página do repositório mostra uma página de pesquisa incorreta quando esse repositório não tem pacotes.

Esse documento ajudou você?Política de Privacidade

Ajude-nos a tornar esses documentos ótimos!

Todos os documentos do GitHub são de código aberto. Você percebeu que algo que está errado ou não está claro? Envie um pull request.

Faça uma contribuição

Ou, aprenda como contribuir.