8.2 KiB
title, intro, versions
| title | intro | versions | ||
|---|---|---|---|---|
| GitHub AE release notes | March 1, 2021 |
|
Features
{% data variables.product.prodname_actions %} beta
{% data variables.product.prodname_actions %} is a powerful, flexible solution for CI/CD and workflow automation. For more information, see "Introduction to {% data variables.product.prodname_actions %}."
{% data variables.product.prodname_actions %} on {% data variables.product.product_name %} uses a new {% data variables.actions.hosted_runner %}, only available for {% data variables.product.product_name %}, that enables you to customize the size, image, and networking configuration of the runners. These runners are a finished-service CI compute environment with auto-scaling and management, fully managed by {% data variables.product.company_short %}. During the beta, the use {% data variables.actions.hosted_runner %}s is free of charge. For more information, see "Adding {% data variables.actions.hosted_runner %}s."
Please note that when {% data variables.product.prodname_actions %} is enabled during this upgrade, two organizations named "GitHub Actions" (@actions and @github) will appear in {% data variables.product.product_location %}. These organizations are required by {% data variables.product.prodname_actions %}. Users named @ghost and @actions appear as the actors for creation of these organizations in the audit log.
{% data variables.product.prodname_registry %} beta
{% data variables.product.prodname_registry %} is a package hosting service, natively integrated with {% data variables.product.prodname_actions %}, APIs, and webhooks. Create an end-to-end DevOps workflow that includes your code, continuous integration, and deployment solutions. During this beta, {% data variables.product.prodname_registry %} is offered free of charge to {% data variables.product.product_name %} customers.
{% data variables.product.prodname_GH_advanced_security %} beta
{% data variables.product.prodname_GH_advanced_security %} is available in beta and includes both code scanning and secret scanning. During this beta, {% data variables.product.prodname_GH_advanced_security %} features are being offered free of charge to {% data variables.product.product_name %} customers. Repository and organization administrators can opt-in to use {% data variables.product.prodname_GH_advanced_security %} in the Security and Analysis tab under settings.
Learn more about {% data variables.product.prodname_GH_advanced_security %} code scanning and secret scanning on {% data variables.product.prodname_ghe_managed %}.
Manage teams from your identity provider (IdP)
Customers using SCIM (System for Cross-domain Identity Management) can now sync security groups in Azure Active Directory with {% data variables.product.company_short %} teams. Once a team has been linked to a security group, membership will be automatically updated in {% data variables.product.product_name %} when a user is added or removed from their assigned security group.
IP allow lists beta
{% data variables.product.company_short %} IP allow lists provide the ability to filter traffic from administrator-specified IP ranges, defined by CIDR notation. The allow list is defined at the enterprise or organization account level in Security > Settings. All traffic that attempts to reach resources within the enterprise account and organizations are filtered by the IP allow lists. This functionality is provided in addition to the ability to request network security group changes that filter traffic to the entirety of the GHAE tenant.
Changes
Developer changes
- Organization owners can now disable publication of {% data variables.product.prodname_pages %} sites from repositories in the organization. This will not unpublish existing sites.
- Repositories that use {% data variables.product.prodname_pages %} can now build and deploy from any branch.
- When writing an issue or pull request, the list syntax for bullets, numbers, and tasks will now be autocompleted after you press
returnorenter. - You can now delete a directory in a repository from the repository page. When navigating to a directory, a new kebab button next to the "Add file" button gives the option to delete the directory.
- It’s now easier and faster to reference issues or pull requests, with search across multiple words after the "#".
Administration changes
- Enterprise owners can now publish a mandatory message. The message is shown to all users and they must acknowledge it. This can be used to display important information, terms of service or policies.
- The {% data variables.product.prodname_github_app%} single file path permission can now support up to ten files.
- When configuring a {% data variables.product.prodname_github_app%}, the authorization callback URL is a required field. Now we will permit the integrator to specify multiple callback URLs. {% data variables.product.product_name %} denies authorization if the callback URL from the request is not listed.
- A new API endpoint enables the exchange of a user to server token for a user to server token scoped to specific repositories.
- Events are now logged in the audit log on promoting a team member to be a team maintainer and on demoting a team maintainer to be a team member.
- The OAuth device authorization flow is now supported. This allows any CLI client or developer tool to authenticate using a secondary system.
- A user can no longer delete their account if SCIM provisioning is enabled.
Default branch renaming
Enterprise and organization owners can now set the default branch name for new repositories. Enterprise owners can also enforce their choice of default branch name across all organizations or allow individual organizations to choose their own.
Existing repositories are unaffected by these settings, and their default branch name will not be changed.
This change is one of many changes {% data variables.product.company_short %} is making to support projects and maintainers that want to rename their default branch. To learn more, see github/renaming.
Bug fixes
- Users can no longer set a backup email address on their profile. Their email address is set through the IdP only.
- You can no longer enable two-factor authentication after configuring authentication through your IdP.
- {% data variables.product.product_name %} can now connect to Azure Boards.
- Version headers were missing from the APIs, and have now been set to "GitHub AE."
- Links to documentation have been fixed.
- Configuration of audit log forwarding within the enterprise's settings was failing.
- Navigating to gists could result in a 500 error.
- The Support email or URL was failing to save. It now saves after a period of a few minutes.
- Organization level pull request templates were not being applied to all pull requests in the organization.
Known issues
- Geographic location data is not shown in the audit log. Location information can otherwise be discerned from the IP address associated with each event.
- The link to {% data variables.product.prodname_registry %} from a repository page shows an incorrect search page when that repository does not have any packages.