Skip to content

Commit 831619a

Browse files
authored
Merge pull request #43850 from github/repo-sync
Repo sync
2 parents 36ff3c3 + 9a658b9 commit 831619a

File tree

8 files changed

+92
-8
lines changed

8 files changed

+92
-8
lines changed

content/admin/data-residency/network-details-for-ghecom.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -200,6 +200,8 @@ Japan region:
200200
#### EU
201201

202202
`*.blob.core.windows.net` can be replaced with:
203+
* `memoryalphaprodsdc01.blob.core.windows.net`
204+
* `memoryalphaprodweu01.blob.core.windows.net`
203205
* `prodsdc01resultssa0.blob.core.windows.net`
204206
* `prodsdc01resultssa1.blob.core.windows.net`
205207
* `prodsdc01resultssa2.blob.core.windows.net`
@@ -212,6 +214,7 @@ Japan region:
212214
#### Australia
213215

214216
`*.blob.core.windows.net` can be replaced with:
217+
* `memoryalphaprodae01.blob.core.windows.net`
215218
* `prodae01resultssa0.blob.core.windows.net`
216219
* `prodae01resultssa1.blob.core.windows.net`
217220
* `prodae01resultssa2.blob.core.windows.net`
@@ -220,6 +223,7 @@ Japan region:
220223
#### Japan
221224

222225
`*.blob.core.windows.net` can be replaced with:
226+
* `memoryalphaprodjpw01.blob.core.windows.net`
223227
* `prodjpw01resultssa0.blob.core.windows.net`
224228
* `prodjpw01resultssa1.blob.core.windows.net`
225229
* `prodjpw01resultssa2.blob.core.windows.net`

content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ If you invite an existing organization into your trial enterprise, **all of thes
5454

5555
## Do I need to provide a payment method?
5656

57-
You do not need to provide a payment method to start a trial. If you want to use {% data variables.copilot.copilot_business_short %} during the trial, you can contact {% data variables.contact.github_support %} for approval. Once your request is approved, you will need to provide a credit card for additional validation. You **won't** be charged for using {% data variables.copilot.copilot_business_short %} during the trial.
57+
You do not need to provide a payment method to start a trial.
5858

5959
## During the trial
6060

content/code-security/how-tos/secure-at-scale/configure-organization-security/manage-usage-and-access/giving-org-access-private-registries.md

Lines changed: 28 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,17 @@ You need to be an **organization owner** to set up access to private registries
4343
1. Use the **URL** and **Type** fields to define the location and type of the registry:
4444
* **URL** is the location where you access the private registry. For example, to use the {% data variables.product.prodname_registry %} registry for NuGet: `https://nuget.pkg.github.com/ORGANIZATION/index.json`, where `ORGANIZATION` is the name of your organization on {% data variables.product.github %}.
4545
* **Type** is the type of registry.
46-
1. Select either **Token** or **Username and password**, depending on the authentication method, then enter data into the appropriate fields.
47-
Some types of authentication tokens, such as a {% data variables.product.github %} {% data variables.product.pat_generic_title_case %}, are tied to a particular user identity. Select the **Username and password** option for these and enter the relevant username as **Username** and the token as **Password**.
46+
1. Select the authentication method for the registry:
47+
* **Token**: Enter the token used to authenticate with the registry.
48+
* **Username and password**: Enter the username and password used to authenticate with the registry. Some types of authentication tokens, such as a {% data variables.product.github %} {% data variables.product.pat_generic_title_case %}, are tied to a particular user identity. Select this option for these and enter the relevant username as **Username** and the token as **Password**.
49+
{% ifversion org-private-registry-oidc %}
50+
* **OIDC (OpenID Connect)**: Use short-lived credentials from a cloud identity provider instead of storing long-lived secrets. When you select this option, choose a provider and fill in the provider-specific fields. For more information, see [Configuring OIDC authentication for a private registry](#configuring-oidc-authentication-for-a-private-registry).
51+
{% endif %}
4852
1. Define which repositories in the organization can access the private registry using these details: all, private and internal, or selected repositories only.
4953
1. When you have finished defining the private registry, select **Add Registry** to save the registry information.
5054

5155
> [!TIP]
52-
> When you add a private registry to an organization the token or password is stored as an encrypted secret. Once the registry is created, the token or password cannot be viewed again.
56+
> When you add a private registry to an organization using **Token** or **Username and password** authentication, the token or password is stored as an encrypted secret. Once the registry is created, the token or password cannot be viewed again.
5357
5458
### Enabling {% data variables.product.prodname_code_scanning %} default setup to use a registry definition
5559

@@ -77,6 +81,27 @@ Any private registries used by the build must also be accessible to the workflow
7781

7882
When you configure access to one or more private registries, {% data variables.product.prodname_dependabot %} can propose pull requests to upgrade a vulnerable dependency or to maintain a dependency, see [AUTOTITLE](/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot) and [AUTOTITLE](/code-security/dependabot/working-with-dependabot/guidance-for-the-configuration-of-private-registries-for-dependabot).
7983

84+
{% ifversion org-private-registry-oidc %}
85+
86+
### Configuring OIDC authentication for a private registry
87+
88+
OIDC (OpenID Connect) authentication allows {% data variables.product.prodname_dependabot %} to use short-lived credentials from your cloud identity provider to access private registries, eliminating the need to store long-lived secrets. With OIDC, credentials are generated dynamically for each {% data variables.product.prodname_dependabot %} update job. You must configure a trust relationship between your cloud provider and {% data variables.product.github %} before {% data variables.product.prodname_dependabot %} can authenticate.
89+
90+
> [!NOTE]
91+
> OIDC authentication for organization-level private registries is currently supported by {% data variables.product.prodname_dependabot %}. It is not supported by {% data variables.product.prodname_code_scanning %} default setup.
92+
93+
When you select **OIDC** as the authentication method for a private registry, choose one of the supported providers and fill in the required fields:
94+
95+
* **Azure**: Enter the **Tenant ID** (Azure AD tenant ID) and **Client ID** (Azure AD application client ID). You must configure a federated credential in Azure AD that trusts {% data variables.product.github %}'s OIDC provider.
96+
* **AWS CodeArtifact**: Enter the **AWS Region**, **Account ID** (AWS account ID), **Role Name** (IAM role name), **Domain** (CodeArtifact domain), and **Domain Owner** (CodeArtifact domain owner / AWS account ID). You can optionally provide an **Audience**. You must configure an IAM OIDC identity provider in AWS that trusts {% data variables.product.github %}'s OIDC provider.
97+
* **JFrog Artifactory**: Enter the **OIDC Provider Name**. You can optionally provide an **Audience** and **Identity Mapping Name**.
98+
99+
The authentication type of a private registry cannot be changed after creation. To switch from OIDC to another authentication method, or vice versa, delete the existing registry and create a new one.
100+
101+
For more information about how OIDC works, see [AUTOTITLE](/actions/concepts/security/openid-connect).
102+
103+
{% endif %}
104+
80105
{% ifversion code-quality %}
81106

82107
## {% data variables.product.prodname_code_quality_short %} access to private registries

content/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/configuring-access-to-private-registries-for-dependabot.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,11 @@ For specific ecosystems, you can configure {% data variables.product.prodname_de
3232

3333
{% ifversion org-private-registry %}
3434

35-
You can configure {% data variables.product.prodname_dependabot %}'s access to private registries at the org-level. For more information on how to configure that, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries).
35+
You can configure {% data variables.product.prodname_dependabot %}'s access to private registries at the org-level.
36+
{% ifversion org-private-registry-oidc %}
37+
Organization-level registries support **Token**, **Username and password**, and **OIDC** authentication.
38+
{% endif %}
39+
For more information about configuration, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries).
3640

3741
{% endif %}
3842

@@ -126,6 +130,13 @@ If your private registry is configured with an IP allow list, you can find the I
126130

127131
With OIDC-based authentication, {% data variables.product.prodname_dependabot %} update jobs can dynamically obtain short-lived credentials from your cloud identity provider, just like {% data variables.product.prodname_actions %} workflows using OIDC federation.
128132

133+
{% ifversion org-private-registry-oidc %}
134+
135+
> [!TIP]
136+
> OIDC authentication is also available for **organization-level** private registries, which you can configure through the organization settings UI or the REST API. For more information, see [AUTOTITLE](/code-security/securing-your-organization/enabling-security-features-in-your-organization/giving-org-access-private-registries#configuring-oidc-authentication-for-a-private-registry).
137+
138+
{% endif %}
139+
129140
{% data variables.product.prodname_dependabot %} supports OIDC authentication for any registry type that uses `username` and `password` authentication, when the registry is hosted on one of the following cloud providers:
130141

131142
* AWS CodeArtifact

content/copilot/reference/copilot-cli-reference/cli-command-reference.md

Lines changed: 38 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -317,6 +317,7 @@ Settings cascade from user to repository to local, with more specific scopes ove
317317
| `compactPaste` | `boolean` | `true` | Collapse large pastes into compact tokens. |
318318
| `custom_agents.default_local_only` | `boolean` | `false` | Only use local custom agents. |
319319
| `denied_urls` | `string[]` | `[]` | URLs or domains blocked (takes precedence over `allowed_urls`). |
320+
| `enabledFeatureFlags` | `object` || Enable or disable individual feature flags. Keys are flag names; values are `true` (enable) or `false` (explicitly disable). Takes precedence over the legacy `feature_flags.enabled` array format. See [Feature flag reference](#feature-flag-reference). |
320321
| `experimental` | `boolean` | `false` | Enable experimental features. |
321322
| `includeCoAuthoredBy` | `boolean` | `true` | Add a `Co-authored-by` trailer to git commits made by the agent. |
322323
| `companyAnnouncements` | `string[]` | `[]` | Custom messages shown randomly on startup. |
@@ -969,6 +970,26 @@ MCP servers are loaded from multiple sources, each with a different trust level.
969970

970971
All MCP tool invocations require explicit permission. This applies even to read-only operations on external services.
971972

973+
### Migrating from `.vscode/mcp.json`
974+
975+
If your project uses `.vscode/mcp.json` (VS Code's MCP configuration format), migrate to `.mcp.json` for {% data variables.copilot.copilot_cli %}. The migration remaps the `servers` key to `mcpServers`.
976+
977+
**POSIX shells (bash, zsh, fish, and others):**
978+
979+
```shell
980+
jq '{mcpServers: .servers}' .vscode/mcp.json > .mcp.json
981+
```
982+
983+
Requires [`jq`](https://jqlang.github.io/jq/).
984+
985+
**PowerShell:**
986+
987+
```powershell
988+
pwsh -NoProfile -Command "`$json = Get-Content '.vscode/mcp.json' -Raw | ConvertFrom-Json; `$content = ([pscustomobject]@{ mcpServers = `$json.servers } | ConvertTo-Json -Depth 100); [System.IO.File]::WriteAllText('.mcp.json', `$content, (New-Object System.Text.UTF8Encoding `$false))"
989+
```
990+
991+
On Windows, replace `pwsh` with `powershell` if you are using Windows PowerShell instead of PowerShell Core.
992+
972993
## Skills reference
973994

974995
Skills are Markdown files that extend what the CLI can do. Each skill lives in its own directory containing a `SKILL.md` file. When invoked (via `/SKILL-NAME` or automatically by the agent), the skill's content is injected into the conversation.
@@ -1239,7 +1260,23 @@ When content capture is enabled, the following attributes are populated.
12391260

12401261
## Feature flag reference
12411262

1242-
Feature flags enable functionality that is not yet generally available. Enable flags via the `COPILOT_CLI_ENABLED_FEATURE_FLAGS` environment variable (comma-separated list) or by using the `/experimental` slash command.
1263+
Feature flags enable functionality that is not yet generally available. You can enable or disable individual flags in three ways:
1264+
1265+
* **Environment variable**: Set `COPILOT_CLI_ENABLED_FEATURE_FLAGS` to a comma-separated list of flag names (for example, `"SOME_FEATURE,SOME_OTHER_FEATURE"`).
1266+
* **Slash command**: Use `/experimental on` in an interactive session to enable all experimental-tier flags.
1267+
* **Configuration file**: Add an `enabledFeatureFlags` object to `~/.copilot/config.json`. Set a flag to `true` to enable it or `false` to explicitly disable a flag that would otherwise be enabled by your tier.
1268+
1269+
```json
1270+
{
1271+
"enabledFeatureFlags": {
1272+
"SOME_FEATURE": true,
1273+
"SOME_OTHER_FEATURE": false
1274+
}
1275+
}
1276+
```
1277+
1278+
> [!NOTE]
1279+
> The legacy `feature_flags.enabled` array format is still supported as a fallback, but `enabledFeatureFlags` takes precedence when both are present.
12431280
12441281
| Flag | Tier | Description |
12451282
|------|------|-------------|

content/enterprise-onboarding/getting-started-with-your-enterprise/setting-up-a-trial-of-github-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ If you invite an existing organization into your trial enterprise, **all of thes
3737

3838
## Do I need to provide a payment method?
3939

40-
You do not need to provide a payment method to start a trial. If you want to use {% data variables.copilot.copilot_business_short %} during the trial, you need to provide a credit card. You **won't** be charged for using {% data variables.copilot.copilot_business_short %} during the trial.
40+
You do not need to provide a payment method to start a trial.
4141

4242
## During the trial
4343

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Reference: github/github#419577
2+
# OIDC authentication support for organization-level private registries used by Dependabot.
3+
# This allows organizations to authenticate with private registries using OpenID Connect
4+
# instead of storing long-lived secrets.
5+
versions:
6+
fpt: '*'
7+
ghec: '*'
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
3aa5cd78f969f848b3607863b5f73ba722a3f489
1+
584832db507d47454ed410791e2d0c53468bea20

0 commit comments

Comments
 (0)