Skip to content

Commit 85f795b

Browse files
authored
Merge branch 'main' into patch-2
2 parents 54574bc + f422278 commit 85f795b

File tree

178 files changed

+4703
-1653
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

178 files changed

+4703
-1653
lines changed

CHANGELOG.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,14 @@
11
# Docs changelog
22

3+
**13 April 2026**
4+
5+
To coincide with the release of the ability to [steer your Copilot CLI sessions remotely](https://github.blog/changelog/2026-04-13-remote-control-cli-sessions-on-web-and-mobile-in-public-preview/) (from GitHub.com, or from GitHub Mobile), we have added these new articles:
6+
7+
* _Conceptual information:_ [About remote access to GitHub Copilot CLI sessions](https://docs.github.com/copilot/concepts/agents/copilot-cli/about-remote-access)
8+
* _How-to information:_ [Steering a GitHub Copilot CLI session from another device](https://docs.github.com/copilot/how-tos/copilot-cli/steer-remotely)
9+
10+
<hr>
11+
312
**9 April 2026**
413

514
We've added a conceptual article to the Copilot CLI documentation explaining the context window, compaction, and checkpoints.
29.4 KB
Loading

content/actions/reference/workflows-and-actions/events-that-trigger-workflows.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -515,7 +515,16 @@ on:
515515

516516
Runs your workflow when activity on a pull request in the workflow's repository occurs. For example, if no activity types are specified, the workflow runs when a pull request is opened or reopened or when the head branch of the pull request is updated. For activity related to pull request reviews, pull request review comments, or pull request comments, use the [`pull_request_review`](#pull_request_review), [`pull_request_review_comment`](#pull_request_review_comment), or [`issue_comment`](#issue_comment) events instead. For information about the pull request APIs, see [AUTOTITLE](/graphql/reference/objects#pullrequest) in the GraphQL API documentation or [AUTOTITLE](/rest/pulls).
517517

518-
Note that `GITHUB_SHA` for this event is the last merge commit of the pull request merge branch. If you want to get the commit ID for the last commit to the head branch of the pull request, use `github.event.pull_request.head.sha` instead.
518+
Note that `GITHUB_SHA` for this event is the last merge commit of the pull request merge branch. If you want to get the commit ID for the last commit to the head branch of the pull request, use `github.event.pull_request.head.sha` instead. For more information about merge branches, see [AUTOTITLE](/pull-requests/collaborating-with-pull-requests/proposing-changes-to-your-work-with-pull-requests/about-pull-requests#pull-request-refs-and-merge-branches).
519+
520+
### How the merge branch affects your workflow
521+
522+
For open, mergeable pull requests, workflows triggered by the `pull_request` event set `GITHUB_REF` to the merge branch. Because `actions/checkout` uses `GITHUB_REF` by default, it checks out the merge branch. Your CI tests run against the merged result, not just the head branch alone:
523+
524+
* `GITHUB_REF` is set to `refs/pull/PULL_REQUEST_NUMBER/merge`
525+
* `GITHUB_SHA` is the SHA of the merge commit on the merge branch
526+
527+
To test only the head branch commits without simulating a merge, check out the head branch using `github.event.pull_request.head.sha` in your workflow.
519528

520529
For example, you can run a workflow when a pull request has been opened or reopened.
521530

content/admin/overview/setting-up-a-trial-of-github-enterprise-cloud.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,6 @@ Your trial **won't** include access to {% data variables.product.prodname_ghe_se
4444
* {% data variables.product.prodname_github_codespaces %}
4545
* {% data variables.copilot.copilot_enterprise %}
4646
* {% data variables.copilot.copilot_for_business %}
47-
* Contact {% data variables.contact.github_support %} to enable {% data variables.copilot.copilot_for_business %} during your trial.
4847
* {% data variables.product.prodname_sponsors %}
4948
* Paid {% data variables.product.prodname_marketplace %} apps
5049
* {% data variables.product.prodname_github_connect %}

content/authentication/managing-commit-signature-verification/signing-tags.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ category:
1515
---
1616
{% data reusables.gpg.desktop-support-for-commit-signing %}
1717

18+
> [!TIP]
19+
> To configure your Git client to sign tags by default for a local repository, in Git versions 2.23.0 and above, run `git config tag.gpgsign true`. To sign all tags by default in any local repository on your computer, run `git config --global tag.gpgsign true`.
20+
1821
1. To sign a tag, add `-s` to your `git tag` command.
1922

2023
```shell

content/billing/reference/supported-payment-methods.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,9 @@ category:
1313

1414
## Metered or usage-based billing options
1515

16+
> [!NOTE]
17+
> Prepaid credit/debit cards are not accepted as a valid form of payment.
18+
1619
The supported payment methods for metered billing:
1720

1821
* Invoice – Managed accounts only

content/code-security/concepts/code-scanning/about-code-scanning-alerts.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,8 @@ If you configure {% data variables.product.prodname_code_scanning %} using {% da
6868

6969
When {% data variables.product.prodname_code_scanning %} reports data-flow alerts, {% data variables.product.prodname_dotcom %} shows you how data moves through the code. {% data variables.product.prodname_code_scanning_caps %} allows you to identify the areas of your code that leak sensitive information, and that could be the entry point for attacks by malicious users.
7070

71+
{% data reusables.code-scanning.track-alert-in-issue %}
72+
7173
### About alerts from multiple configurations
7274

7375
You can run multiple configurations of code analysis on a repository, using different tools and targeting different languages or areas of the code. Each configuration of {% data variables.product.prodname_code_scanning %} generates a unique set of alerts. For example, an alert generated using the default {% data variables.product.prodname_codeql %} analysis with {% data variables.product.prodname_actions %} comes from a different configuration than an alert generated externally and uploaded via the {% data variables.product.prodname_code_scanning %} API.
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
title: Code scanning alert tracking using issues
3+
shortTitle: Alert tracking with issues
4+
intro: Connect security findings to your team's workflow by linking {% data variables.product.prodname_code_scanning %} alerts to issues for tracking and collaboration.
5+
permissions: People with write access for the repository can link {% data variables.product.prodname_code_scanning %} alerts to issues.
6+
versions:
7+
feature: code-scanning-link-alert-to-issue
8+
contentType: concepts
9+
category:
10+
- Find and fix code vulnerabilities
11+
---
12+
13+
{% data reusables.code-scanning.alert-tracking-with-issues-preview-note %}
14+
15+
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
16+
17+
## How alert-to-issue linking works
18+
19+
When {% data variables.product.prodname_code_scanning %} identifies a vulnerability in your code, you can link the alert to a {% data variables.product.prodname_dotcom %} **issue** to track remediation work. This brings security fixes into your existing planning and project management workflow, making vulnerabilities visible in sprint planning, project boards, and team backlogs.
20+
21+
Each alert can link to a single issue, while each issue can track up to 50 different alerts. This flexibility lets you group related vulnerabilities or track them individually, depending on your team's workflow.
22+
23+
You can link alerts to issues in any repository where you have access and {% data variables.product.prodname_github_issues %} is enabled, not just the repository where the alert was found. This is useful when you track work in a central repository or use a separate issue tracker for security fixes.
24+
25+
## Understanding synchronization behavior
26+
27+
**Alert and issue statuses are not automatically synchronized.** Changes you make to an alert do not update the linked issue, and vice versa. This means:
28+
29+
* When you fix the vulnerability and the alert automatically closes, the linked issue remains open until you manually close it.
30+
* When you close or reopen an issue, the alert status stays unchanged.
31+
* When you delete an issue, the link is removed from the alert page and alert list, but the alert itself remains open.
32+
33+
## Best practices for managing linked alerts and issues
34+
35+
**Track remediation progress clearly.** When you commit a fix, add a comment to the linked issue noting that the code is updated. After the next {% data variables.product.prodname_code_scanning %} run confirms the alert is closed, manually close the issue.
36+
37+
**Use labels to show status.** Create issue labels like "code-fixed-awaiting-scan" or use project fields to indicate when a vulnerability is fixed but the issue is waiting for final verification and closure.
38+
39+
**Assign responsibility.** Use issue assignees to make it clear who owns the remediation work, especially when security and development teams need to coordinate.

content/code-security/concepts/code-scanning/copilot-autofix-for-code-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ category:
1515

1616
## How {% data variables.copilot.copilot_autofix_short %} works
1717

18-
{% data variables.copilot.copilot_autofix_short %} translates the description and location of an alert into code changes that may fix the alert. It interfaces with the large language model {% data variables.copilot.copilot_gpt_51 %} from OpenAI, which has sufficient generative capabilities to produce both suggested fixes in code and explanatory text for those fixes.
18+
{% data variables.copilot.copilot_autofix_short %} translates the description and location of an alert into code changes that may fix the alert. It interfaces with the large language model {% data variables.copilot.copilot_gpt_53_codex %} from OpenAI, which has sufficient generative capabilities to produce both suggested fixes in code and explanatory text for those fixes.
1919

2020
## Enabling and managing {% data variables.copilot.copilot_autofix_short %}
2121

content/code-security/concepts/code-scanning/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ children:
1717
- /setup-types
1818
- /about-integration-with-code-scanning
1919
- /sarif-files
20+
- /code-scanning-alert-tracking-using-issues
2021
- /merge-protection
2122
- /multi-repository-variant-analysis
2223
- /codeql

0 commit comments

Comments
 (0)