Skip to content

Commit 1539988

Browse files
authored
Merge pull request #37050 from github/repo-sync
Repo sync
2 parents d812d5d + c269080 commit 1539988

File tree

1 file changed

+4
-13
lines changed
  • data/release-notes/enterprise-server/3-16

1 file changed

+4
-13
lines changed

data/release-notes/enterprise-server/3-16/0.yml

+4-13
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,6 @@ sections:
2828
- |
2929
`ghe-config-apply` applies configuration changes conditionally to the relevant, targeted and specific migrations only. As a result, you can expect less downtime and fewer errors while running `ghe-config-apply`. You can still choose to run `ghe-config-apply` unconditionally using this command: `ghe-config-apply -f`.
3030
31-
- heading: Authentication
32-
notes:
33-
# https://github.com/github/releases/issues/2579
34-
- |
35-
Enterprise and organization administrators can set limits on token lifetimes for the {% data variables.product.pat_generic_title_case_plural %} (PATs) used against their resources. These policies mandate token rotation on a regular basis and reduce how long a compromised token is good for, while also providing a lever to reduce the use of less-secure PATs in your company. See [New PAT rotation policies preview and optional expiration for fine-grained PATs](https://github.blog/changelog/2024-10-18-new-pat-rotation-policies-preview-and-optional-expiration-for-fine-grained-pats/) on the GitHub blog.
36-
3731
- heading: Dependabot
3832
notes:
3933
# https://github.com/github/releases/issues/5434
@@ -76,13 +70,6 @@ sections:
7670
- |
7771
Enterprise administrators can authenticate with region-specific OIDC endpoints for improved compliance and performance.
7872
79-
80-
- heading: GitHub Apps
81-
notes:
82-
# https://github.com/github/releases/issues/4900
83-
- |
84-
GitHub App developers can improve security with a 25-key limit per app, encouraging safer key management practices. Apps exceeding the limit must delete excess keys before adding new ones. Additionally, scoped tokens can access more repositories. See [AUTOTITLE](/apps/creating-github-apps/authenticating-with-a-github-app/managing-private-keys-for-github-apps).
85-
8673
- heading: Repositories
8774
notes:
8875
# https://github.com/github/releases/issues/4530
@@ -269,3 +256,7 @@ sections:
269256
# https://github.com/github/releases/issues/4535
270257
- |
271258
As of October 15th, 2024, you will no longer be able to enable or disable GitHub security features for repositories from the organization-level security coverage view. This feature has been deprecated and replaced with code security configurations for managing these settings. See the [GitHub blog post](https://github.blog/changelog/2024-10-17-new-code-security-configurations-let-you-set-security-features-at-the-organization-level/).
259+
260+
errata:
261+
- |
262+
The release notes previously mentioned GitHub App private key limits, which did not ship in 3.16 and will ship in 3.17. Similarly, PAT rotation policies were mentioned but will ship instead in 3.17. [Updated: 2025-03-21]

0 commit comments

Comments
 (0)