Skip to content

Commit d0f3e08

Browse files
authored
Merge pull request #32079 from github/repo-sync
Repo sync
2 parents 4509e3e + d9b961a commit d0f3e08

File tree

3 files changed

+4
-72
lines changed

3 files changed

+4
-72
lines changed

content/packages/learn-github-packages/configuring-a-packages-access-control-and-visibility.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ If you publish a package in a registry that only supports repository-scoped perm
4848

4949
## Configuring access to packages for your personal account
5050

51-
If you have admin permissions to a package that's scoped to a personal account, you can assign read, write, or admin roles to other users. For more information about these permission roles, see "[Visibility and access permissions for packages](#visibility-and-access-permissions-for-packages)."
51+
If you have admin permissions to a package that's scoped to a personal account, you can assign read, write, or admin roles to other users. For more information about these permission roles, see "[About inheritance of access permissions](#about-inheritance-of-access-permissions)."
5252

5353
If your package is private or internal and scoped to an organization, then you can only give access to other organization members or teams.
5454

@@ -60,7 +60,7 @@ The selected users will automatically be given access and don't need to accept a
6060

6161
## Configuring access to packages for an organization
6262

63-
If you have admin permissions to a package that is scoped to an organization, you can assign read, write, or admin roles to other users and teams. For more information about these permission roles, see "[Visibility and access permissions for packages](#visibility-and-access-permissions-for-packages)."
63+
If you have admin permissions to a package that is scoped to an organization, you can assign read, write, or admin roles to other users and teams. For more information about these permission roles, see "[About inheritance of access permissions](#about-inheritance-of-access-permissions)."
6464

6565
If your package is private or internal and scoped to an organization, then you can only give access to other organization members or teams.
6666

@@ -134,7 +134,7 @@ For packages scoped to a personal account or an organization, to ensure that a {
134134
The specified repository does not need to be the repository where the source code for the package is kept. You can give multiple repositories workflow access to a package.
135135

136136
{% ifversion packages-inherit-permissions %}
137-
If you publish a package that is linked to a repository, {% data variables.product.prodname_actions %} workflows in the linked repository automatically get access to the package, unless your organization has disabled the automatic inheritance of access permissions. For more information, see "[About inheritance of access permissions and visibility](#about-inheritance-of-access-permissions-and-visibility)" above.
137+
If you publish a package that is linked to a repository, {% data variables.product.prodname_actions %} workflows in the linked repository automatically get access to the package, unless your organization has disabled the automatic inheritance of access permissions. For more information, see "[About inheritance of access permissions](#about-inheritance-of-access-permissions)" above.
138138
{% endif %}
139139

140140
{% note %}

content/rest/activity/feeds.md

Lines changed: 0 additions & 68 deletions
Original file line numberDiff line numberDiff line change
@@ -14,72 +14,4 @@ topics:
1414
autogenerated: rest
1515
---
1616

17-
## About {% data variables.product.prodname_dotcom %} feeds
18-
19-
The [Get feeds](#get-feeds) endpoint lists all the feeds available to the authenticated user. You can then get a feed by sending a request to one of the feed URLs.
20-
21-
By default, timeline resources are returned in JSON. You can specify the `application/atom+xml` type in the `Accept` header to return timeline resources in Atom format.
22-
23-
### Example request
24-
25-
To get the feed for GitHub security advisories in Atom format:
26-
27-
curl -H "Accept: application/atom+xml" https://github.com/security-advisories
28-
29-
#### Example response
30-
31-
```shell
32-
HTTP/2 200
33-
```
34-
35-
```xml
36-
<?xml version="1.0" encoding="UTF-8"?>
37-
<feed xmlns="http://www.w3.org/2005/Atom"
38-
xmlns:media="http://search.yahoo.com/mrss/"
39-
xml:lang="en-US">
40-
<id>tag:github.com,2008:/security-advisories</id>
41-
<link rel="self" type="application/atom+xml"
42-
href="https://github.com/security-advisories.atom"/>
43-
<title>GitHub Security Advisory Feed</title>
44-
<author>
45-
<name>GitHub</name>
46-
</author>
47-
<updated>2019-01-14T19:34:52Z</updated>
48-
<entry>
49-
<id>tag:github.com,2008:GHSA-abcd-12ab-23cd</id>
50-
<published>2018-07-26T15:14:52Z</published>
51-
<updated>2019-01-14T19:34:52Z</updated>
52-
<title type="html">[GHSA-abcd-12ab-23cd] Moderate
53-
severity vulnerability that affects Octoapp</title>
54-
<category term="NPM"/>
55-
<content type="html">
56-
&lt;p&gt;Octoapp node module before 4.17.5 suffers
57-
from a Modification of Assumed-Immutable Data (MAID)
58-
vulnerability via defaultsDeep, merge, and mergeWith
59-
functions, which allows a malicious user to modify
60-
the prototype of &quot;Object&quot; via
61-
&lt;strong&gt;proto&lt;/strong&gt;, causing the
62-
addition or modification of an existing property
63-
that will exist on all objects.&lt;/p&gt;
64-
&lt;p&gt;&lt;strong&gt;Affected Packages&lt;/strong&gt;&lt;/p&gt;
65-
66-
&lt;dl&gt;
67-
&lt;dt&gt;Octoapp&lt;/dt&gt;
68-
&lt;dd&gt;Ecosystem: npm&lt;/dd&gt;
69-
&lt;dd&gt;Severity: moderate&lt;/dd&gt;
70-
&lt;dd&gt;Versions: &amp;lt; 4.17.5&lt;/dd&gt;
71-
&lt;dd&gt;Fixed in: 4.17.5&lt;/dd&gt;
72-
&lt;/dl&gt;
73-
74-
&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;/p&gt;
75-
76-
&lt;ul&gt;
77-
&lt;li&gt;https://nvd.nist.gov/vuln/detail/CVE-2018-123&lt;/li&gt;
78-
&lt;/ul&gt;
79-
80-
</content>
81-
</entry>
82-
</feed>
83-
```
84-
8517
<!-- Content after this section is automatically generated -->

data/reusables/package_registry/auto-inherit-permissions-note.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
{% note %}
44

5-
**Note:** If you publish a package that is linked to a repository, the package automatically inherits the access permissions of the linked repository, and {% data variables.product.prodname_actions %} workflows in the linked repository automatically get access to the package, unless your organization has disabled automatic inheritance of access permissions. For more information, see "[AUTOTITLE](/packages/learn-github-packages/configuring-a-packages-access-control-and-visibility#about-inheritance-of-access-permissions-and-visibility)."
5+
**Note:** If you publish a package that is linked to a repository, the package automatically inherits the access permissions of the linked repository, and {% data variables.product.prodname_actions %} workflows in the linked repository automatically get access to the package, unless your organization has disabled automatic inheritance of access permissions. For more information, see "[AUTOTITLE](/packages/learn-github-packages/configuring-a-packages-access-control-and-visibility#about-inheritance-of-access-permissions)."
66

77
{% endnote %}
88

0 commit comments

Comments
 (0)