Skip to content

Commit

Permalink
Merge branch 'main' into patch-3
Browse files Browse the repository at this point in the history
  • Loading branch information
nguyenalex836 authored Nov 6, 2024
2 parents e9d0e7f + 6af2e97 commit 6a13bec
Show file tree
Hide file tree
Showing 28 changed files with 48 additions and 34 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ If you hold a trademark for the username, you can find more information about ma

If you do not hold a trademark for the name, you can choose another username or keep your current username. {% data variables.contact.github_support %} cannot release the unavailable username for you. For more information, see "[Changing your username](#changing-your-username)."{% endif %}

After changing your username, your old username becomes available for anyone else to claim. Most references to your repositories under the old username automatically change to the new username. However, some links to your profile won't automatically redirect.
After changing your username, your previous username will be unavailable for anyone to claim for 90 days. Most references to your repositories under the previous username automatically change to the new username. However, some links to your profile won't automatically redirect.

{% data variables.product.product_name %} cannot set up redirects for:
* [@mentions](/get-started/writing-on-github/getting-started-with-writing-and-formatting-on-github/basic-writing-and-formatting-syntax#mentioning-people-and-teams) using your old username
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection
shortTitle: Enable generic secret detection
intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.'
allowTitleToDifferFromFilename: true
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
product: '{% data reusables.gated-features.secret-scanning %}'
type: how_to
topics:
- Secret scanning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Generating regular expressions for custom patterns with AI
shortTitle: Use the regular expression generator
intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-custom-pattern-ai-generated
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning
shortTitle: Copilot secret scanning
allowTitleToDifferFromFilename: true
intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
ghec: '*'
topics:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning
shortTitle: Generic secret detection
intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.'
allowTitleToDifferFromFilename: true
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
fpt: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Responsible use of AI to define regular expressions
shortTitle: Generate regular expressions with AI
intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
allowTitleToDifferFromFilename: true
versions:
feature: secret-scanning-custom-pattern-ai-generated
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
title: Defining custom patterns for secret scanning
shortTitle: Define custom patterns
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
redirect_from:
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Custom patterns
shortTitle: Custom patterns
allowTitleToDifferFromFilename: true
intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
versions:
ghes: '*'
ghec: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Managing custom patterns
shortTitle: Manage custom patterns
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
ghes: '*'
ghec: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Metrics for custom patterns
shortTitle: Custom pattern metrics
intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
feature: secret-scanning-custom-patterns-metrics
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
title: Enabling secret scanning for non-provider patterns
allowTitleToDifferFromFilename: true
intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.'
product: '{% data reusables.gated-features.push-protection-for-repos %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Non-provider patterns
shortTitle: Non-provider patterns
allowTitleToDifferFromFilename: true
intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
topics:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Working with push protection from the command line
shortTitle: Push protection on the command line
intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Working with push protection from the REST API
shortTitle: Push protection from the REST API
intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
feature: secret-scanning-push-protection-content-endpoints
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Working with push protection in the GitHub UI
shortTitle: Push protection in the GitHub UI
intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Configuring automatic dependency submission for your repository
shortTitle: Automatic dependency submission
intro: 'You can use automatic dependency submission to submit transitive dependency data in your repository. This enables you to analyze these transitive dependencies using the dependency graph.'
permissions: 'People with admin permissions to a repository, or the security manager role for the repository, can configure automatic dependency submission for that repository.'
permissions: '{% data reusables.permissions.security-repo-enable %}'
redirect_from:
- /early-access/ghas/automatic-dependency-submission-for-maven
versions:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
title: Configuring dependency review
intro: You can use dependency review to catch vulnerabilities before they are added to your project.
shortTitle: Configure dependency review
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Customizing your dependency review action configuration
intro: 'Learn how to add a basic customization to your dependency review configuration.'
product: '{% data reusables.gated-features.dependency-review-action %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,8 @@
---
title: Enforcing dependency review across an organization
intro: 'Dependency review lets you catch insecure dependencies before you introduce them to your environment. You can enforce the use of the {% data variables.dependency-review.action_name %} across your organization.'
product: '{% data reusables.gated-features.dependency-review %}'
shortTitle: Enforce dependency review
permissions: 'Organization owners can enforce use of the {% data variables.dependency-review.action_name %} in repositories within their organization.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: repo-rules
type: overview
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ You can enforce certain workflows or requirements before a collaborator can push

By default, each branch protection rule disables force pushes to the matching branches and prevents the matching branches from being deleted. You can optionally disable these restrictions and enable additional branch protection settings.

By default, the restrictions of a branch protection rule don't apply to people with admin permissions to the repository or custom roles with the "bypass branch protections" permission. You can optionally apply the restrictions to administrators and roles with the "bypass branch protections" permission, too. For more information, see "[AUTOTITLE](/enterprise-cloud@latest/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/managing-custom-repository-roles-for-an-organization)".
By default, the restrictions of a branch protection rule don't apply to people with admin permissions to the repository or custom roles with the "bypass branch protections" permission. You can optionally apply the restrictions to administrators and roles with the "bypass branch protections" permission, too. For more information, see "[AUTOTITLE](/enterprise-cloud@latest/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/managing-custom-repository-roles-for-an-organization)."

{% data reusables.repositories.branch-rules-example %} For more information about branch name patterns, see "[AUTOTITLE](/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/managing-a-branch-protection-rule)."

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ By default, in public repositories, any user can submit reviews that approve or

You can limit which users are able to submit reviews that approve or request changes to pull requests in your public repository. When you enable code review limits, anyone can comment on pull requests in your public repository, but only people with read access or higher can approve pull requests or request changes.

You can also enable code review limits for an organization. If you enable limits for an organization, you will override any limits for individual repositories owned by the organization. For more information, see "[AUTOTITLE](/organizations/managing-organization-settings/managing-pull-request-reviews-in-your-organization)"
You can also enable code review limits for an organization. If you enable limits for an organization, you will override any limits for individual repositories owned by the organization. For more information, see "[AUTOTITLE](/organizations/managing-organization-settings/managing-pull-request-reviews-in-your-organization)."

## Enabling code review limits

Expand Down
3 changes: 3 additions & 0 deletions data/reusables/gated-features/copilot-secret-scanning.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories:

* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
14 changes: 7 additions & 7 deletions data/reusables/gated-features/dependency-review-action.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
{%- ifversion fpt %}
The {% data variables.dependency-review.action_name %} is available for public repositories. The {% data variables.dependency-review.action_name %} is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
{% ifversion fpt or ghec %}
The {% data variables.dependency-review.action_name %} is available for the following repository types:

{%- elsif ghec %}
The {% data variables.dependency-review.action_name %} is available for public repositories. To configure the {% data variables.dependency-review.action_name %} in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- elsif ghes %}
The {% data variables.dependency-review.action_name %} is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
{% elsif ghes %}
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
{% endif %}
14 changes: 7 additions & 7 deletions data/reusables/gated-features/dependency-review.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
{%- ifversion fpt %}
Dependency review is enabled on public repositories. Dependency review is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
{% ifversion fpt or ghec %}
Dependency review is available for the following repository types:

{%- elsif ghec %}
Dependency review is included in {% data variables.product.product_name %} for public repositories. To use dependency review in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- elsif ghes %}
Dependency review is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
{% elsif ghes %}
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
{% endif %}
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories:

* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Scanning for non-provider patterns is available for the following repositories:

* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Users with **write** access
1 change: 1 addition & 0 deletions data/reusables/permissions/security-enterprise-enable.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role

0 comments on commit 6a13bec

Please sign in to comment.