Skip to content

Commit

Permalink
Merge pull request #35207 from github/repo-sync
Browse files Browse the repository at this point in the history
Repo sync
  • Loading branch information
docs-bot authored Nov 6, 2024
2 parents e4c60ce + e926eb7 commit d6a639c
Show file tree
Hide file tree
Showing 26 changed files with 46 additions and 32 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ If you hold a trademark for the username, you can find more information about ma

If you do not hold a trademark for the name, you can choose another username or keep your current username. {% data variables.contact.github_support %} cannot release the unavailable username for you. For more information, see "[Changing your username](#changing-your-username)."{% endif %}

After changing your username, your old username becomes available for anyone else to claim. Most references to your repositories under the old username automatically change to the new username. However, some links to your profile won't automatically redirect.
After changing your username, your previous username will be unavailable for anyone to claim for 90 days. Most references to your repositories under the previous username automatically change to the new username. However, some links to your profile won't automatically redirect.

{% data variables.product.product_name %} cannot set up redirects for:
* [@mentions](/get-started/writing-on-github/getting-started-with-writing-and-formatting-on-github/basic-writing-and-formatting-syntax#mentioning-people-and-teams) using your old username
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection
shortTitle: Enable generic secret detection
intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.'
allowTitleToDifferFromFilename: true
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
product: '{% data reusables.gated-features.secret-scanning %}'
type: how_to
topics:
- Secret scanning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Generating regular expressions for custom patterns with AI
shortTitle: Use the regular expression generator
intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-custom-pattern-ai-generated
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning
shortTitle: Copilot secret scanning
allowTitleToDifferFromFilename: true
intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
ghec: '*'
topics:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning
shortTitle: Generic secret detection
intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.'
allowTitleToDifferFromFilename: true
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
fpt: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Responsible use of AI to define regular expressions
shortTitle: Generate regular expressions with AI
intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
allowTitleToDifferFromFilename: true
versions:
feature: secret-scanning-custom-pattern-ai-generated
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
title: Defining custom patterns for secret scanning
shortTitle: Define custom patterns
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
redirect_from:
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Custom patterns
shortTitle: Custom patterns
allowTitleToDifferFromFilename: true
intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
versions:
ghes: '*'
ghec: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Managing custom patterns
shortTitle: Manage custom patterns
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
ghes: '*'
ghec: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Metrics for custom patterns
shortTitle: Custom pattern metrics
intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
feature: secret-scanning-custom-patterns-metrics
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,8 @@
title: Enabling secret scanning for non-provider patterns
allowTitleToDifferFromFilename: true
intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.'
product: '{% data reusables.gated-features.push-protection-for-repos %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: Non-provider patterns
shortTitle: Non-provider patterns
allowTitleToDifferFromFilename: true
intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
topics:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Working with push protection from the command line
shortTitle: Push protection on the command line
intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Working with push protection from the REST API
shortTitle: Push protection from the REST API
intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
feature: secret-scanning-push-protection-content-endpoints
type: how_to
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Working with push protection in the GitHub UI
shortTitle: Push protection in the GitHub UI
intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
title: Configuring automatic dependency submission for your repository
shortTitle: Automatic dependency submission
intro: 'You can use automatic dependency submission to submit transitive dependency data in your repository. This enables you to analyze these transitive dependencies using the dependency graph.'
permissions: 'People with admin permissions to a repository, or the security manager role for the repository, can configure automatic dependency submission for that repository.'
permissions: '{% data reusables.permissions.security-repo-enable %}'
redirect_from:
- /early-access/ghas/automatic-dependency-submission-for-maven
versions:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
title: Configuring dependency review
intro: You can use dependency review to catch vulnerabilities before they are added to your project.
shortTitle: Configure dependency review
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
title: Customizing your dependency review action configuration
intro: 'Learn how to add a basic customization to your dependency review configuration.'
product: '{% data reusables.gated-features.dependency-review-action %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
fpt: '*'
ghes: '*'
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,8 @@
---
title: Enforcing dependency review across an organization
intro: 'Dependency review lets you catch insecure dependencies before you introduce them to your environment. You can enforce the use of the {% data variables.dependency-review.action_name %} across your organization.'
product: '{% data reusables.gated-features.dependency-review %}'
shortTitle: Enforce dependency review
permissions: 'Organization owners can enforce use of the {% data variables.dependency-review.action_name %} in repositories within their organization.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: repo-rules
type: overview
Expand Down
3 changes: 3 additions & 0 deletions data/reusables/gated-features/copilot-secret-scanning.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories:

* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
14 changes: 7 additions & 7 deletions data/reusables/gated-features/dependency-review-action.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
{%- ifversion fpt %}
The {% data variables.dependency-review.action_name %} is available for public repositories. The {% data variables.dependency-review.action_name %} is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
{% ifversion fpt or ghec %}
The {% data variables.dependency-review.action_name %} is available for the following repository types:

{%- elsif ghec %}
The {% data variables.dependency-review.action_name %} is available for public repositories. To configure the {% data variables.dependency-review.action_name %} in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- elsif ghes %}
The {% data variables.dependency-review.action_name %} is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
{% elsif ghes %}
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
{% endif %}
14 changes: 7 additions & 7 deletions data/reusables/gated-features/dependency-review.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,10 @@
{%- ifversion fpt %}
Dependency review is enabled on public repositories. Dependency review is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
{% ifversion fpt or ghec %}
Dependency review is available for the following repository types:

{%- elsif ghec %}
Dependency review is included in {% data variables.product.product_name %} for public repositories. To use dependency review in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- elsif ghes %}
Dependency review is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
{% elsif ghes %}
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
{% endif %}
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories:

* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
Scanning for non-provider patterns is available for the following repositories:

* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Users with **write** access
1 change: 1 addition & 0 deletions data/reusables/permissions/security-enterprise-enable.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role

0 comments on commit d6a639c

Please sign in to comment.