зеркало из https://github.com/github/docs.git
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
This commit is contained in:
Родитель
7c850c9518
Коммит
757a320b1b
|
@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection
|
|||
shortTitle: Enable generic secret detection
|
||||
intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.'
|
||||
allowTitleToDifferFromFilename: true
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
versions:
|
||||
feature: secret-scanning-ai-generic-secret-detection
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
type: how_to
|
||||
topics:
|
||||
- Secret scanning
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Generating regular expressions for custom patterns with AI
|
||||
shortTitle: Use the regular expression generator
|
||||
intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
versions:
|
||||
feature: secret-scanning-custom-pattern-ai-generated
|
||||
type: how_to
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning
|
|||
shortTitle: Copilot secret scanning
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
|
||||
versions:
|
||||
ghec: '*'
|
||||
topics:
|
||||
|
|
|
@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning
|
|||
shortTitle: Generic secret detection
|
||||
intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.'
|
||||
allowTitleToDifferFromFilename: true
|
||||
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
|
||||
versions:
|
||||
feature: secret-scanning-ai-generic-secret-detection
|
||||
fpt: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Responsible use of AI to define regular expressions
|
||||
shortTitle: Generate regular expressions with AI
|
||||
intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
|
||||
allowTitleToDifferFromFilename: true
|
||||
versions:
|
||||
feature: secret-scanning-custom-pattern-ai-generated
|
||||
|
|
|
@ -2,7 +2,8 @@
|
|||
title: Defining custom patterns for secret scanning
|
||||
shortTitle: Define custom patterns
|
||||
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
|
||||
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
|
||||
redirect_from:
|
||||
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
|
||||
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Custom patterns
|
|||
shortTitle: Custom patterns
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
|
||||
versions:
|
||||
ghes: '*'
|
||||
ghec: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Managing custom patterns
|
||||
shortTitle: Manage custom patterns
|
||||
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
|
||||
versions:
|
||||
ghes: '*'
|
||||
ghec: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Metrics for custom patterns
|
||||
shortTitle: Custom pattern metrics
|
||||
intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
|
||||
versions:
|
||||
feature: secret-scanning-custom-patterns-metrics
|
||||
type: how_to
|
||||
|
|
|
@ -2,7 +2,8 @@
|
|||
title: Enabling secret scanning for non-provider patterns
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.'
|
||||
product: '{% data reusables.gated-features.push-protection-for-repos %}'
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
|
||||
versions:
|
||||
feature: secret-scanning-non-provider-patterns
|
||||
type: how_to
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Non-provider patterns
|
|||
shortTitle: Non-provider patterns
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
|
||||
versions:
|
||||
feature: secret-scanning-non-provider-patterns
|
||||
topics:
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Working with push protection from the command line
|
||||
shortTitle: Push protection on the command line
|
||||
intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
|
||||
permissions: '{% data reusables.permissions.push-protection %}'
|
||||
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Working with push protection from the REST API
|
||||
shortTitle: Push protection from the REST API
|
||||
intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
|
||||
versions:
|
||||
feature: secret-scanning-push-protection-content-endpoints
|
||||
type: how_to
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Working with push protection in the GitHub UI
|
||||
shortTitle: Push protection in the GitHub UI
|
||||
intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
|
||||
permissions: '{% data reusables.permissions.push-protection %}'
|
||||
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
|
|
|
@ -0,0 +1,3 @@
|
|||
{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories:
|
||||
|
||||
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
|
@ -0,0 +1,3 @@
|
|||
Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories:
|
||||
|
||||
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
|
@ -0,0 +1,3 @@
|
|||
Scanning for non-provider patterns is available for the following repositories:
|
||||
|
||||
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
|
@ -0,0 +1 @@
|
|||
Users with **write** access
|
|
@ -0,0 +1 @@
|
|||
Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role
|
Загрузка…
Ссылка в новой задаче