Scannability improvements to front matter for remaining secret scanning articles #16234 (#52691)

Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
This commit is contained in:
Anne-Marie 2024-11-06 13:10:39 +00:00 коммит произвёл GitHub
Родитель 7c850c9518
Коммит 757a320b1b
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
19 изменённых файлов: 27 добавлений и 13 удалений

Просмотреть файл

@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection
shortTitle: Enable generic secret detection
intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.'
allowTitleToDifferFromFilename: true
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
product: '{% data reusables.gated-features.secret-scanning %}'
type: how_to
topics:
- Secret scanning

Просмотреть файл

@ -2,7 +2,7 @@
title: Generating regular expressions for custom patterns with AI
shortTitle: Use the regular expression generator
intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-custom-pattern-ai-generated
type: how_to

Просмотреть файл

@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning
shortTitle: Copilot secret scanning
allowTitleToDifferFromFilename: true
intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
ghec: '*'
topics:

Просмотреть файл

@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning
shortTitle: Generic secret detection
intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.'
allowTitleToDifferFromFilename: true
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
fpt: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Responsible use of AI to define regular expressions
shortTitle: Generate regular expressions with AI
intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
allowTitleToDifferFromFilename: true
versions:
feature: secret-scanning-custom-pattern-ai-generated

Просмотреть файл

@ -2,7 +2,8 @@
title: Defining custom patterns for secret scanning
shortTitle: Define custom patterns
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
redirect_from:
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning

Просмотреть файл

@ -3,7 +3,7 @@ title: Custom patterns
shortTitle: Custom patterns
allowTitleToDifferFromFilename: true
intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
versions:
ghes: '*'
ghec: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Managing custom patterns
shortTitle: Manage custom patterns
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
ghes: '*'
ghec: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Metrics for custom patterns
shortTitle: Custom pattern metrics
intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
feature: secret-scanning-custom-patterns-metrics
type: how_to

Просмотреть файл

@ -2,7 +2,8 @@
title: Enabling secret scanning for non-provider patterns
allowTitleToDifferFromFilename: true
intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.'
product: '{% data reusables.gated-features.push-protection-for-repos %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
type: how_to

Просмотреть файл

@ -3,7 +3,7 @@ title: Non-provider patterns
shortTitle: Non-provider patterns
allowTitleToDifferFromFilename: true
intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
topics:

Просмотреть файл

@ -2,7 +2,7 @@
title: Working with push protection from the command line
shortTitle: Push protection on the command line
intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Working with push protection from the REST API
shortTitle: Push protection from the REST API
intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
feature: secret-scanning-push-protection-content-endpoints
type: how_to

Просмотреть файл

@ -2,7 +2,7 @@
title: Working with push protection in the GitHub UI
shortTitle: Push protection in the GitHub UI
intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'

Просмотреть файл

@ -0,0 +1,3 @@
{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories:
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

Просмотреть файл

@ -0,0 +1,3 @@
Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories:
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

Просмотреть файл

@ -0,0 +1,3 @@
Scanning for non-provider patterns is available for the following repositories:
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

Просмотреть файл

@ -0,0 +1 @@
Users with **write** access

Просмотреть файл

@ -0,0 +1 @@
Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role