зеркало из https://github.com/github/docs.git
Коммит
d6a639c68d
|
@ -46,7 +46,7 @@ If you hold a trademark for the username, you can find more information about ma
|
|||
|
||||
If you do not hold a trademark for the name, you can choose another username or keep your current username. {% data variables.contact.github_support %} cannot release the unavailable username for you. For more information, see "[Changing your username](#changing-your-username)."{% endif %}
|
||||
|
||||
After changing your username, your old username becomes available for anyone else to claim. Most references to your repositories under the old username automatically change to the new username. However, some links to your profile won't automatically redirect.
|
||||
After changing your username, your previous username will be unavailable for anyone to claim for 90 days. Most references to your repositories under the previous username automatically change to the new username. However, some links to your profile won't automatically redirect.
|
||||
|
||||
{% data variables.product.product_name %} cannot set up redirects for:
|
||||
* [@mentions](/get-started/writing-on-github/getting-started-with-writing-and-formatting-on-github/basic-writing-and-formatting-syntax#mentioning-people-and-teams) using your old username
|
||||
|
|
|
@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection
|
|||
shortTitle: Enable generic secret detection
|
||||
intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.'
|
||||
allowTitleToDifferFromFilename: true
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
versions:
|
||||
feature: secret-scanning-ai-generic-secret-detection
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
type: how_to
|
||||
topics:
|
||||
- Secret scanning
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Generating regular expressions for custom patterns with AI
|
||||
shortTitle: Use the regular expression generator
|
||||
intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
versions:
|
||||
feature: secret-scanning-custom-pattern-ai-generated
|
||||
type: how_to
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning
|
|||
shortTitle: Copilot secret scanning
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
|
||||
versions:
|
||||
ghec: '*'
|
||||
topics:
|
||||
|
|
|
@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning
|
|||
shortTitle: Generic secret detection
|
||||
intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.'
|
||||
allowTitleToDifferFromFilename: true
|
||||
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
|
||||
versions:
|
||||
feature: secret-scanning-ai-generic-secret-detection
|
||||
fpt: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Responsible use of AI to define regular expressions
|
||||
shortTitle: Generate regular expressions with AI
|
||||
intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
|
||||
allowTitleToDifferFromFilename: true
|
||||
versions:
|
||||
feature: secret-scanning-custom-pattern-ai-generated
|
||||
|
|
|
@ -2,7 +2,8 @@
|
|||
title: Defining custom patterns for secret scanning
|
||||
shortTitle: Define custom patterns
|
||||
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
|
||||
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
|
||||
redirect_from:
|
||||
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
|
||||
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Custom patterns
|
|||
shortTitle: Custom patterns
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
|
||||
versions:
|
||||
ghes: '*'
|
||||
ghec: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Managing custom patterns
|
||||
shortTitle: Manage custom patterns
|
||||
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
|
||||
versions:
|
||||
ghes: '*'
|
||||
ghec: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Metrics for custom patterns
|
||||
shortTitle: Custom pattern metrics
|
||||
intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
|
||||
versions:
|
||||
feature: secret-scanning-custom-patterns-metrics
|
||||
type: how_to
|
||||
|
|
|
@ -2,7 +2,8 @@
|
|||
title: Enabling secret scanning for non-provider patterns
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.'
|
||||
product: '{% data reusables.gated-features.push-protection-for-repos %}'
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
|
||||
versions:
|
||||
feature: secret-scanning-non-provider-patterns
|
||||
type: how_to
|
||||
|
|
|
@ -3,7 +3,7 @@ title: Non-provider patterns
|
|||
shortTitle: Non-provider patterns
|
||||
allowTitleToDifferFromFilename: true
|
||||
intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
|
||||
versions:
|
||||
feature: secret-scanning-non-provider-patterns
|
||||
topics:
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Working with push protection from the command line
|
||||
shortTitle: Push protection on the command line
|
||||
intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
|
||||
permissions: '{% data reusables.permissions.push-protection %}'
|
||||
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Working with push protection from the REST API
|
||||
shortTitle: Push protection from the REST API
|
||||
intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.'
|
||||
product: '{% data reusables.gated-features.secret-scanning %}'
|
||||
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
|
||||
versions:
|
||||
feature: secret-scanning-push-protection-content-endpoints
|
||||
type: how_to
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Working with push protection in the GitHub UI
|
||||
shortTitle: Push protection in the GitHub UI
|
||||
intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
|
||||
permissions: '{% data reusables.permissions.push-protection %}'
|
||||
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
title: Configuring automatic dependency submission for your repository
|
||||
shortTitle: Automatic dependency submission
|
||||
intro: 'You can use automatic dependency submission to submit transitive dependency data in your repository. This enables you to analyze these transitive dependencies using the dependency graph.'
|
||||
permissions: 'People with admin permissions to a repository, or the security manager role for the repository, can configure automatic dependency submission for that repository.'
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
redirect_from:
|
||||
- /early-access/ghas/automatic-dependency-submission-for-maven
|
||||
versions:
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
title: Configuring dependency review
|
||||
intro: You can use dependency review to catch vulnerabilities before they are added to your project.
|
||||
shortTitle: Configure dependency review
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
title: Customizing your dependency review action configuration
|
||||
intro: 'Learn how to add a basic customization to your dependency review configuration.'
|
||||
product: '{% data reusables.gated-features.dependency-review-action %}'
|
||||
permissions: '{% data reusables.permissions.security-repo-enable %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
|
|
|
@ -1,9 +1,8 @@
|
|||
---
|
||||
title: Enforcing dependency review across an organization
|
||||
intro: 'Dependency review lets you catch insecure dependencies before you introduce them to your environment. You can enforce the use of the {% data variables.dependency-review.action_name %} across your organization.'
|
||||
product: '{% data reusables.gated-features.dependency-review %}'
|
||||
shortTitle: Enforce dependency review
|
||||
permissions: 'Organization owners can enforce use of the {% data variables.dependency-review.action_name %} in repositories within their organization.'
|
||||
permissions: '{% data reusables.permissions.security-org-enable %}'
|
||||
versions:
|
||||
feature: repo-rules
|
||||
type: overview
|
||||
|
|
|
@ -0,0 +1,3 @@
|
|||
{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories:
|
||||
|
||||
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
|
@ -1,10 +1,10 @@
|
|||
{%- ifversion fpt %}
|
||||
The {% data variables.dependency-review.action_name %} is available for public repositories. The {% data variables.dependency-review.action_name %} is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
{% ifversion fpt or ghec %}
|
||||
The {% data variables.dependency-review.action_name %} is available for the following repository types:
|
||||
|
||||
{%- elsif ghec %}
|
||||
The {% data variables.dependency-review.action_name %} is available for public repositories. To configure the {% data variables.dependency-review.action_name %} in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
|
||||
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
||||
|
||||
{%- elsif ghes %}
|
||||
The {% data variables.dependency-review.action_name %} is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
{% elsif ghes %}
|
||||
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
||||
|
||||
{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
|
||||
{% endif %}
|
||||
|
|
|
@ -1,10 +1,10 @@
|
|||
{%- ifversion fpt %}
|
||||
Dependency review is enabled on public repositories. Dependency review is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
{% ifversion fpt or ghec %}
|
||||
Dependency review is available for the following repository types:
|
||||
|
||||
{%- elsif ghec %}
|
||||
Dependency review is included in {% data variables.product.product_name %} for public repositories. To use dependency review in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
|
||||
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
||||
|
||||
{%- elsif ghes %}
|
||||
Dependency review is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
{% elsif ghes %}
|
||||
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
||||
|
||||
{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
|
||||
{% endif %}
|
||||
|
|
|
@ -0,0 +1,3 @@
|
|||
Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories:
|
||||
|
||||
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
|
@ -0,0 +1,3 @@
|
|||
Scanning for non-provider patterns is available for the following repositories:
|
||||
|
||||
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
|
@ -0,0 +1 @@
|
|||
Users with **write** access
|
|
@ -0,0 +1 @@
|
|||
Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role
|
Загрузка…
Ссылка в новой задаче