Merge pull request #35207 from github/repo-sync

Repo sync
This commit is contained in:
docs-bot 2024-11-06 10:34:18 -05:00 коммит произвёл GitHub
Родитель e4c60ceea6 e926eb7a85
Коммит d6a639c68d
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
26 изменённых файлов: 46 добавлений и 32 удалений

Просмотреть файл

@ -46,7 +46,7 @@ If you hold a trademark for the username, you can find more information about ma
If you do not hold a trademark for the name, you can choose another username or keep your current username. {% data variables.contact.github_support %} cannot release the unavailable username for you. For more information, see "[Changing your username](#changing-your-username)."{% endif %}
After changing your username, your old username becomes available for anyone else to claim. Most references to your repositories under the old username automatically change to the new username. However, some links to your profile won't automatically redirect.
After changing your username, your previous username will be unavailable for anyone to claim for 90 days. Most references to your repositories under the previous username automatically change to the new username. However, some links to your profile won't automatically redirect.
{% data variables.product.product_name %} cannot set up redirects for:
* [@mentions](/get-started/writing-on-github/getting-started-with-writing-and-formatting-on-github/basic-writing-and-formatting-syntax#mentioning-people-and-teams) using your old username

Просмотреть файл

@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection
shortTitle: Enable generic secret detection
intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.'
allowTitleToDifferFromFilename: true
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
product: '{% data reusables.gated-features.secret-scanning %}'
type: how_to
topics:
- Secret scanning

Просмотреть файл

@ -2,7 +2,7 @@
title: Generating regular expressions for custom patterns with AI
shortTitle: Use the regular expression generator
intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
feature: secret-scanning-custom-pattern-ai-generated
type: how_to

Просмотреть файл

@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning
shortTitle: Copilot secret scanning
allowTitleToDifferFromFilename: true
intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
ghec: '*'
topics:

Просмотреть файл

@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning
shortTitle: Generic secret detection
intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.'
allowTitleToDifferFromFilename: true
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
versions:
feature: secret-scanning-ai-generic-secret-detection
fpt: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Responsible use of AI to define regular expressions
shortTitle: Generate regular expressions with AI
intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.copilot-secret-scanning %}'
allowTitleToDifferFromFilename: true
versions:
feature: secret-scanning-custom-pattern-ai-generated

Просмотреть файл

@ -2,7 +2,8 @@
title: Defining custom patterns for secret scanning
shortTitle: Define custom patterns
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
redirect_from:
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning

Просмотреть файл

@ -3,7 +3,7 @@ title: Custom patterns
shortTitle: Custom patterns
allowTitleToDifferFromFilename: true
intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
versions:
ghes: '*'
ghec: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Managing custom patterns
shortTitle: Manage custom patterns
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
ghes: '*'
ghec: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Metrics for custom patterns
shortTitle: Custom pattern metrics
intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
versions:
feature: secret-scanning-custom-patterns-metrics
type: how_to

Просмотреть файл

@ -2,7 +2,8 @@
title: Enabling secret scanning for non-provider patterns
allowTitleToDifferFromFilename: true
intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.'
product: '{% data reusables.gated-features.push-protection-for-repos %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
type: how_to

Просмотреть файл

@ -3,7 +3,7 @@ title: Non-provider patterns
shortTitle: Non-provider patterns
allowTitleToDifferFromFilename: true
intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.'
product: '{% data reusables.gated-features.secret-scanning %}'
product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}'
versions:
feature: secret-scanning-non-provider-patterns
topics:

Просмотреть файл

@ -2,7 +2,7 @@
title: Working with push protection from the command line
shortTitle: Push protection on the command line
intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Working with push protection from the REST API
shortTitle: Push protection from the REST API
intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.'
product: '{% data reusables.gated-features.secret-scanning %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
feature: secret-scanning-push-protection-content-endpoints
type: how_to

Просмотреть файл

@ -2,7 +2,7 @@
title: Working with push protection in the GitHub UI
shortTitle: Push protection in the GitHub UI
intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.'
permissions: '{% data reusables.permissions.push-protection %}'
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
versions:
fpt: '*'
ghes: '*'

Просмотреть файл

@ -2,7 +2,7 @@
title: Configuring automatic dependency submission for your repository
shortTitle: Automatic dependency submission
intro: 'You can use automatic dependency submission to submit transitive dependency data in your repository. This enables you to analyze these transitive dependencies using the dependency graph.'
permissions: 'People with admin permissions to a repository, or the security manager role for the repository, can configure automatic dependency submission for that repository.'
permissions: '{% data reusables.permissions.security-repo-enable %}'
redirect_from:
- /early-access/ghas/automatic-dependency-submission-for-maven
versions:

Просмотреть файл

@ -2,6 +2,7 @@
title: Configuring dependency review
intro: You can use dependency review to catch vulnerabilities before they are added to your project.
shortTitle: Configure dependency review
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
fpt: '*'
ghes: '*'

Просмотреть файл

@ -1,7 +1,7 @@
---
title: Customizing your dependency review action configuration
intro: 'Learn how to add a basic customization to your dependency review configuration.'
product: '{% data reusables.gated-features.dependency-review-action %}'
permissions: '{% data reusables.permissions.security-repo-enable %}'
versions:
fpt: '*'
ghes: '*'

Просмотреть файл

@ -1,9 +1,8 @@
---
title: Enforcing dependency review across an organization
intro: 'Dependency review lets you catch insecure dependencies before you introduce them to your environment. You can enforce the use of the {% data variables.dependency-review.action_name %} across your organization.'
product: '{% data reusables.gated-features.dependency-review %}'
shortTitle: Enforce dependency review
permissions: 'Organization owners can enforce use of the {% data variables.dependency-review.action_name %} in repositories within their organization.'
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: repo-rules
type: overview

Просмотреть файл

@ -0,0 +1,3 @@
{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories:
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

Просмотреть файл

@ -1,10 +1,10 @@
{%- ifversion fpt %}
The {% data variables.dependency-review.action_name %} is available for public repositories. The {% data variables.dependency-review.action_name %} is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
{% ifversion fpt or ghec %}
The {% data variables.dependency-review.action_name %} is available for the following repository types:
{%- elsif ghec %}
The {% data variables.dependency-review.action_name %} is available for public repositories. To configure the {% data variables.dependency-review.action_name %} in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
{%- elsif ghes %}
The {% data variables.dependency-review.action_name %} is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
{% elsif ghes %}
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
{% endif %}

Просмотреть файл

@ -1,10 +1,10 @@
{%- ifversion fpt %}
Dependency review is enabled on public repositories. Dependency review is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}.
{% ifversion fpt or ghec %}
Dependency review is available for the following repository types:
{%- elsif ghec %}
Dependency review is included in {% data variables.product.product_name %} for public repositories. To use dependency review in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}.
* Public repositories on {% data variables.product.prodname_dotcom_the_website %}
* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
{%- elsif ghes %}
Dependency review is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}.
{% elsif ghes %}
Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
{%- endif %} {% data reusables.advanced-security.more-info-ghas %}
{% endif %}

Просмотреть файл

@ -0,0 +1,3 @@
Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories:
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

Просмотреть файл

@ -0,0 +1,3 @@
Scanning for non-provider patterns is available for the following repositories:
* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled

Просмотреть файл

@ -0,0 +1 @@
Users with **write** access

Просмотреть файл

@ -0,0 +1 @@
Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role