From 757a320b1b6be5627b41ecfeac101b8090555030 Mon Sep 17 00:00:00 2001 From: Anne-Marie <102995847+am-stead@users.noreply.github.com> Date: Wed, 6 Nov 2024 13:10:39 +0000 Subject: [PATCH 1/5] Scannability improvements to front matter for remaining secret scanning articles #16234 (#52691) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- .../enabling-ai-powered-generic-secret-detection.md | 2 +- ...nerating-regular-expressions-for-custom-patterns-with-ai.md | 2 +- .../secret-scanning/copilot-secret-scanning/index.md | 2 +- .../copilot-secret-scanning/responsible-ai-generic-secrets.md | 1 + .../responsible-use-ai-regex-generator.md | 2 +- .../defining-custom-patterns-for-secret-scanning.md | 3 ++- .../custom-patterns/index.md | 2 +- .../custom-patterns/managing-custom-patterns.md | 2 +- .../custom-patterns/metrics-for-custom-patterns.md | 2 +- .../enabling-secret-scanning-for-non-provider-patterns.md | 3 ++- .../non-provider-patterns/index.md | 2 +- .../working-with-push-protection-from-the-command-line.md | 2 +- .../working-with-push-protection-from-the-rest-api.md | 2 +- .../working-with-push-protection-in-the-github-ui.md | 2 +- data/reusables/gated-features/copilot-secret-scanning.md | 3 +++ .../gated-features/secret-scanning-custom-patterns.md | 3 +++ .../gated-features/secret-scanning-non-provider-patterns.md | 3 +++ data/reusables/permissions/push-protection-resolve-block.md | 1 + data/reusables/permissions/security-enterprise-enable.md | 1 + 19 files changed, 27 insertions(+), 13 deletions(-) create mode 100644 data/reusables/gated-features/copilot-secret-scanning.md create mode 100644 data/reusables/gated-features/secret-scanning-custom-patterns.md create mode 100644 data/reusables/gated-features/secret-scanning-non-provider-patterns.md create mode 100644 data/reusables/permissions/push-protection-resolve-block.md create mode 100644 data/reusables/permissions/security-enterprise-enable.md diff --git a/content/code-security/secret-scanning/copilot-secret-scanning/enabling-ai-powered-generic-secret-detection.md b/content/code-security/secret-scanning/copilot-secret-scanning/enabling-ai-powered-generic-secret-detection.md index 5722404716c8..d9c5ced32677 100644 --- a/content/code-security/secret-scanning/copilot-secret-scanning/enabling-ai-powered-generic-secret-detection.md +++ b/content/code-security/secret-scanning/copilot-secret-scanning/enabling-ai-powered-generic-secret-detection.md @@ -3,9 +3,9 @@ title: Enabling Copilot secret scanning's generic secret detection shortTitle: Enable generic secret detection intro: 'You can enable {% data variables.secret-scanning.generic-secret-detection %} for your repository or organization. Alerts for generic secrets, such as passwords, are displayed in a separate list on the {% data variables.product.prodname_secret_scanning %} alerts page.' allowTitleToDifferFromFilename: true +permissions: '{% data reusables.permissions.security-repo-enable %}' versions: feature: secret-scanning-ai-generic-secret-detection -product: '{% data reusables.gated-features.secret-scanning %}' type: how_to topics: - Secret scanning diff --git a/content/code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai.md b/content/code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai.md index c4bdabd015fa..fa3f4072df90 100644 --- a/content/code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai.md +++ b/content/code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai.md @@ -2,7 +2,7 @@ title: Generating regular expressions for custom patterns with AI shortTitle: Use the regular expression generator intro: 'You can use the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to generate regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.' -product: '{% data reusables.gated-features.secret-scanning %}' +permissions: '{% data reusables.permissions.security-repo-enable %}' versions: feature: secret-scanning-custom-pattern-ai-generated type: how_to diff --git a/content/code-security/secret-scanning/copilot-secret-scanning/index.md b/content/code-security/secret-scanning/copilot-secret-scanning/index.md index 59f7fb74738d..0faba154b80c 100644 --- a/content/code-security/secret-scanning/copilot-secret-scanning/index.md +++ b/content/code-security/secret-scanning/copilot-secret-scanning/index.md @@ -3,7 +3,7 @@ title: Enhance your secret detection capabilities with Copilot secret scanning shortTitle: Copilot secret scanning allowTitleToDifferFromFilename: true intro: 'Learn how {% data variables.product.prodname_secret_scanning %} uses AI to detect generic secrets in your code, and generate regular expressions for your custom patterns.' -product: '{% data reusables.gated-features.secret-scanning %}' +product: '{% data reusables.gated-features.copilot-secret-scanning %}' versions: ghec: '*' topics: diff --git a/content/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets.md b/content/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets.md index a93b3f8d67f7..75c91875cf04 100644 --- a/content/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets.md +++ b/content/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets.md @@ -3,6 +3,7 @@ title: Responsible detection of generic secrets with Copilot secret scanning shortTitle: Generic secret detection intro: 'Learn how {% data variables.secret-scanning.copilot-secret-scanning %} uses AI responsibly to scan and create alerts for unstructured secrets, such as passwords.' allowTitleToDifferFromFilename: true +product: '{% data reusables.gated-features.copilot-secret-scanning %}' versions: feature: secret-scanning-ai-generic-secret-detection fpt: '*' diff --git a/content/code-security/secret-scanning/copilot-secret-scanning/responsible-use-ai-regex-generator.md b/content/code-security/secret-scanning/copilot-secret-scanning/responsible-use-ai-regex-generator.md index a314b18dc3e9..8a595b4045b7 100644 --- a/content/code-security/secret-scanning/copilot-secret-scanning/responsible-use-ai-regex-generator.md +++ b/content/code-security/secret-scanning/copilot-secret-scanning/responsible-use-ai-regex-generator.md @@ -2,7 +2,7 @@ title: Responsible use of AI to define regular expressions shortTitle: Generate regular expressions with AI intro: 'Learn about the capabilities and limitations of the {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} in helping you to define custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %}.' -product: '{% data reusables.gated-features.secret-scanning %}' +product: '{% data reusables.gated-features.copilot-secret-scanning %}' allowTitleToDifferFromFilename: true versions: feature: secret-scanning-custom-pattern-ai-generated diff --git a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md index 1b484cdd873c..885f816a1d71 100644 --- a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md +++ b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md @@ -2,7 +2,8 @@ title: Defining custom patterns for secret scanning shortTitle: Define custom patterns intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.' -product: '{% data reusables.gated-features.secret-scanning %}' +product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}' +permissions: '{% data reusables.permissions.security-enterprise-enable %}' redirect_from: - /code-security/secret-security/defining-custom-patterns-for-secret-scanning - /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning diff --git a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/index.md b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/index.md index d3dad9996c0c..57cfeccf87d7 100644 --- a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/index.md +++ b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/index.md @@ -3,7 +3,7 @@ title: Custom patterns shortTitle: Custom patterns allowTitleToDifferFromFilename: true intro: 'You can extend the capabilities of {% data variables.product.prodname_secret_scanning %} to search for your own patterns. These custom patterns can range from your service API keys to connection strings into cloud resources.' -product: '{% data reusables.gated-features.secret-scanning %}' +product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}' versions: ghes: '*' ghec: '*' diff --git a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md index 77329bd0c7b1..32478df5a87f 100644 --- a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md +++ b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md @@ -2,7 +2,7 @@ title: Managing custom patterns shortTitle: Manage custom patterns intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.' -product: '{% data reusables.gated-features.secret-scanning %}' +permissions: '{% data reusables.permissions.security-enterprise-enable %}' versions: ghes: '*' ghec: '*' diff --git a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/metrics-for-custom-patterns.md b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/metrics-for-custom-patterns.md index 41c5a0d2b53d..fc9789681517 100644 --- a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/metrics-for-custom-patterns.md +++ b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/metrics-for-custom-patterns.md @@ -2,7 +2,7 @@ title: Metrics for custom patterns shortTitle: Custom pattern metrics intro: 'You can view alert metrics for custom patterns at the repository, organization, and enterprise levels.' -product: '{% data reusables.gated-features.secret-scanning %}' +permissions: '{% data reusables.permissions.security-enterprise-enable %}' versions: feature: secret-scanning-custom-patterns-metrics type: how_to diff --git a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/enabling-secret-scanning-for-non-provider-patterns.md b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/enabling-secret-scanning-for-non-provider-patterns.md index 4c06b3369570..65c7abca4bdf 100644 --- a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/enabling-secret-scanning-for-non-provider-patterns.md +++ b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/enabling-secret-scanning-for-non-provider-patterns.md @@ -2,7 +2,8 @@ title: Enabling secret scanning for non-provider patterns allowTitleToDifferFromFilename: true intro: 'You can enable {% data variables.product.prodname_secret_scanning %} to detect additional potential secrets at the {% ifversion security-configurations %}repository and organization levels{% else %}repository level{% endif %}.' -product: '{% data reusables.gated-features.push-protection-for-repos %}' +permissions: '{% data reusables.permissions.security-repo-enable %}' +product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}' versions: feature: secret-scanning-non-provider-patterns type: how_to diff --git a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/index.md b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/index.md index 8ee2edb91607..1ae7d48df45a 100644 --- a/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/index.md +++ b/content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/non-provider-patterns/index.md @@ -3,7 +3,7 @@ title: Non-provider patterns shortTitle: Non-provider patterns allowTitleToDifferFromFilename: true intro: '{% data variables.product.prodname_secret_scanning_caps %} can also alert you to the potential use of other types of secret in code, for example: HTTP authentication headers, connection strings, and private keys. These non-provider patterns are more difficult to detect reliably so this feature is not enabled by default.' -product: '{% data reusables.gated-features.secret-scanning %}' +product: '{% data reusables.gated-features.secret-scanning-non-provider-patterns %}' versions: feature: secret-scanning-non-provider-patterns topics: diff --git a/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-command-line.md b/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-command-line.md index 925115f2d6f7..ca6a4ea4e8fa 100644 --- a/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-command-line.md +++ b/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-command-line.md @@ -2,7 +2,7 @@ title: Working with push protection from the command line shortTitle: Push protection on the command line intro: 'Learn your options for unblocking your push from the command line to {% data variables.product.prodname_dotcom %} if {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.' -permissions: '{% data reusables.permissions.push-protection %}' +permissions: '{% data reusables.permissions.push-protection-resolve-block %}' versions: fpt: '*' ghes: '*' diff --git a/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-rest-api.md b/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-rest-api.md index 6673e482d784..2a81b932b264 100644 --- a/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-rest-api.md +++ b/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-from-the-rest-api.md @@ -2,7 +2,7 @@ title: Working with push protection from the REST API shortTitle: Push protection from the REST API intro: 'Learn your options for unblocking your push to {% data variables.product.prodname_dotcom %} using the REST API if {% data variables.product.prodname_secret_scanning %} detects a secret in the content of your API request.' -product: '{% data reusables.gated-features.secret-scanning %}' +permissions: '{% data reusables.permissions.push-protection-resolve-block %}' versions: feature: secret-scanning-push-protection-content-endpoints type: how_to diff --git a/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-in-the-github-ui.md b/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-in-the-github-ui.md index 54ffea784c08..01e179793339 100644 --- a/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-in-the-github-ui.md +++ b/content/code-security/secret-scanning/working-with-secret-scanning-and-push-protection/working-with-push-protection-in-the-github-ui.md @@ -2,7 +2,7 @@ title: Working with push protection in the GitHub UI shortTitle: Push protection in the GitHub UI intro: 'Learn your options for unblocking your commit when {% data variables.product.prodname_secret_scanning %} detects a secret in your changes.' -permissions: '{% data reusables.permissions.push-protection %}' +permissions: '{% data reusables.permissions.push-protection-resolve-block %}' versions: fpt: '*' ghes: '*' diff --git a/data/reusables/gated-features/copilot-secret-scanning.md b/data/reusables/gated-features/copilot-secret-scanning.md new file mode 100644 index 000000000000..36d26952b804 --- /dev/null +++ b/data/reusables/gated-features/copilot-secret-scanning.md @@ -0,0 +1,3 @@ +{% data variables.secret-scanning.copilot-secret-scanning %} is available for the following repositories: + +* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled diff --git a/data/reusables/gated-features/secret-scanning-custom-patterns.md b/data/reusables/gated-features/secret-scanning-custom-patterns.md new file mode 100644 index 000000000000..5efb79071f5c --- /dev/null +++ b/data/reusables/gated-features/secret-scanning-custom-patterns.md @@ -0,0 +1,3 @@ +Custom patterns for {% data variables.product.prodname_secret_scanning %} is available for the following repositories: + +* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled diff --git a/data/reusables/gated-features/secret-scanning-non-provider-patterns.md b/data/reusables/gated-features/secret-scanning-non-provider-patterns.md new file mode 100644 index 000000000000..1c25ae8e090a --- /dev/null +++ b/data/reusables/gated-features/secret-scanning-non-provider-patterns.md @@ -0,0 +1,3 @@ +Scanning for non-provider patterns is available for the following repositories: + +* Public, private, and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled diff --git a/data/reusables/permissions/push-protection-resolve-block.md b/data/reusables/permissions/push-protection-resolve-block.md new file mode 100644 index 000000000000..01ff2356a439 --- /dev/null +++ b/data/reusables/permissions/push-protection-resolve-block.md @@ -0,0 +1 @@ +Users with **write** access diff --git a/data/reusables/permissions/security-enterprise-enable.md b/data/reusables/permissions/security-enterprise-enable.md new file mode 100644 index 000000000000..9335e5c41a2d --- /dev/null +++ b/data/reusables/permissions/security-enterprise-enable.md @@ -0,0 +1 @@ +Repository owners, organization owners, security managers, enterprise administrators, and users with the **admin** role From ece7c03642a9f271ab3528be7c031ea0b0e4fba6 Mon Sep 17 00:00:00 2001 From: Sarita Iyer <66540150+saritai@users.noreply.github.com> Date: Wed, 6 Nov 2024 09:22:53 -0500 Subject: [PATCH 2/5] Frontmatter updates for security generalist articles (#52956) Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- ...ic-dependency-submission-for-your-repository.md | 2 +- .../configuring-dependency-review.md | 1 + ...-your-dependency-review-action-configuration.md | 2 +- ...ing-dependency-review-across-an-organization.md | 3 +-- .../gated-features/dependency-review-action.md | 14 +++++++------- data/reusables/gated-features/dependency-review.md | 14 +++++++------- 6 files changed, 18 insertions(+), 18 deletions(-) diff --git a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-automatic-dependency-submission-for-your-repository.md b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-automatic-dependency-submission-for-your-repository.md index f322f46ab807..e9952383a43f 100644 --- a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-automatic-dependency-submission-for-your-repository.md +++ b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-automatic-dependency-submission-for-your-repository.md @@ -2,7 +2,7 @@ title: Configuring automatic dependency submission for your repository shortTitle: Automatic dependency submission intro: 'You can use automatic dependency submission to submit transitive dependency data in your repository. This enables you to analyze these transitive dependencies using the dependency graph.' -permissions: 'People with admin permissions to a repository, or the security manager role for the repository, can configure automatic dependency submission for that repository.' +permissions: '{% data reusables.permissions.security-repo-enable %}' redirect_from: - /early-access/ghas/automatic-dependency-submission-for-maven versions: diff --git a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review.md b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review.md index cc49d2b1e130..b643b80e863c 100644 --- a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review.md +++ b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/configuring-dependency-review.md @@ -2,6 +2,7 @@ title: Configuring dependency review intro: You can use dependency review to catch vulnerabilities before they are added to your project. shortTitle: Configure dependency review +permissions: '{% data reusables.permissions.security-repo-enable %}' versions: fpt: '*' ghes: '*' diff --git a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/customizing-your-dependency-review-action-configuration.md b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/customizing-your-dependency-review-action-configuration.md index 3b04d03e3c7a..774148d0c1a1 100644 --- a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/customizing-your-dependency-review-action-configuration.md +++ b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/customizing-your-dependency-review-action-configuration.md @@ -1,7 +1,7 @@ --- title: Customizing your dependency review action configuration intro: 'Learn how to add a basic customization to your dependency review configuration.' -product: '{% data reusables.gated-features.dependency-review-action %}' +permissions: '{% data reusables.permissions.security-repo-enable %}' versions: fpt: '*' ghes: '*' diff --git a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/enforcing-dependency-review-across-an-organization.md b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/enforcing-dependency-review-across-an-organization.md index 771fb769a269..364df8aa9d63 100644 --- a/content/code-security/supply-chain-security/understanding-your-software-supply-chain/enforcing-dependency-review-across-an-organization.md +++ b/content/code-security/supply-chain-security/understanding-your-software-supply-chain/enforcing-dependency-review-across-an-organization.md @@ -1,9 +1,8 @@ --- title: Enforcing dependency review across an organization intro: 'Dependency review lets you catch insecure dependencies before you introduce them to your environment. You can enforce the use of the {% data variables.dependency-review.action_name %} across your organization.' -product: '{% data reusables.gated-features.dependency-review %}' shortTitle: Enforce dependency review -permissions: 'Organization owners can enforce use of the {% data variables.dependency-review.action_name %} in repositories within their organization.' +permissions: '{% data reusables.permissions.security-org-enable %}' versions: feature: repo-rules type: overview diff --git a/data/reusables/gated-features/dependency-review-action.md b/data/reusables/gated-features/dependency-review-action.md index 1daebd5626b0..27a9ea80b915 100644 --- a/data/reusables/gated-features/dependency-review-action.md +++ b/data/reusables/gated-features/dependency-review-action.md @@ -1,10 +1,10 @@ -{%- ifversion fpt %} -The {% data variables.dependency-review.action_name %} is available for public repositories. The {% data variables.dependency-review.action_name %} is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}. +{% ifversion fpt or ghec %} +The {% data variables.dependency-review.action_name %} is available for the following repository types: -{%- elsif ghec %} -The {% data variables.dependency-review.action_name %} is available for public repositories. To configure the {% data variables.dependency-review.action_name %} in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}. +* Public repositories on {% data variables.product.prodname_dotcom_the_website %} +* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled -{%- elsif ghes %} -The {% data variables.dependency-review.action_name %} is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}. +{% elsif ghes %} +Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled -{%- endif %} {% data reusables.advanced-security.more-info-ghas %} +{% endif %} diff --git a/data/reusables/gated-features/dependency-review.md b/data/reusables/gated-features/dependency-review.md index 03c8abceefc0..f133d37eb4b6 100644 --- a/data/reusables/gated-features/dependency-review.md +++ b/data/reusables/gated-features/dependency-review.md @@ -1,10 +1,10 @@ -{%- ifversion fpt %} -Dependency review is enabled on public repositories. Dependency review is also available in private repositories owned by organizations that use {% data variables.product.prodname_ghe_cloud %} and have a license for {% data variables.product.prodname_GH_advanced_security %}. +{% ifversion fpt or ghec %} +Dependency review is available for the following repository types: -{%- elsif ghec %} -Dependency review is included in {% data variables.product.product_name %} for public repositories. To use dependency review in private repositories owned by organizations, you must have a license for {% data variables.product.prodname_GH_advanced_security %}. +* Public repositories on {% data variables.product.prodname_dotcom_the_website %} +* Organization-owned repositories on {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled -{%- elsif ghes %} -Dependency review is available for organization-owned repositories in {% data variables.product.product_name %}. This feature requires a license for {% data variables.product.prodname_GH_advanced_security %}. +{% elsif ghes %} +Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled -{%- endif %} {% data reusables.advanced-security.more-info-ghas %} +{% endif %} From e926eb7a85b2ff4c02faefc016d8852f840741f4 Mon Sep 17 00:00:00 2001 From: Sophie <29382425+sophietheking@users.noreply.github.com> Date: Wed, 6 Nov 2024 15:41:27 +0100 Subject: [PATCH 3/5] User rename tomb-stoning [GA] (#52916) Co-authored-by: Sam Browning <106113886+sabrowning1@users.noreply.github.com> Co-authored-by: Omer Bensaadon --- .../changing-your-github-username.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-user-account-settings/changing-your-github-username.md b/content/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-user-account-settings/changing-your-github-username.md index fdcd2e9af8f0..f94371b6948d 100644 --- a/content/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-user-account-settings/changing-your-github-username.md +++ b/content/account-and-profile/setting-up-and-managing-your-personal-account-on-github/managing-user-account-settings/changing-your-github-username.md @@ -46,7 +46,7 @@ If you hold a trademark for the username, you can find more information about ma If you do not hold a trademark for the name, you can choose another username or keep your current username. {% data variables.contact.github_support %} cannot release the unavailable username for you. For more information, see "[Changing your username](#changing-your-username)."{% endif %} -After changing your username, your old username becomes available for anyone else to claim. Most references to your repositories under the old username automatically change to the new username. However, some links to your profile won't automatically redirect. +After changing your username, your previous username will be unavailable for anyone to claim for 90 days. Most references to your repositories under the previous username automatically change to the new username. However, some links to your profile won't automatically redirect. {% data variables.product.product_name %} cannot set up redirects for: * [@mentions](/get-started/writing-on-github/getting-started-with-writing-and-formatting-on-github/basic-writing-and-formatting-syntax#mentioning-people-and-teams) using your old username From 6af2e97f0fbf141399fbeae7c153f99d97e19468 Mon Sep 17 00:00:00 2001 From: Piyush Bhaskar <102078527+Piyush-r-bhaskar@users.noreply.github.com> Date: Wed, 6 Nov 2024 21:11:17 +0530 Subject: [PATCH 4/5] Update about-protected-branches.md | Move period inside ending quotation par with GitHub styling. (#35201) Co-authored-by: Alex Nguyen <150945400+nguyenalex836@users.noreply.github.com> --- .../managing-protected-branches/about-protected-branches.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md b/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md index 5c94556db651..ac6c06f5c842 100644 --- a/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md +++ b/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md @@ -31,7 +31,7 @@ You can enforce certain workflows or requirements before a collaborator can push By default, each branch protection rule disables force pushes to the matching branches and prevents the matching branches from being deleted. You can optionally disable these restrictions and enable additional branch protection settings. -By default, the restrictions of a branch protection rule don't apply to people with admin permissions to the repository or custom roles with the "bypass branch protections" permission. You can optionally apply the restrictions to administrators and roles with the "bypass branch protections" permission, too. For more information, see "[AUTOTITLE](/enterprise-cloud@latest/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/managing-custom-repository-roles-for-an-organization)". +By default, the restrictions of a branch protection rule don't apply to people with admin permissions to the repository or custom roles with the "bypass branch protections" permission. You can optionally apply the restrictions to administrators and roles with the "bypass branch protections" permission, too. For more information, see "[AUTOTITLE](/enterprise-cloud@latest/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/managing-custom-repository-roles-for-an-organization)." {% data reusables.repositories.branch-rules-example %} For more information about branch name patterns, see "[AUTOTITLE](/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/managing-a-branch-protection-rule)." From aa155607d98c8036cc24fd09159e77cac09bc333 Mon Sep 17 00:00:00 2001 From: Piyush Bhaskar <102078527+Piyush-r-bhaskar@users.noreply.github.com> Date: Wed, 6 Nov 2024 21:30:06 +0530 Subject: [PATCH 5/5] Update about-protected-branches.md | Add period inside quotation (#35202) Co-authored-by: Alex Nguyen <150945400+nguyenalex836@users.noreply.github.com> --- .../managing-protected-branches/about-protected-branches.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md b/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md index ac6c06f5c842..14a92f20d406 100644 --- a/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md +++ b/content/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches.md @@ -182,7 +182,7 @@ By default, a forked repository does not support syncing from its upstream repos By default, the restrictions of a branch protection rule do not apply to people with admin permissions to the repository or custom roles with the "bypass branch protections" permission in a repository. -You can enable this setting to apply the restrictions to admins and roles with the "bypass branch protections" permission, too. For more information, see "[AUTOTITLE](/enterprise-cloud@latest/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/managing-custom-repository-roles-for-an-organization)". +You can enable this setting to apply the restrictions to admins and roles with the "bypass branch protections" permission, too. For more information, see "[AUTOTITLE](/enterprise-cloud@latest/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/managing-custom-repository-roles-for-an-organization)." ### Restrict who can push to matching branches