Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Repo sync #34254

Merged
merged 396 commits into from
Aug 8, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
396 commits
Select commit Hold shift + click to select a range
6300de5
addressed more comments
mchammer01 Jul 18, 2024
329a2d2
add heading
mchammer01 Jul 18, 2024
ed48097
add versioning to fix test failure
mchammer01 Jul 18, 2024
91594f8
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Jul 18, 2024
960408c
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Jul 18, 2024
bc0e17b
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-work-wi…
am-stead Jul 18, 2024
ae712d4
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Jul 19, 2024
6de98b6
address anoter comment
mchammer01 Jul 19, 2024
3947803
improve
mchammer01 Jul 19, 2024
b3990f3
Merge pull request #51544 from github/mchammer01/advanced-secret-scan…
mchammer01 Jul 19, 2024
5bcf1cf
try to fix merge conflicts
mchammer01 Jul 19, 2024
42a22b7
try to fix merge conflicts again
mchammer01 Jul 19, 2024
f19c898
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/advan…
mchammer01 Jul 19, 2024
54703ea
Merge pull request #51540 from github/mchammer01/advanced-secret-scan…
mchammer01 Jul 19, 2024
6d89a5c
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 19, 2024
5dafcf6
try to fix merge conflicts
mchammer01 Jul 19, 2024
a32f369
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Jul 19, 2024
771850b
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 19, 2024
45cfbe3
fix failing test
mchammer01 Jul 19, 2024
4d93492
Merge branch 'mchammer01/intro1' of github.com:github/docs-internal i…
mchammer01 Jul 19, 2024
14a60c4
fix failing test
mchammer01 Jul 19, 2024
a587304
fix another failing test
mchammer01 Jul 19, 2024
c5a9eb6
add missing redirect
mchammer01 Jul 19, 2024
107e7da
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Jul 19, 2024
598bf88
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 19, 2024
32ddc5d
add to the correct article duh
mchammer01 Jul 19, 2024
21a67bd
Merge branch 'secret-scanning-reorg-megabranch' of github.com:github/…
mchammer01 Jul 19, 2024
5135608
more work
mchammer01 Jul 19, 2024
22a3f70
transfer updates from the other PR
mchammer01 Jul 19, 2024
48a8923
Update content/code-security/secret-scanning/using-advanced-secret-sc…
mchammer01 Jul 19, 2024
fc654dd
more updates
mchammer01 Jul 19, 2024
9a9814c
Merge branch 'mchammer01/secret-scanning-scenario-driven' of github.c…
mchammer01 Jul 19, 2024
7bb2334
oops
mchammer01 Jul 19, 2024
45f4d60
more work on new high level articles
mchammer01 Jul 19, 2024
59620fa
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
bc6f8ec
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
f64d6b8
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
c78e9f7
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
819f7b6
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
c6343f0
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
16eccb2
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
600476a
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
380beba
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
dfc2848
Update content/code-security/secret-scanning/working-with-secret-scan…
am-stead Jul 19, 2024
cb5ece4
a bit more work
mchammer01 Jul 19, 2024
42310e3
apply some review feedback
am-stead Jul 19, 2024
1854f25
apply review feedback 2
am-stead Jul 19, 2024
61b63d6
removing old content from old article
am-stead Jul 19, 2024
1b0dc42
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-work-wi…
am-stead Jul 19, 2024
a395a1e
Merge pull request #51720 from github/mchammer01/secret-scanning-scen…
mchammer01 Jul 22, 2024
54440bc
more work
mchammer01 Jul 22, 2024
c7becc5
Merge branch 'main' into secret-scanning-reorg-megabranch
am-stead Jul 22, 2024
c33b8da
create index file
am-stead Jul 22, 2024
40620d0
adding empty children, updating index file
am-stead Jul 22, 2024
668c92b
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 22, 2024
2d86dea
filling out articles
am-stead Jul 22, 2024
b340d5d
more edits
am-stead Jul 22, 2024
7fce58c
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-work-wi…
am-stead Jul 23, 2024
ce4e0da
removing SS for your user-owned repos from new map topic and putting …
am-stead Jul 23, 2024
9b72e9e
correcting links
am-stead Jul 23, 2024
2639573
Merge pull request #51606 from github/am-stead-work-with-ss
am-stead Jul 23, 2024
eb0c93c
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-managin…
am-stead Jul 23, 2024
5c291c0
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 23, 2024
a279583
try to fix merg conflict
mchammer01 Jul 23, 2024
2dd700a
try to fix merg conflict
mchammer01 Jul 23, 2024
af40f62
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Jul 23, 2024
0e58ddf
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 23, 2024
6a67a7f
trying to get file to render
mchammer01 Jul 23, 2024
f63d39f
Merge branch 'mchammer01/intro1' of github.com:github/docs-internal i…
mchammer01 Jul 23, 2024
8e73eb5
trying to get file to render 2
mchammer01 Jul 23, 2024
ff95b54
trying to get file to render 3
mchammer01 Jul 23, 2024
e771120
more work on push protection
mchammer01 Jul 23, 2024
ed448d5
version delegated bypass section
mchammer01 Jul 23, 2024
3de6c35
and more work
mchammer01 Jul 23, 2024
f587c2b
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-managin…
am-stead Jul 23, 2024
f8d90df
working on about alerts
am-stead Jul 23, 2024
3b120a8
new articles
am-stead Jul 23, 2024
99a31f5
first draft validity checks
am-stead Jul 24, 2024
0556b12
more edits to validity checks
am-stead Jul 24, 2024
047b4c4
first draft enable SS article
am-stead Jul 24, 2024
92f11f8
first edits
am-stead Jul 24, 2024
50e0806
edits to about alerts
am-stead Jul 24, 2024
4acf7f3
more edits
am-stead Jul 24, 2024
cd28dbd
fixing links
am-stead Jul 25, 2024
4d9c74d
and more work
mchammer01 Jul 25, 2024
949e499
fix links in veiwing alerts
am-stead Jul 25, 2024
02fe49d
more work on secret scanning and push protection articles
mchammer01 Jul 25, 2024
0302133
fix failing linter test
mchammer01 Jul 25, 2024
dac79ee
add skeleton
mchammer01 Jul 25, 2024
523f532
fix failing check
mchammer01 Jul 25, 2024
d141db3
Merge branch 'mchammer01/intro1' into mchammer01/intro2
mchammer01 Jul 25, 2024
5c2b50d
start work on non-provider patterns
mchammer01 Jul 25, 2024
995561e
work on advanced secret scanning features
mchammer01 Jul 26, 2024
f365584
more work on secret scanning article
mchammer01 Jul 26, 2024
d25d0cf
fix link
mchammer01 Jul 26, 2024
fcbcae2
working on conceptual info
am-stead Jul 26, 2024
a96cfc5
getting bored with this work
mchammer01 Jul 26, 2024
eaf5934
first commit
mchammer01 Jul 26, 2024
464e39c
more edits to map topic
am-stead Jul 26, 2024
363265f
write new article
mchammer01 Jul 26, 2024
055b117
fix typo
mchammer01 Jul 26, 2024
45833a0
improve
mchammer01 Jul 26, 2024
4b7cf61
add TODO
mchammer01 Jul 26, 2024
e45fe55
add another TODO
mchammer01 Jul 26, 2024
725be04
address review comments
mchammer01 Jul 29, 2024
97fb82e
Update content/code-security/secret-scanning/introduction/about-secre…
mchammer01 Jul 29, 2024
3e667ff
Merge branch 'mchammer01/intro3' of github.com:github/docs-internal i…
mchammer01 Jul 29, 2024
85caff8
fix frontmatter issue
mchammer01 Jul 29, 2024
c5afc92
Merge pull request #51801 from github/mchammer01/intro3
mchammer01 Jul 29, 2024
074e8b5
fix stupid error
mchammer01 Jul 30, 2024
ce5ac0d
more edits
am-stead Jul 30, 2024
462b178
Merge branch 'main' into secret-scanning-reorg-megabranch
am-stead Jul 30, 2024
95e18aa
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-enabling
am-stead Jul 30, 2024
dec8a20
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Jul 30, 2024
9c46a13
Merge branch 'mchammer01/intro1' into mchammer01/intro2
mchammer01 Jul 30, 2024
141b782
fix failing check
mchammer01 Jul 30, 2024
406706c
fix failing check
mchammer01 Jul 30, 2024
bb246e6
more edits
am-stead Jul 30, 2024
9d383d7
more edits
am-stead Jul 30, 2024
a8ef9d9
more work on partner patterns
mchammer01 Jul 30, 2024
e1a66f1
more work on secret scanning conceptual article
mchammer01 Jul 30, 2024
5694af7
add redirects, delete old article
am-stead Jul 30, 2024
c0d0310
Merge branch 'main' into secret-scanning-reorg-megabranch
am-stead Jul 31, 2024
e9284cc
Merge branch 'secret-scanning-reorg-megabranch' into am-stead-enabling
am-stead Jul 31, 2024
8ea8bfa
removing deleted article from index frontmatter
am-stead Jul 31, 2024
00068c3
fix merge conflict Merge branch 'am-stead-enabling' of https://github…
am-stead Jul 31, 2024
825a245
fix redirect duplication
am-stead Jul 31, 2024
9e9497f
run script to fix test
am-stead Jul 31, 2024
9d9c0d9
trying to fix redirect errors
am-stead Jul 31, 2024
7ca9a7b
removing redirect to try and fix failing test
am-stead Jul 31, 2024
a612c2e
Merge branch 'main' into secret-scanning-reorg-megabranch
am-stead Aug 1, 2024
74a3879
merging
am-stead Aug 1, 2024
3ef11bb
linter errors
am-stead Aug 1, 2024
dd36012
delete old article
am-stead Aug 1, 2024
f75e710
removing leftover beta note
am-stead Aug 1, 2024
59b5347
Update content/code-security/secret-scanning/introduction/about-secre…
mchammer01 Aug 1, 2024
0f5daa3
start addressing comments
mchammer01 Aug 1, 2024
738f2fb
address more comments
mchammer01 Aug 1, 2024
1bbe16e
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Aug 1, 2024
45ed312
Merge branch 'mchammer01/intro1' into mchammer01/intro2
mchammer01 Aug 1, 2024
d7930ca
Update content/code-security/secret-scanning/introduction/about-push-…
mchammer01 Aug 1, 2024
7ef9bed
Update content/code-security/secret-scanning/introduction/about-push-…
mchammer01 Aug 1, 2024
5e9045d
Update content/code-security/secret-scanning/introduction/about-push-…
mchammer01 Aug 1, 2024
2640efb
Update content/code-security/secret-scanning/introduction/about-push-…
mchammer01 Aug 1, 2024
804e280
what a mess
mchammer01 Aug 1, 2024
4cb9c8d
addressed more comments
mchammer01 Aug 1, 2024
e876e65
follow content model
mchammer01 Aug 1, 2024
eb6b6b4
Merge branch 'mchammer01/intro2' of github.com:github/docs-internal i…
mchammer01 Aug 1, 2024
79a6261
final edits
am-stead Aug 1, 2024
92ecffd
streamline
mchammer01 Aug 1, 2024
4ba251a
fixing link
am-stead Aug 1, 2024
e8c7024
tryig to fix broken links
am-stead Aug 1, 2024
9df8602
trying again
am-stead Aug 1, 2024
0f691ee
updating links
am-stead Aug 1, 2024
86c899f
Update content/code-security/secret-scanning/enabling-secret-scanning…
am-stead Aug 2, 2024
1765c02
Update content/code-security/secret-scanning/enabling-secret-scanning…
am-stead Aug 2, 2024
74ec009
Update content/code-security/secret-scanning/enabling-secret-scanning…
am-stead Aug 2, 2024
0bf0fb4
Update content/code-security/secret-scanning/enabling-secret-scanning…
am-stead Aug 2, 2024
f47a25b
Update content/code-security/secret-scanning/enabling-secret-scanning…
am-stead Aug 2, 2024
b6e3216
apply review feedback
am-stead Aug 2, 2024
6b1bf1c
merge Merge branch 'am-stead-enabling' of https://github.com/github/d…
am-stead Aug 2, 2024
fe87fcb
more work
mchammer01 Aug 2, 2024
71ad597
fixing enabling after discussion
am-stead Aug 2, 2024
33f1a5e
Merge pull request #51764 from github/am-stead-enabling
am-stead Aug 2, 2024
6944856
updated what is scanned because of preview error in ghes 3.10, add li
am-stead Aug 2, 2024
ffe1b2c
edits to customizing secret scanning section
am-stead Aug 2, 2024
0007901
add similar how it works section for missing content, update customiz…
am-stead Aug 2, 2024
01bdcd9
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 2, 2024
85d3029
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 2, 2024
2ceda85
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 2, 2024
b5a0c01
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 2, 2024
af4cc78
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro1
mchammer01 Aug 2, 2024
d72992d
fix formatting
mchammer01 Aug 2, 2024
cdbeaa1
Merge pull request #51580 from github/mchammer01/intro1
mchammer01 Aug 2, 2024
79bb121
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 2, 2024
87bbd5f
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro2
mchammer01 Aug 2, 2024
fea04c1
Merge pull request #51790 from github/mchammer01/intro2
mchammer01 Aug 2, 2024
721e0a7
remove duplicate entry
mchammer01 Aug 2, 2024
9cb4baf
fix 2nd test failure
mchammer01 Aug 2, 2024
941cf67
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 3, 2024
15ceaeb
made a start
mchammer01 Aug 4, 2024
8b10139
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
2f0555c
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
3074cd2
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
be284ce
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
92fd323
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
81d42e8
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
1049d4e
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
fc9954f
Update content/code-security/secret-scanning/managing-alerts-from-sec…
am-stead Aug 4, 2024
49e4a4f
apply review feedback
am-stead Aug 4, 2024
4a78250
merge Merge branch 'secret-scanning-reorg-megabranch' into am-stead-m…
am-stead Aug 4, 2024
8a7356f
resolve conflicts
am-stead Aug 4, 2024
546592a
fix merge conflict
am-stead Aug 4, 2024
e2811b0
fix again merge problems
am-stead Aug 4, 2024
568f9bb
Merge pull request #51742 from github/am-stead-managing-alerts
am-stead Aug 4, 2024
8d4543a
more work
mchammer01 Aug 5, 2024
46f35c6
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 5, 2024
b44d9b5
fix redirect
mchammer01 Aug 5, 2024
81019de
delete redirect
mchammer01 Aug 5, 2024
eb855fd
fixing some TODOs
mchammer01 Aug 5, 2024
416bb97
fixing more TODOs
mchammer01 Aug 5, 2024
fc1d4a1
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro4
mchammer01 Aug 5, 2024
8ca05b7
add versioning to fix broken links in GHES
mchammer01 Aug 5, 2024
8bab2f9
Merge branch 'secret-scanning-reorg-megabranch' into mchammer01/intro4
mchammer01 Aug 5, 2024
cd5b040
more work on the supported pattern articles
mchammer01 Aug 5, 2024
6eb39fe
add reusable
mchammer01 Aug 5, 2024
024d18a
polishing
mchammer01 Aug 5, 2024
232c081
use variable
mchammer01 Aug 5, 2024
4410907
Update content/code-security/secret-scanning/introduction/supported-s…
mchammer01 Aug 5, 2024
c868955
update path to patterns file
rachmari Aug 5, 2024
a6a28dd
Merge pull request #51899 from github/mchammer01/intro4
mchammer01 Aug 6, 2024
5705412
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 6, 2024
7de9003
another TODO
mchammer01 Aug 6, 2024
230fb8b
add notes linking to each of the 2 articles
mchammer01 Aug 6, 2024
e1576a5
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 6, 2024
4531924
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 8, 2024
412ece7
remove last TODOs
mchammer01 Aug 8, 2024
318963b
Merge branch 'secret-scanning-reorg-megabranch' of github.com:github/…
mchammer01 Aug 8, 2024
04955e5
Apply suggestions from code review
mchammer01 Aug 8, 2024
0bed702
address more comments
mchammer01 Aug 8, 2024
308851b
Update content/apps/oauth-apps/using-oauth-apps/internal-oauth-apps.md
mchammer01 Aug 8, 2024
a6d2bf3
Update content/code-security/secret-scanning/using-advanced-secret-sc…
mchammer01 Aug 8, 2024
967783c
Update content/code-security/secret-scanning/using-advanced-secret-sc…
mchammer01 Aug 8, 2024
28a8ae0
address another comment
mchammer01 Aug 8, 2024
1cbb4e4
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 8, 2024
b1027b9
removing versioning to simplify
mchammer01 Aug 8, 2024
eef0eb4
Merge branch 'secret-scanning-reorg-megabranch' of github.com:github/…
mchammer01 Aug 8, 2024
6465fac
Update content/code-security/secret-scanning/working-with-secret-scan…
mchammer01 Aug 8, 2024
db5bb6f
update anchor links for supported patterns
mchammer01 Aug 8, 2024
76bc8de
its getting boring
mchammer01 Aug 8, 2024
55d00fd
reinstate
mchammer01 Aug 8, 2024
7d45834
more link updates
mchammer01 Aug 8, 2024
4fca806
more link updates
mchammer01 Aug 8, 2024
fe618a9
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 8, 2024
ac94352
and more link updates
mchammer01 Aug 8, 2024
b5699ee
Merge branch 'secret-scanning-reorg-megabranch' of github.com:github/…
mchammer01 Aug 8, 2024
ec0a58f
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 8, 2024
fee208b
add reusable
mchammer01 Aug 8, 2024
5c361f0
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 8, 2024
2875e27
space or no space
mchammer01 Aug 8, 2024
79c3174
Merge branch 'secret-scanning-reorg-megabranch' of github.com:github/…
mchammer01 Aug 8, 2024
1c08a15
Merge branch 'main' into secret-scanning-reorg-megabranch
mchammer01 Aug 8, 2024
6084552
Update replacing-a-cluster-node-modify-cluster-conf.md (#51962)
jianghao0718 Aug 8, 2024
f473d5e
Merge pull request #51503 from github/secret-scanning-reorg-megabranch
saritai Aug 8, 2024
ca1c2d6
Bump docker/build-push-action from 6.5.0 to 6.6.1 (#51958)
dependabot[bot] Aug 8, 2024
78ef931
Bump github/codeql-action from 3.25.5 to 3.26.0 (#51959)
dependabot[bot] Aug 8, 2024
8a0c53a
Update audit log event data (#51969)
docs-bot Aug 8, 2024
d806b00
GraphQL schema update (#51970)
docs-bot Aug 8, 2024
9c9b5b7
Rework article on exporting CSVs to include overview dashboard (#51905)
saritai Aug 8, 2024
a4b9063
Update pages domain verification to clarify that release is immediate…
TooManyBees Aug 8, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/azure-preview-env-deploy-public.yml
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ jobs:
run: src/workflows/prune-for-preview-env.sh

- name: 'Build and push image'
uses: docker/build-push-action@5176d81f87c23d6fc96624dfdbcd9f3830bbe445
uses: docker/build-push-action@16ebe778df0e7752d2cfcbd924afdbbd89c1a755
with:
context: .
push: true
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/azure-preview-env-deploy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,7 @@ jobs:
run: src/workflows/prune-for-preview-env.sh

- name: 'Build and push image'
uses: docker/build-push-action@5176d81f87c23d6fc96624dfdbcd9f3830bbe445
uses: docker/build-push-action@16ebe778df0e7752d2cfcbd924afdbbd89c1a755
with:
context: .
push: true
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/azure-prod-build-deploy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ jobs:
token: ${{ secrets.DOCS_BOT_PAT_READPUBLICKEY }}

- name: 'Build and push image'
uses: docker/build-push-action@5176d81f87c23d6fc96624dfdbcd9f3830bbe445
uses: docker/build-push-action@16ebe778df0e7752d2cfcbd924afdbbd89c1a755
with:
context: .
push: true
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/azure-staging-build-deploy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ jobs:
run: src/early-access/scripts/merge-early-access.sh

- name: 'Build and push image'
uses: docker/build-push-action@5176d81f87c23d6fc96624dfdbcd9f3830bbe445
uses: docker/build-push-action@16ebe778df0e7752d2cfcbd924afdbbd89c1a755
with:
context: .
push: true
Expand Down
4 changes: 2 additions & 2 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -36,13 +36,13 @@ jobs:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- uses: github/codeql-action/init@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
- uses: github/codeql-action/init@eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3.26.0
with:
languages: javascript # comma separated list of values from {go, python, javascript, java, cpp, csharp, ruby}
config: |
paths-ignore:
- 'src/open-source/scripts/add-pr-links.js'
- uses: github/codeql-action/analyze@b7cec7526559c32f1616476ff32d17ba4c59b2d6 # v3.25.5
- uses: github/codeql-action/analyze@eb055d739abdc2e8de2e5f4ba1a8b246daa779aa # v3.26.0
continue-on-error: true

- uses: ./.github/actions/slack-alert
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/main-preview-docker-cache.yml
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ jobs:
run: src/workflows/prune-for-preview-env.sh

- name: 'Build and push image'
uses: docker/build-push-action@5176d81f87c23d6fc96624dfdbcd9f3830bbe445
uses: docker/build-push-action@16ebe778df0e7752d2cfcbd924afdbbd89c1a755
with:
context: .
push: true
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@

For conversations you're watching or participating in, you can choose whether you want to receive notifications by email or through the notifications inbox. For more information, see "[Choosing your notification settings](/account-and-profile/managing-subscriptions-and-notifications-on-github/setting-up-notifications/configuring-notifications#choosing-your-notification-settings)."

![Screenshot of the "Notification settings" page. The "Participating" and "Watching" settings are shown, each with two checkbox options, titled "Email" and "Web and Mobile".](/assets/images/help/notifications-v2/participating-and-watching-options.png){% endif %}

Check warning on line 82 in content/account-and-profile/managing-subscriptions-and-notifications-on-github/setting-up-notifications/configuring-notifications.md

View workflow job for this annotation

GitHub Actions / lint-content

Images alternate text should be between 40-150 characters

Image alternate text is 171 characters long.

For example, on your "Notification settings" page:
* If you don't want notifications to be sent to your email, deselect **email** for participating and watching notifications.
Expand Down Expand Up @@ -234,9 +234,9 @@

{% data reusables.secret-scanning.secret-scanning-configure-notifications %}

For more information on how to configure notifications for {% data variables.secret-scanning.alerts %}, see "[Configuring notifications for secret scanning alerts](/code-security/secret-scanning/managing-alerts-from-secret-scanning#configuring-notifications-for-secret-scanning-alerts)."
For more information on how to configure notifications for {% data variables.secret-scanning.alerts %}, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/monitoring-alerts)."

{% ifversion update-notification-settings-22 or ghes %}

Check warning on line 239 in content/account-and-profile/managing-subscriptions-and-notifications-on-github/setting-up-notifications/configuring-notifications.md

View workflow job for this annotation

GitHub Actions / lint-content

Liquid `ifversion` (and `elsif`) should not always be true

The Liquid ifversion condition 'update-notification-settings-22 or ghes' includes all possible versions and will always be true.

## {% data variables.product.prodname_actions %} notification options

Expand All @@ -245,7 +245,7 @@
{% ifversion update-notification-settings-22 %}
1. On the "Notification settings" page, under "System", then under "Actions", select the **Don't notify** dropdown menu.

![Screenshot of the "System" section of the notification settings. Under "Actions," a dropdown menu, titled "Don't notify", is highlighted with an orange outline.](/assets/images/help/notifications/github-actions-customize-notifications.png)

Check warning on line 248 in content/account-and-profile/managing-subscriptions-and-notifications-on-github/setting-up-notifications/configuring-notifications.md

View workflow job for this annotation

GitHub Actions / lint-content

Images alternate text should be between 40-150 characters

Image alternate text is 160 characters long.
1. To opt into web notifications, from the dropdown menu, select "On {% data variables.product.prodname_dotcom %}."

To opt into email notifications, from the dropdown menu, select "Email."
Expand All @@ -254,7 +254,7 @@
{% ifversion ghes %}
On the "Notification settings" page, select "Email" or "Web" notifications. Optionally, to only receive notifications for failed workflow runs, select "Send notifications for failed workflows only".

![Screenshot of the "Actions" section on the "Notification settings" page. Three checkboxes, titled "Email", "Web", and "Send notifications for failed workflows only", are shown.](/assets/images/help/notifications-v2/github-actions-notification-options.png){% endif %}

Check warning on line 257 in content/account-and-profile/managing-subscriptions-and-notifications-on-github/setting-up-notifications/configuring-notifications.md

View workflow job for this annotation

GitHub Actions / lint-content

Images alternate text should be between 40-150 characters

Image alternate text is 176 characters long.

{% endif %}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ topics:

## About {% data variables.product.prodname_secret_scanning %}

If someone checks a secret with a known pattern into a repository, {% data variables.product.prodname_secret_scanning %} catches the secret as it's checked in, and helps you mitigate the impact of the leak. Repository administrators are notified about any commit that contains a secret, and they can quickly view all detected secrets in the **Security** tab for the repository. For more information, see "[AUTOTITLE](/code-security/secret-scanning/about-secret-scanning)."
If someone checks a secret with a known pattern into a repository, {% data variables.product.prodname_secret_scanning %} catches the secret as it's checked in, and helps you mitigate the impact of the leak. Repository administrators are notified about any commit that contains a secret, and they can quickly view all detected secrets in the **Security** tab for the repository. For more information, see "[AUTOTITLE](/code-security/secret-scanning/introduction/about-secret-scanning)."

## Checking whether your license includes {% data variables.product.prodname_GH_advanced_security %}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -214,10 +214,10 @@ There are a few simple tricks to avoid committing things you don't want committe
* Avoid the catch-all commands `git add .` and `git commit -a` on the command line—use `git add filename` and `git rm filename` to individually stage files, instead.
* Use `git add --interactive` to individually review and stage changes within each file.
* Use `git diff --cached` to review the changes that you have staged for commit. This is the exact diff that `git commit` will produce as long as you don't use the `-a` flag.
* Enable push protection for your repository to detect and prevent pushes which contain hardcoded secrets from being committed to your codebase. For more information, see "[AUTOTITLE](/code-security/secret-scanning/push-protection-for-repositories-and-organizations#about-push-protection-for-repositories-and-organizations)."
* Enable push protection for your repository to detect and prevent pushes which contain hardcoded secrets from being committed to your codebase. For more information, see "[AUTOTITLE](/code-security/secret-scanning/introduction/about-push-protection)."

## Further reading

* [`git filter-repo` man page](https://htmlpreview.github.io/?https://github.com/newren/git-filter-repo/blob/docs/html/git-filter-repo.html)
* [Pro Git: Git Tools - Rewriting History](https://git-scm.com/book/en/Git-Tools-Rewriting-History)
* "[AUTOTITLE](/code-security/secret-scanning/about-secret-scanning)"
* "[AUTOTITLE](/code-security/secret-scanning/introduction/about-secret-scanning)"
Original file line number Diff line number Diff line change
Expand Up @@ -132,11 +132,11 @@ Before you can proceed with pilot programs and rolling out {% data variables.pro

**Note:** When a secret is detected in a repository that has enabled {% data variables.product.prodname_secret_scanning %}, {% data variables.product.prodname_dotcom %} alerts all users with access to security alerts for the repository. {% ifversion ghec %}

Secrets found in public repositories using {% data variables.secret-scanning.partner_alerts %} are reported directly to the partner, without creating an alert on {% data variables.product.product_name %}. For details about the supported partner patterns, see "[AUTOTITLE](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."{% endif %}
Secrets found in public repositories using {% data variables.secret-scanning.partner_alerts %} are reported directly to the partner, without creating an alert on {% data variables.product.product_name %}. For details about the supported partner patterns, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."{% endif %}

{% endnote %}

If a project communicates with an external service, it might use a token or private key for authentication. If you check a secret into a repository, anyone who has read access to the repository can use the secret to access the external service with your privileges. {% data variables.product.prodname_secret_scanning_caps %} will scan your entire Git history on all branches present in your {% data variables.product.prodname_dotcom %} repositories for secrets and alert you or block the push containing the secret. For more information, see "[AUTOTITLE](/code-security/secret-scanning/about-secret-scanning)."
If a project communicates with an external service, it might use a token or private key for authentication. If you check a secret into a repository, anyone who has read access to the repository can use the secret to access the external service with your privileges. {% data variables.product.prodname_secret_scanning_caps %} will scan your entire Git history on all branches present in your {% data variables.product.prodname_dotcom %} repositories for secrets and alert you or block the push containing the secret. For more information, see "[AUTOTITLE](/code-security/secret-scanning/introduction/about-secret-scanning)."

{% ifversion ghec %}{% data variables.secret-scanning.partner_alerts_caps %} runs automatically on public repositories and public npm packages to notify service providers about leaked secrets on {% data variables.product.prodname_dotcom_the_website %}.

Expand All @@ -154,17 +154,17 @@ Enabling {% data variables.product.prodname_secret_scanning %} for all repositor

If you are enabling {% data variables.product.prodname_secret_scanning %} on a large organization, be prepared to see a high number of secrets found. Sometimes this comes as a shock to organizations and the alarm is raised. If you would like to turn on {% data variables.product.prodname_secret_scanning %} across all repositories at once, plan for how you will respond to multiple alerts across the organization.

{% data variables.product.prodname_secret_scanning_caps %} can be enabled for individual repositories. For more information, see "[AUTOTITLE](/code-security/secret-scanning/configuring-secret-scanning-for-your-repositories)." {% data variables.product.prodname_secret_scanning_caps %} can also be enabled for all repositories in your organization, as described above. For more information on enabling for all repositories, see "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization)."
{% data variables.product.prodname_secret_scanning_caps %} can be enabled for individual repositories. For more information, see "[AUTOTITLE](/code-security/secret-scanning/enabling-secret-scanning-features/enabling-secret-scanning-for-your-repository)." {% data variables.product.prodname_secret_scanning_caps %} can also be enabled for all repositories in your organization, as described above. For more information on enabling for all repositories, see "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization)."

### Custom patterns for {% data variables.product.prodname_secret_scanning %}

{% data variables.product.prodname_secret_scanning_caps %} detects a large number of default patterns but can also be configured to detect custom patterns, such as secret formats unique to your infrastructure or used by integrators that {% data variables.product.product_name %}'s {% data variables.product.prodname_secret_scanning %} does not currently detect. For more information about supported secrets for partner patterns, see "[AUTOTITLE](/code-security/secret-scanning/secret-scanning-patterns)."
{% data variables.product.prodname_secret_scanning_caps %} detects a large number of default patterns but can also be configured to detect custom patterns, such as secret formats unique to your infrastructure or used by integrators that {% data variables.product.product_name %}'s {% data variables.product.prodname_secret_scanning %} does not currently detect. For more information about supported secrets for partner patterns, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns)."

As you audit your repositories and speak to security and developer teams, build a list of the secret types that you will later use to configure custom patterns for {% data variables.product.prodname_secret_scanning %}. For more information, see "[AUTOTITLE](/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning)."
As you audit your repositories and speak to security and developer teams, build a list of the secret types that you will later use to configure custom patterns for {% data variables.product.prodname_secret_scanning %}. For more information, see "[AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning)."

### Push protection for {% data variables.product.prodname_secret_scanning %}

Push protection for organizations and repositories instructs {% data variables.product.prodname_secret_scanning %} to check pushes for supported secrets _before_ secrets are committed to the codebase. For information on which secrets are supported, see "[AUTOTITLE](/code-security/secret-scanning/secret-scanning-patterns#supported-secrets)."
Push protection for organizations and repositories instructs {% data variables.product.prodname_secret_scanning %} to check pushes for supported secrets _before_ secrets are committed to the codebase. For information on which secrets are supported, see "[AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets)."

If a secret is detected in a push, that push is blocked. {% data variables.product.prodname_secret_scanning_caps %} lists any secrets it detects so the author can review the secrets and remove them or, if needed, allow those secrets to be pushed. {% data reusables.secret-scanning.push-protection-custom-pattern %}

Expand All @@ -176,7 +176,7 @@ Before enabling push protection, consider whether you need to create guidance fo

Next, familiarize yourself with the different options for managing and monitoring alerts that are the result of a contributor bypassing push protection.

For more information, see "[AUTOTITLE](/code-security/secret-scanning/push-protection-for-repositories-and-organizations)."
For more information, see "[AUTOTITLE](/code-security/secret-scanning/introduction/about-push-protection)."

{% note %}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -102,7 +102,7 @@ Start to review activity using the push protection metrics page in security over

{%- endif %}

If you have collated any custom patterns specific to your enterprise, especially any related to the projects piloting {% data variables.product.prodname_secret_scanning %}, you can configure those. For more information, see "[AUTOTITLE](/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning)."
If you have collated any custom patterns specific to your enterprise, especially any related to the projects piloting {% data variables.product.prodname_secret_scanning %}, you can configure those. For more information, see "[AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning)."

To learn how to view and close alerts for secrets checked into your repository, see "[AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning)."

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -53,11 +53,11 @@ Repeat the last two steps for any new secrets leaked. This process encourages de

## 2. Enable push protection

Once you have enabled {% data variables.product.prodname_secret_scanning %}, you should also enable push protection. With push protection, {% data variables.product.prodname_secret_scanning %} checks pushes for supported secrets and blocks pushes to {% data variables.product.prodname_dotcom %} _before_ the secrets are exposed to other users. For information on how to enable push protection, see "[AUTOTITLE](/code-security/secret-scanning/push-protection-for-repositories-and-organizations#enabling-secret-scanning-as-a-push-protection)."
Once you have enabled {% data variables.product.prodname_secret_scanning %}, you should also enable push protection. With push protection, {% data variables.product.prodname_secret_scanning %} checks pushes for supported secrets and blocks pushes to {% data variables.product.prodname_dotcom %} _before_ the secrets are exposed to other users. For information on how to enable push protection, see "[AUTOTITLE](/code-security/secret-scanning/enabling-secret-scanning-features/enabling-push-protection-for-your-repository)."

Once enabled, you can do the following:

1. **Provide guidance**: Configure a custom link in the message that contributors will see if their push is blocked by {% data variables.product.prodname_secret_scanning %}. The linked resource can provide guidance for contributors on how to resolve the blocked push. For more information, see "[AUTOTITLE](/code-security/secret-scanning/push-protection-for-repositories-and-organizations#enabling-secret-scanning-as-a-push-protection)."
1. **Provide guidance**: Configure a custom link in the message that contributors will see if their push is blocked by {% data variables.product.prodname_secret_scanning %}. The linked resource can provide guidance for contributors on how to resolve the blocked push. For more information, see "[AUTOTITLE](/code-security/secret-scanning/enabling-secret-scanning-features/enabling-push-protection-for-your-repository)."

1. **Notify**: Define a webhook that specifically tracks {% data variables.secret-scanning.alerts %} created when someone bypasses push protection by using the alert property `"push_protection_bypassed": true`. Or, use the API to get updates on which {% data variables.secret-scanning.alerts %} were the result of a push protection bypass by filtering the list of results for `"push_protection_bypassed": true`. For more information, see "[AUTOTITLE](/code-security/getting-started/auditing-security-alerts)."

Expand Down Expand Up @@ -107,7 +107,7 @@ Once you have decided on the secret types, you can do the following:

You can now expand beyond the five most critical secret types into a more comprehensive list, with an additional focus on education. You can repeat the previous step, remediating previously committed secrets, for the different secret types you have targeted.

You can also include more of the custom patterns collated in the earlier phases and invite security teams and developer teams to submit more patterns, establishing a process for submitting new patterns as new secret types are created. For more information, see "[AUTOTITLE](/code-security/secret-scanning/defining-custom-patterns-for-secret-scanning)."
You can also include more of the custom patterns collated in the earlier phases and invite security teams and developer teams to submit more patterns, establishing a process for submitting new patterns as new secret types are created. For more information, see "[AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning)."

As you continue to build your remediation processes for other secret types, start to create proactive training material that can be shared with all developers of GitHub in your organization. Until this point, a lot of the focus has been reactive. It is an excellent idea to shift focus to being proactive and encourage developers not to push credentials to GitHub in the first place. This can be achieved in multiple ways but creating a short document explaining the risks and reasons would be a great place to start.

Expand Down
Loading
Loading