You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,7 @@ This repository contains the documentation website code and Markdown source file
5
5
GitHub's Docs team works on pre-production content in a private repo that regularly syncs with this public repo.
6
6
7
7
In this article:
8
+
8
9
-[Contributing](#contributing)
9
10
-[READMEs](#readmes)
10
11
-[License](#license)
@@ -34,6 +35,7 @@ If you have a solution to one of the open issues, you will need to fork the repo
34
35
We use GitHub Discussions to talk about all sorts of topics related to documentation and this site. For example: if you'd like help troubleshooting a PR, have a great new idea, or want to share something amazing you've learned in our docs, join us in [discussions](https://github.com/github/docs/discussions).
35
36
36
37
#### And that's it!
38
+
37
39
That's how you can get started easily as a member of the GitHub Documentation community. :sparkles:
38
40
39
41
If you want to know more, or you're making a more complex contribution, check out [Getting Started with Contributing](/CONTRIBUTING.md).
Copy file name to clipboardExpand all lines: content/actions/reference/events-that-trigger-workflows.md
+8Lines changed: 8 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -572,6 +572,8 @@ on:
572
572
573
573
{% data reusables.developer-site.pull_request_forked_repos_link %}
574
574
575
+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
576
+
575
577
#### `pull_request_target`
576
578
577
579
This event is similar to `pull_request`, except that it runs in the context of the base repository of the pull request, rather than in the merge commit. This means that you can more safely make your secrets available to the workflows triggered by the pull request, because only workflows defined in the commit on the base repository are run. For example, this event allows you to create workflows that label and comment on pull requests, based on the contents of the event payload.
@@ -589,6 +591,8 @@ on: pull_request_target
589
591
types: [assigned, opened, synchronize, reopened]
590
592
```
591
593
594
+
{% endif %}
595
+
592
596
#### `push`
593
597
594
598
{% note %}
@@ -689,6 +693,8 @@ on:
689
693
types: [started]
690
694
```
691
695
696
+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
697
+
692
698
#### `workflow_run`
693
699
694
700
{% data reusables.webhooks.workflow_run_desc %}
@@ -711,6 +717,8 @@ on:
711
717
- requested
712
718
```
713
719
720
+
{% endif %}
721
+
714
722
### Triggering new workflows using a personal access token
715
723
716
724
{% data reusables.github-actions.actions-do-not-trigger-workflows %} For more information, see "[Authenticating with the GITHUB_TOKEN](/actions/configuring-and-managing-workflows/authenticating-with-the-github_token)."
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.21" %}
1291
1291
### workflow_dispatch
1292
1292
1293
1293
This event occurs when someone triggers a workflow run on GitHub or sends a `POST` request to the "[Create a workflow dispatch event](/rest/reference/actions/#create-a-workflow-dispatch-event)" endpoint. For more information, see "[Events that trigger workflows](/actions/reference/events-that-trigger-workflows#workflow_dispatch)."
@@ -1301,6 +1301,7 @@ This event occurs when someone triggers a workflow run on GitHub or sends a `POS
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
1304
1305
### workflow_run
1305
1306
1306
1307
When a {% data variables.product.prodname_actions %} workflow run is requested or completed. For more information, see "[Events that trigger workflows](/actions/reference/events-that-trigger-workflows#workflow_run)."
Copy file name to clipboardExpand all lines: content/github/administering-a-repository/about-secret-scanning.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,6 +18,8 @@ Service providers can partner with {% data variables.product.company_short %} to
18
18
19
19
### About {% data variables.product.prodname_secret_scanning %} for public repositories
20
20
21
+
{% data variables.product.prodname_secret_scanning_caps %} is automatically enabled on public repositories, where it scans code for secrets, to check for known secret formats. When a match of your secret format is found in a public repository, {% data variables.product.company_short %} doesn't publicly disclose the information as an alert, but instead sends a payload to an HTTP endpoint of your choice. For an overview of how secret scanning works on public repositories, see "[Secret scanning](/developers/overview/secret-scanning)."
22
+
21
23
When you push to a public repository, {% data variables.product.product_name %} scans the content of the commits for secrets. If you switch a private repository to public, {% data variables.product.product_name %} scans the entire repository for secrets.
22
24
23
25
When {% data variables.product.prodname_secret_scanning %} detects a set of credentials, we notify the service provider who issued the secret. The service provider validates the credential and then decides whether they should revoke the secret, issue a new secret, or reach out to you directly, which will depend on the associated risks to you or the service provider.
@@ -65,6 +67,8 @@ When {% data variables.product.prodname_secret_scanning %} detects a set of cred
65
67
66
68
{% data reusables.secret-scanning.beta %}
67
69
70
+
If you're a repository administrator or an organization owner, you can enable {% data variables.product.prodname_secret_scanning %} for private repositories that are owned by organizations. You can enable {% data variables.product.prodname_secret_scanning %} for all your repositories, or for all new repositories within your organization. {% data variables.product.prodname_secret_scanning_caps %} is not available for user account-owned private repositories. For more information, see "[Managing security and analysis settings for your repository](/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository)" and "[Managing security and analysis settings for your organization](/github/setting-up-and-managing-organizations-and-teams/managing-security-and-analysis-settings-for-your-organization)."
71
+
68
72
When you push commits to a private repository with {% data variables.product.prodname_secret_scanning %} enabled, {% data variables.product.product_name %} scans the contents of the commits for secrets.
69
73
70
74
When {% data variables.product.prodname_secret_scanning %} detects a secret in a private repository, {% data variables.product.prodname_dotcom %} sends alerts.
@@ -73,6 +77,8 @@ When {% data variables.product.prodname_secret_scanning %} detects a secret in a
73
77
74
78
- {% data variables.product.prodname_dotcom %} displays an alert in the repository. For more information, see "[Managing alerts from {% data variables.product.prodname_secret_scanning %}](/github/administering-a-repository/managing-alerts-from-secret-scanning)."
75
79
80
+
Repository administrators and organization owners can grant users and team access to {% data variables.product.prodname_secret_scanning %} alerts. For more information, see "[Managing security and analysis settings for your repository](/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts)."
81
+
76
82
{% data variables.product.product_name %} currently scans private repositories for secrets issued by the following service providers.
Copy file name to clipboardExpand all lines: content/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,31 +23,31 @@ versions:
23
23
4. Under "Configure security and analysis features", to the right of the feature, click **Disable** or **Enable**.
24
24

25
25
26
-
### Granting access to {% data variables.product.prodname_dependabot_alerts %}
26
+
### Granting access to security alerts
27
27
28
-
After you enable {% data variables.product.prodname_dependabot_alerts %} for a repository in an organization, organization owners and repository administrators can view the alerts by default. You can give additional teams and people access to the alerts for a repository.
28
+
After you enable {% data variables.product.prodname_dependabot %} or {% data variables.product.prodname_secret_scanning %} alerts for a repository in an organization, organization owners and repository administrators can view the alerts by default. You can give additional teams and people access to the alerts for a repository.
29
29
30
30
{% note %}
31
31
32
-
Organization owners and repository administrators can only grant access to view {% data variables.product.prodname_dependabot_alerts %} to people or teams who have write access to the repo.
32
+
Organization owners and repository administrators can only grant access to view security alerts, such as {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_secret_scanning %} alerts, to people or teams who have write access to the repo.
33
33
34
34
{% endnote %}
35
35
36
36
{% data reusables.repositories.navigate-to-repo %}
37
37
{% data reusables.repositories.sidebar-settings %}
38
38
{% data reusables.repositories.navigate-to-security-and-analysis %}
39
-
4. Under "Dependabot alerts", in the search field, start typing the name of the person or team you'd like to find, then click a name in the list of matches.
40
-

39
+
4. Under "Access to alerts", in the search field, start typing the name of the person or team you'd like to find, then click a name in the list of matches.
40
+

41
41
5. Click **Save changes**.
42
-

42
+

43
43
44
-
### Removing access to {% data variables.product.prodname_dependabot_alerts %}
44
+
### Removing access to security alerts
45
45
46
46
{% data reusables.repositories.navigate-to-repo %}
47
47
{% data reusables.repositories.sidebar-settings %}
48
48
{% data reusables.repositories.navigate-to-security-and-analysis %}
49
-
4. Under "Dependabot alerts", to the right of the person or team whose access you'd like to remove, click {% octicon "x" aria-label="X symbol" %}.
50
-

49
+
4. Under "Access to alerts", to the right of the person or team whose access you'd like to remove, click {% octicon "x" aria-label="X symbol" %}.
50
+

0 commit comments