Skip to content

Commit 0a9b458

Browse files
authored
Merge pull request #35588 from github/repo-sync
Repo sync
2 parents b8d2c39 + 772a882 commit 0a9b458

File tree

8 files changed

+12
-7
lines changed

8 files changed

+12
-7
lines changed

content/admin/configuring-settings/configuring-github-connect/enabling-dependabot-for-your-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ Before you can enable {% data variables.product.prodname_dependabot_alerts %}, y
8585
> [!TIP]
8686
> We recommend configuring {% data variables.product.prodname_dependabot_alerts %} without notifications for the first few days to avoid an overload of realtime notifications. After a few days, you can enable notifications to receive {% data variables.product.prodname_dependabot_alerts %} as usual.
8787
88-
You can now enable {% data variables.product.prodname_dependabot_alerts %} for all existing or new private and internal repositories in the enterprise settings page for "Code security and analysis." Alternatively, repository administrators and organization owners can enable {% data variables.product.prodname_dependabot_alerts %} for each repository and organization. Public repositories are always enabled by default. For more information, see "[AUTOTITLE](/enterprise-server@latest/code-security/dependabot/dependabot-alerts/configuring-dependabot-alerts)."
88+
You can now enable {% data variables.product.prodname_dependabot_alerts %} for all existing or new private and internal repositories in the enterprise settings page for {% ifversion code-security-wording-only-enterprise %}"Code security."{% else %}"Code security and analysis."{% endif %} Alternatively, repository administrators and organization owners can enable {% data variables.product.prodname_dependabot_alerts %} for each repository and organization. Public repositories are always enabled by default. For more information, see "[AUTOTITLE](/enterprise-server@latest/code-security/dependabot/dependabot-alerts/configuring-dependabot-alerts)."
8989

9090
{% ifversion dependabot-updates-github-connect %}
9191

content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Across all organizations owned by your enterprise, you can control whether organ
5555

5656
{% data reusables.enterprise-accounts.access-enterprise %}
5757
{% data reusables.enterprise-accounts.policies-tab %}
58-
1. Under "{% octicon "law" aria-hidden="true" %} Policies", click **Code security and analysis**.
58+
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
5959
1. Under "Dependency insights", review the information about changing the setting.
6060
1. {% data reusables.enterprise-accounts.view-current-policy-config-orgs %}
6161
1. Under "Dependency insights", select the dropdown menu and click a policy.

content/code-security/code-scanning/troubleshooting-code-scanning/results-different-than-expected.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ redirect_from:
1313

1414
If your {% data variables.product.prodname_code_scanning %} results are different than you expected, you may have both default and advanced setup configured for your repository. When you enable default setup, this disables the existing {% data variables.product.prodname_codeql %} workflow file and blocks any {% data variables.product.prodname_codeql %} API analysis from uploading results.
1515

16-
To check if default setup is enabled, navigate to the main page of the repository, then click **{% octicon "gear" aria-hidden="true" %} Settings**. In the "Security" section of the sidebar, click **{% octicon "codescan" aria-hidden="true" %} {% ifversion code-security-wording-only %}Code security{% else %}Code security and analysis{% endif %}. In the "{% data variables.product.prodname_code_scanning_caps %}" section of the page, next to "{% data variables.product.prodname_codeql %} analysis", click {% octicon "kebab-horizontal" aria-label="Menu" %}. If there is a **{% octicon "workflow" aria-hidden="true" %} Switch to advanced** option, you are currently using default setup.
16+
To check if default setup is enabled, navigate to the main page of the repository, then click **{% octicon "gear" aria-hidden="true" %} Settings**. In the "Security" section of the sidebar, click **{% octicon "codescan" aria-hidden="true" %} {% ifversion code-security-wording-only %}Code security{% else %}Code security and analysis{% endif %}**. In the "{% data variables.product.prodname_code_scanning_caps %}" section of the page, next to "{% data variables.product.prodname_codeql %} analysis", click {% octicon "kebab-horizontal" aria-label="Menu" %}. If there is a **{% octicon "workflow" aria-hidden="true" %} Switch to advanced** option, you are currently using default setup.
1717

1818
If you want to return to using advanced setup and get {% data variables.product.prodname_code_scanning %} results from your custom workflow file, click **{% octicon "stop" aria-hidden="true" %} Disable {% data variables.product.prodname_codeql %}** to disable default setup. Then you should re-enable your pre-existing workflows to start triggering and uploading results from advanced setup. For more information, see "[AUTOTITLE](/actions/managing-workflow-runs/disabling-and-enabling-a-workflow)" and "[AUTOTITLE](/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/configuring-advanced-setup-for-code-scanning)."
1919

content/code-security/dependabot/dependabot-alerts/configuring-dependabot-alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ You can enable or disable {% data variables.product.prodname_dependabot_alerts %
130130
{% ifversion dependabot-alerts-enterprise-enablement or ghes %}
131131
{% data reusables.enterprise-accounts.access-enterprise %}
132132
{% data reusables.enterprise-accounts.settings-tab %}
133-
1. In the left sidebar, click **Code security and analysis**.
133+
1. In the left sidebar, click {% ifversion code-security-wording-only-enterprise %}**Code security**{% else %}**Code security and analysis**{% endif %}.
134134
1. In the "{% data variables.product.prodname_dependabot %}" section, to the right of {% data variables.product.prodname_dependabot_alerts %}, click **Disable all** or **Enable all**.
135135
1. Optionally, select **Automatically enable for new repositories** to enable {% data variables.product.prodname_dependabot_alerts %} by default for your organizations' new repositories.
136136
{% endif %}

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ Before defining a custom pattern, you must ensure that you enable secret scannin
148148
{% data reusables.enterprise-accounts.access-enterprise %}
149149
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
150150
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
151-
1. Under "Code security and analysis", click **Security features**.{% else %}
151+
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.{% else %}
152152
{% data reusables.enterprise-accounts.advanced-security-policies %}
153153
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
154154
1. Under "Secret scanning custom patterns", click **New pattern**.

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ Before enabling push protection for a custom pattern at enterprise level, you mu
5757
{% data reusables.enterprise-accounts.access-enterprise %}
5858
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
5959
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
60-
1. Under "Code security and analysis", click **Security features**.{% else %}
60+
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.{% else %}
6161
{% data reusables.enterprise-accounts.advanced-security-policies %}
6262
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
6363
{% data reusables.advanced-security.secret-scanning-edit-custom-pattern %}
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Reference: 16625
2+
3+
versions:
4+
ghec: '*'
5+
ghes: '>= 3.15'
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1. Under {% octicon "law" aria-hidden="true" %} "Policies", click **Code security and analysis**.
1+
1. Under {% octicon "law" aria-hidden="true" %} "Policies", click {% ifversion code-security-wording-only-enterprise %}**Code security**{% else %}**Code security and analysis**{% endif %}.

0 commit comments

Comments
 (0)