Skip to content

Commit c324c50

Browse files
CopilotaaronwaggenerCopilot
authored
Remove Multi-part secrets section from secret scanning patterns docs (#60354)
Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: aaronwaggener <73763104+aaronwaggener@users.noreply.github.com> Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
1 parent 5f05d08 commit c324c50

File tree

4 files changed

+0
-19
lines changed

4 files changed

+0
-19
lines changed

content/code-security/reference/secret-security/supported-secret-scanning-patterns.md

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -142,18 +142,6 @@ Precision levels are estimated based on the pattern type's typical false positiv
142142

143143
Service providers update the patterns used to generate tokens periodically and may support more than one version of a token. Push protection only supports the most recent token versions that {% data variables.product.prodname_secret_scanning %} can identify with confidence. This avoids push protection blocking commits unnecessarily when a result may be a false positive, which is more likely to happen with legacy tokens.<!-- markdownlint-disable-line MD053 -->
144144

145-
#### Multi-part secrets
146-
147-
<a name="multi-part-secrets"></a>
148-
149-
By default, {% data variables.product.prodname_secret_scanning %} supports validation for pair-matched access keys and key IDs.
150-
151-
{% data variables.product.prodname_secret_scanning_caps %} also supports validation for individual key IDs for Amazon AWS Access Key IDs, in addition to existing pair matching.
152-
153-
A key ID will show as active if {% data variables.product.prodname_secret_scanning %} confirms the key ID exists, regardless of whether or not a corresponding access key is found. The key ID will show as `inactive` if it's invalid (for example, if it is not a real key ID).
154-
155-
Where a valid pair is found, the {% data variables.product.prodname_secret_scanning %} alerts will be linked.<!-- markdownlint-disable-line MD053 -->
156-
157145
## Further reading
158146

159147
* [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/about-alerts)

src/article-api/transformers/secret-scanning-transformer.ts

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,6 @@ export class SecretScanningTransformer implements PageTransformer {
5151
if (entry.isduplicate) {
5252
entry.secretType += ' <br/><a href="#token-versions">Token versions</a>'
5353
}
54-
if (entry.ismultipart) {
55-
entry.secretType += ' <br/><a href="#multi-part-secrets">Multi-part secrets</a>'
56-
}
5754
}
5855

5956
context.secretScanningData = data

src/secret-scanning/middleware/secret-scanning.ts

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -57,9 +57,6 @@ export default async function secretScanning(
5757
if (entry.isduplicate) {
5858
entry.secretType += ' <br/><a href="#token-versions">Token versions</a>'
5959
}
60-
if (entry.ismultipart) {
61-
entry.secretType += ' <br/><a href="#multi-part-secrets">Multi-part secrets</a>'
62-
}
6360
}
6461

6562
return next()

src/types/types.ts

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,6 @@ export type SecretScanningData = {
328328
hasPushProtection: boolean
329329
hasValidityCheck: boolean | string
330330
hasExtendedMetadata?: boolean
331-
ismultipart?: boolean
332331
base64Supported: boolean
333332
isduplicate: boolean
334333
}

0 commit comments

Comments
 (0)