diff --git a/content/copilot/configuring-github-copilot/configuring-github-copilot-in-your-environment.md b/content/copilot/configuring-github-copilot/configuring-github-copilot-in-your-environment.md index 5b351c7ee4..c6b1d36fdb 100644 --- a/content/copilot/configuring-github-copilot/configuring-github-copilot-in-your-environment.md +++ b/content/copilot/configuring-github-copilot/configuring-github-copilot-in-your-environment.md @@ -3,7 +3,7 @@ title: Configuring GitHub Copilot in your environment shortTitle: In your environment intro: 'You can enable, configure, or disable {% data variables.product.prodname_copilot %} in a supported IDE.' product: '{% data reusables.gated-features.copilot %}' -redirect_from: +redirect_from: - /copilot/configuring-github-copilot/configuring-github-copilot-in-visual-studio - /copilot/configuring-github-copilot/configuring-github-copilot-in-visual-studio-code - /copilot/configuring-github-copilot/configuring-github-copilot-in-a-jetbrains-ide @@ -20,13 +20,11 @@ versions: If you use a JetBrains IDE, {% data variables.product.prodname_copilot %} can autocomplete code as you type. After installation, you can enable or disable {% data variables.product.prodname_copilot %}, and you can configure advanced settings within your IDE or on {% data variables.product.prodname_dotcom_the_website %}. This article describes how to configure {% data variables.product.prodname_copilot %} in the IntelliJ IDE, but the user interfaces of other JetBrains IDEs may differ. -{% data reusables.copilot.dotcom-settings %} - ## Prerequisites To configure {% data variables.product.prodname_copilot %} in a JetBrains IDE, you must install the {% data variables.product.prodname_copilot %} plugin. For more information, see "[AUTOTITLE](/copilot/getting-started-with-github-copilot?tool=jetbrains)." -## Keyboard shortcuts for {% data variables.product.prodname_copilot %} +## Using or rebinding keyboard shortcuts for {% data variables.product.prodname_copilot %} You can use the default keyboard shortcuts for inline suggestions in your JetBrains IDE when using {% data variables.product.prodname_copilot %}. Alternatively, you can rebind the shortcuts to your preferred keyboard shortcuts for each specific command. For more information on rebinding keyboard shortcuts in your JetBrains IDE, see the JetBrains documentation. For example, you can view the [IntelliJ IDEA](https://www.jetbrains.com/help/idea/mastering-keyboard-shortcuts.html#choose-keymap) documentation. @@ -110,17 +108,19 @@ If you use {% data variables.product.prodname_vs %}, {% data variables.product.p To configure {% data variables.product.prodname_copilot %} in {% data variables.product.prodname_vs %}, you must install the {% data variables.product.prodname_copilot %} plugin. For more information, see "[AUTOTITLE](/copilot/getting-started-with-github-copilot?tool=visualstudio)." -## Keyboard shortcuts for {% data variables.product.prodname_copilot %} +## Using or rebinding keyboard shortcuts for {% data variables.product.prodname_copilot %} You can use the default keyboard shortcuts in {% data variables.product.prodname_vs %} when using {% data variables.product.prodname_copilot %}. Alternatively, you can rebind the shortcuts in the Tools settings for {% data variables.product.prodname_vs %} using your preferred keyboard shortcuts for each specific command. You can search for each keyboard shortcut by its command name in the Keyboard Shortcuts editor. +### Using default keyboard shortcuts + | Action | Shortcut | Command name | |:---|:---|:---| |Show next inline suggestion|Alt+.|Tools.Nextsuggestion| |Show previous inline suggestion|Alt+,|Tools.Previoussuggestion| |Trigger inline suggestion|Ctrl+Alt+\|Edit.Copilot.TriggerInlineSuggestion| -## Rebinding keyboard shortcuts +### Rebinding keyboard shortcuts If you don't want to use the default keyboard shortcuts in {% data variables.product.prodname_vs %} when using {% data variables.product.prodname_copilot %}, you can rebind the shortcuts in the Keyboard editor using your preferred keyboard shortcuts for each specific command. @@ -164,7 +164,9 @@ To configure {% data variables.product.prodname_copilot %} in {% data variables. ## Keyboard shortcuts for {% data variables.product.prodname_copilot %} -You can use the default keyboard shortcuts in {% data variables.product.prodname_vscode %} when using {% data variables.product.prodname_copilot %}. Alternatively, you can rebind the shortcuts in the Keyboard Shortcuts editor using your preferred keyboard shortcuts for each specific command. You can search for each keyboard shortcut by command name in the Keyboard Shortcuts editor. +You can use the default keyboard shortcuts in {% data variables.product.prodname_vscode %} when using {% data variables.product.prodname_copilot %}. Alternatively, you can rebind the shortcuts in the Keyboard Shortcuts editor using your preferred keyboard shortcuts for each specific command. For more information, see "[Rebinding keyboard shortcuts](/copilot/configuring-github-copilot/configuring-github-copilot-in-your-environment?tool=vscode#rebinding-keyboard-shortcuts-1)." + +You can search for each keyboard shortcut by command name in the Keyboard Shortcuts editor. ### Keyboard shortcuts for macOS @@ -329,6 +331,10 @@ For guidance on configuring {% data variables.product.prodname_copilot %} in Vim :help copilot +## Rebinding keyboard shortcuts + +You can rebind the keyboard shortcuts in Vim/Neovim when using {% data variables.product.prodname_copilot %} to use your preferred keyboard shortcuts for each specific command. For more information, see the [Map](https://neovim.io/doc/user/map.html) article in the Neovim documentation. + {% data reusables.copilot.dotcom-settings %} {% endvimneovim %} diff --git a/data/release-notes/enterprise-server/3-5/17.yml b/data/release-notes/enterprise-server/3-5/17.yml index ea3731c5d8..531eae4e3e 100644 --- a/data/release-notes/enterprise-server/3-5/17.yml +++ b/data/release-notes/enterprise-server/3-5/17.yml @@ -1,8 +1,6 @@ date: '2023-05-09' sections: security_fixes: - - | - **HIGH:** Updated Git to include fixes from 2.39.2, which address [CVE-2023-22490](https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q) and [CVE-2023-23946](https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh). - | **MEDIUM**: Updated Git to include fixes from 2.40.1. For more information, see [Git security vulnerabilities announced](https://github.blog/2023-04-25-git-security-vulnerabilities-announced-4/) on the GitHub Blog. bugs: diff --git a/data/release-notes/enterprise-server/3-5/19.yml b/data/release-notes/enterprise-server/3-5/19.yml index bbae0d6ab8..dcd98ecb2e 100644 --- a/data/release-notes/enterprise-server/3-5/19.yml +++ b/data/release-notes/enterprise-server/3-5/19.yml @@ -1,8 +1,6 @@ date: '2023-06-20' sections: security_fixes: - - | - **HIGH:** Updated Git to include fixes from 2.39.2, which address [CVE-2023-22490](https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q) and [CVE-2023-23946](https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh). - | **MEDIUM**: Scoped installation tokens for a GitHub App kept approved permissions after the permissions on the integration installation were downgraded or removed. GitHub has requested CVE ID [CVE-2023-23765](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23765) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com). - | diff --git a/data/release-notes/enterprise-server/3-6/13.yml b/data/release-notes/enterprise-server/3-6/13.yml index 3446bf2340..1b84aad712 100644 --- a/data/release-notes/enterprise-server/3-6/13.yml +++ b/data/release-notes/enterprise-server/3-6/13.yml @@ -1,8 +1,6 @@ date: '2023-05-09' sections: security_fixes: - - | - **HIGH:** Updated Git to include fixes from 2.39.2, which address [CVE-2023-22490](https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q) and [CVE-2023-23946](https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh). - | **MEDIUM**: Updated Git to include fixes from 2.40.1. For more information, see [Git security vulnerabilities announced](https://github.blog/2023-04-25-git-security-vulnerabilities-announced-4/) on the GitHub Blog. bugs: diff --git a/data/release-notes/enterprise-server/3-6/15.yml b/data/release-notes/enterprise-server/3-6/15.yml index d69f6b4f48..8625d9fa70 100644 --- a/data/release-notes/enterprise-server/3-6/15.yml +++ b/data/release-notes/enterprise-server/3-6/15.yml @@ -1,8 +1,6 @@ date: '2023-06-20' sections: security_fixes: - - | - **HIGH:** Updated Git to include fixes from 2.39.2, which address [CVE-2023-22490](https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q) and [CVE-2023-23946](https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh). - | If a user's request to the instance's API included authentication credentials within a URL parameter, administrators could see the credentials in JSON within the instance's audit log. - Packages have been updated to the latest security versions. diff --git a/data/release-notes/enterprise-server/3-7/10.yml b/data/release-notes/enterprise-server/3-7/10.yml index 341a8d58ce..d02602d7e2 100644 --- a/data/release-notes/enterprise-server/3-7/10.yml +++ b/data/release-notes/enterprise-server/3-7/10.yml @@ -1,8 +1,6 @@ date: '2023-05-09' sections: security_fixes: - - | - **HIGH:** Updated Git to include fixes from 2.39.2, which address [CVE-2023-22490](https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q) and [CVE-2023-23946](https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh). - | **MEDIUM**: Updated Git to include fixes from 2.40.1. For more information, see [Git security vulnerabilities announced](https://github.blog/2023-04-25-git-security-vulnerabilities-announced-4/) on the GitHub Blog. bugs: diff --git a/data/release-notes/enterprise-server/3-7/12.yml b/data/release-notes/enterprise-server/3-7/12.yml index eb7a1ce779..a0797d7126 100644 --- a/data/release-notes/enterprise-server/3-7/12.yml +++ b/data/release-notes/enterprise-server/3-7/12.yml @@ -1,8 +1,6 @@ date: '2023-06-20' sections: security_fixes: - - | - **HIGH:** Updated Git to include fixes from 2.39.2, which address [CVE-2023-22490](https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q) and [CVE-2023-23946](https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh). - | **MEDIUM**: Updated Git to include fixes from [2.40.1](https://github.blog/2023-04-25-git-security-vulnerabilities-announced-4/). - |