1
0
mirror of synced 2025-12-19 09:57:42 -05:00

Delete remaining 89 mentions of 'gahe' in data/features (#48724)

This commit is contained in:
Peter Bengtsson
2024-01-17 08:00:14 -05:00
committed by GitHub
parent acebb2f52a
commit c216f1915e
93 changed files with 7 additions and 122 deletions

View File

@@ -59,10 +59,9 @@ Before defining a custom pattern, you must ensure that {% data variables.product
{% data reusables.repositories.navigate-to-code-security-and-analysis %}
{% data reusables.repositories.navigate-to-ghas-settings %}
{% data reusables.advanced-security.secret-scanning-new-custom-pattern %}
{% data reusables.advanced-security.secret-scanning-add-custom-pattern-details %}{% ifversion secret-scanning-custom-enterprise-35 or custom-pattern-dry-run-ga %}
{% data reusables.advanced-security.secret-scanning-add-custom-pattern-details %}{% ifversion custom-pattern-dry-run-ga %}
1. When you're ready to test your new custom pattern, to identify matches in the repository without creating alerts, click **Save and dry run**.
{% data reusables.advanced-security.secret-scanning-dry-run-results %}
{%- ifversion secret-scanning-custom-enterprise-35 %}{% indented_data_reference reusables.secret-scanning.beta-dry-runs spaces=3 %}{% endif %}
{% endif %}
{% data reusables.advanced-security.secret-scanning-create-custom-pattern %}{% ifversion secret-scanning-push-protection-custom-patterns %}
1. Optionally, to enable push protection for your custom pattern, click **Enable**.
@@ -125,11 +124,10 @@ Before defining a custom pattern, you must ensure that you enable {% data variab
{% data reusables.repositories.navigate-to-ghas-settings %}
{% data reusables.advanced-security.secret-scanning-new-custom-pattern %}
{% data reusables.advanced-security.secret-scanning-add-custom-pattern-details %}
{%- ifversion secret-scanning-custom-enterprise-35 or custom-pattern-dry-run-ga %}
{%- ifversion custom-pattern-dry-run-ga %}
1. When you're ready to test your new custom pattern, to identify matches in select repositories without creating alerts, click **Save and dry run**.
{% data reusables.advanced-security.secret-scanning-dry-run-select-repos %}
{% data reusables.advanced-security.secret-scanning-dry-run-results %}
{%- ifversion secret-scanning-custom-enterprise-35 %}{% indented_data_reference reusables.secret-scanning.beta-dry-runs spaces=3 %}{% endif %}
{%- endif %}
{% data reusables.advanced-security.secret-scanning-create-custom-pattern %}{% ifversion secret-scanning-push-protection-custom-patterns %}
1. Optionally, to enable push protection for your custom pattern, click **Enable**. For more information, see "[AUTOTITLE](/code-security/secret-scanning/protecting-pushes-with-secret-scanning#enabling-secret-scanning-as-a-push-protection-in-an-organization-for-a-custom-pattern)."
@@ -148,7 +146,7 @@ Before defining a custom pattern, you must ensure that you enable secret scannin
{% note %}
{% ifversion secret-scanning-custom-enterprise-36 or custom-pattern-dry-run-ga %}
{% ifversion custom-pattern-dry-run-ga %}
**Notes:**
- At the enterprise level, only the creator of a custom pattern can edit the pattern, and use it in a dry run.
- {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}
@@ -167,11 +165,10 @@ Before defining a custom pattern, you must ensure that you enable secret scannin
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
1. Under "Secret scanning custom patterns", click **New pattern**.
{% data reusables.advanced-security.secret-scanning-add-custom-pattern-details %}
{%- ifversion secret-scanning-custom-enterprise-36 or custom-pattern-dry-run-ga %}
{%- ifversion custom-pattern-dry-run-ga %}
1. When you're ready to test your new custom pattern, to identify matches in the enterprise without creating alerts, click **Save and dry run**.
{% data reusables.advanced-security.secret-scanning-dry-run-select-enterprise-repos %}
{% data reusables.advanced-security.secret-scanning-dry-run-results %}
{%- ifversion secret-scanning-custom-enterprise-36 %}{% indented_data_reference reusables.secret-scanning.beta-dry-runs spaces=3 %}{% endif %}
{%- endif %}
{% data reusables.advanced-security.secret-scanning-create-custom-pattern %}{% ifversion secret-scanning-push-protection-custom-patterns %}
1. Optionally, to enable push protection for your custom pattern, click **Enable**. For more information, see "[AUTOTITLE](/code-security/secret-scanning/protecting-pushes-with-secret-scanning)."
@@ -184,7 +181,7 @@ After your pattern is created, {% data variables.product.prodname_secret_scannin
When you save a change to a custom pattern, this closes all the {% data variables.secret-scanning.alerts %} that were created using the previous version of the pattern.
{% data reusables.secret-scanning.view-custom-pattern %}
1. Under "{% data variables.product.prodname_secret_scanning_caps %}", to the right of the custom pattern you want to edit, click {% octicon "pencil" aria-label="Edit pattern" %}.
{%- ifversion secret-scanning-custom-enterprise-36 or custom-pattern-dry-run-ga %}
{%- ifversion custom-pattern-dry-run-ga %}
1. When you're ready to test your edited custom pattern, to identify matches without creating alerts, click **Save and dry run**.
{%- endif %}
1. When you have reviewed and tested your changes, click **Publish changes**.{% ifversion secret-scanning-push-protection-custom-patterns %}

View File

@@ -121,7 +121,7 @@ You can enable {% data variables.product.prodname_secret_scanning %} as a push p
{% data reusables.secret-scanning.push-protection-enterprise-note %}
Before enabling push protection for a custom pattern at enterprise level, you must also{% ifversion secret-scanning-custom-enterprise-36 or custom-pattern-dry-run-ga %} test your custom patterns using dry runs. {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}{% else %} test your custom patterns in a repository before defining them for your entire enterprise, as there is no dry-run functionality. That way, you can avoid creating excess false-positive {% data variables.secret-scanning.alerts %}.{% endif %}
Before enabling push protection for a custom pattern at enterprise level, you must also{% ifversion custom-pattern-dry-run-ga %} test your custom patterns using dry runs. {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}{% else %} test your custom patterns in a repository before defining them for your entire enterprise, as there is no dry-run functionality. That way, you can avoid creating excess false-positive {% data variables.secret-scanning.alerts %}.{% endif %}
{% data reusables.enterprise-accounts.access-enterprise %}
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
@@ -130,7 +130,7 @@ Before enabling push protection for a custom pattern at enterprise level, you mu
{% data reusables.enterprise-accounts.advanced-security-policies %}
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
{% data reusables.advanced-security.secret-scanning-edit-custom-pattern %}
{% ifversion secret-scanning-custom-enterprise-36 or custom-pattern-dry-run-ga %}
{% ifversion custom-pattern-dry-run-ga %}
{% note %}
**Note**: At the enterprise level, you can only edit and enable push protection for custom patterns that you created.

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>=3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>= 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>3.9'
ghae: '>3.9'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>= 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.4'
ghae: '>= 3.4'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>3.8'
ghae: '>3.8'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -3,4 +3,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.5'
ghae: '>= 3.5'

View File

@@ -4,4 +4,3 @@
versions:
ghec: '*'
ghes: '>=3.10'
ghae: '>=3.10'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.10'
ghae: '>=3.10'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.10'
ghae: '>=3.10'

View File

@@ -2,4 +2,3 @@
versions:
ghes: '>3.0'
ghec: '*'
ghae: '*'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -1,4 +1,3 @@
versions:
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -1,4 +1,3 @@
# Reference: Issue #6996 ability to show users' first/last name instead of username in issue/PR comment titles for public and internal repos
versions:
ghes: '>=3.6'
ghae: '>=3.6'

View File

@@ -2,4 +2,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>3.7'
ghae: '>3.7'

View File

@@ -3,4 +3,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.11'
ghae: '>=3.11'

View File

@@ -1,4 +1,3 @@
# Ability to create new repository level classic projects
versions:
ghes: '*'
ghae: '*'

View File

@@ -5,4 +5,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '*'
ghae: '*'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.10'
ghae: '>=3.10'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.11'
ghae: '>=3.11'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.10'
ghae: '>=3.10'

View File

@@ -3,4 +3,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.9'
ghae: '>= 3.9'

View File

@@ -5,4 +5,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -5,4 +5,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.9'
ghae: '>=3.9'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.5'
ghae: '>= 3.5'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.8'
ghae: '>= 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>= 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>3.8'
ghae: '>3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.9'
ghae: '>=3.9'

View File

@@ -3,4 +3,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>3.4'
ghae: '>= 3.5'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.9'
ghae: '>= 3.9'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.11'
ghae: '> 3.9'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.5'
ghae: '>= 3.6'

View File

@@ -3,4 +3,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.11'
ghae: '>=3.11'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.5'
ghae: '>= 3.5'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>=3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.5'
ghae: '>= 3.5'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.10'
ghae: '>=3.10'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>= 3.8'

View File

@@ -1,6 +0,0 @@
# Issues: changes to custom patterns for secret scanning
# #6367: updates for the "organization level dry runs (Public Beta)"
# #5499: updates for the "repository level dry runs (Public Beta)"
versions:
ghes: '>3.4 <3.7'
ghae: '>= 3.5'

View File

@@ -1,6 +0,0 @@
# Issues: changes to custom patterns for secret scanning
# #6904: updates for "enterprise account level dry runs (Public Beta)"
# #7297: updates for dry runs on editing patterns (Public Beta)
versions:
ghes: '>3.5 <3.7'
ghae: '>= 3.6'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '> 3.8'
ghae: '> 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.7'
ghae: '>=3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.9'
ghae: '>= 3.9'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.8'
ghae: '>= 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.9'
ghae: '>=3.9'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -3,5 +3,4 @@
versions:
fpt: '*'
ghes: '>=3.6'
ghae: '>= 3.6'
ghec: '*'

View File

@@ -3,5 +3,4 @@
versions:
fpt: '*'
ghes: '>=3.5'
ghae: '>= 3.5'
ghec: '*'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.9'
ghae: '>=3.9'

View File

@@ -1,4 +1,3 @@
# Reference: Issue #6982 Community Contributions to Security Advisories - Enterprise 3.6
versions:
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>= 3.8'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.9'
ghae: '>=3.9'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -3,5 +3,4 @@
versions:
fpt: '*'
ghes: '>=3.3'
ghae: '*'
ghec: '*'

View File

@@ -2,5 +2,4 @@
# Documentation for the addition of repo topic and team filters to the alert-centric views (Dependabot, code scanning, and secret scanning) of the security overview
versions:
ghes: '>3.8'
ghae: '>3.8'
ghec: '*'

View File

@@ -2,5 +2,4 @@
# Documentation for security overview individual views for each type of security alert
versions:
ghes: '> 3.4'
ghae: '>= 3.5'
ghec: '*'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '> 3.3'
ghae: '> 3.3'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.7'
ghae: '>= 3.7'

View File

@@ -3,5 +3,4 @@
# and the initial single-repo enablement panel for security overview coverage view.
versions:
ghes: '> 3.7'
ghae: '> 3.7'
ghec: '*'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '> 3.8'
ghae: '> 3.8'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>= 3.9'
ghae: '>= 3.9'

View File

@@ -5,4 +5,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.7'
ghae: '>= 3.7'

View File

@@ -3,4 +3,3 @@
versions:
ghec: '*'
ghes: '>= 3.8'
ghae: '>= 3.8'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>= 3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>= 3.8'
ghae: '>= 3.8'

View File

@@ -3,4 +3,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.9'
ghae: '>=3.9'

View File

@@ -2,4 +2,3 @@
# Versions for which team discussions is still supported (deprecated for all other versions)
versions:
ghes: '<3.12'
ghae: '*'

View File

@@ -1,4 +1,3 @@
versions:
ghec: '*'
ghes: '>3.7'
ghae: '>3.7'

View File

@@ -5,4 +5,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.6'
ghae: '>= 3.6'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.7'
ghae: '>=3.7'

View File

@@ -4,4 +4,3 @@ versions:
fpt: '*'
ghec: '*'
ghes: '>=3.8'
ghae: '>=3.8'

View File

@@ -198,17 +198,5 @@ describe('liquid template parser', () => {
const outputFpt = await liquid.parseAndRender(featureVersionsTemplate, req.context)
expect(outputFpt.includes('placeholder content')).toBe(true)
})
test('renders in GHAE because feature is available in GHAE', async () => {
req.context = {
currentVersion: 'github-ae@latest',
page: {},
allVersions,
enterpriseServerReleases,
}
await featureVersionsMiddleware(req, null, () => {})
const outputFpt = await liquid.parseAndRender(featureVersionsTemplate, req.context)
expect(outputFpt.includes('placeholder content')).toBe(true)
})
})
})

View File

@@ -376,7 +376,6 @@ describe('Page class', () => {
// the frontmatter GHES `*` is not being overwritten by the placeholder's GHES `<3.0`.
expect(page.applicableVersions.includes('free-pro-team@latest')).toBe(true)
expect(page.applicableVersions.includes(`enterprise-server@${latest}`)).toBe(true)
expect(page.applicableVersions.includes('github-ae@latest')).toBe(true)
expect(page.applicableVersions.includes('feature')).toBe(false)
expect(page.applicableVersions.includes('placeholder')).toBe(false)
})