Un-revert "Add security overview content for filtering for teams with write access" (#33711)
This commit is contained in:
@@ -100,9 +100,9 @@ These qualifiers are available in the enterprise-level view.
|
||||
|
||||
| Qualifier | Description |
|
||||
| -------- | -------- |
|
||||
| <code>code-scanning:<em>n</em></code> | Display repositories that have *n* {% data variables.product.prodname_code_scanning %} alerts. This qualifier can use `=`, `>` and `<` comparison operators. |
|
||||
| <code>secret-scanning:<em>n</em></code> | Display repositories that have *n* {% data variables.secret-scanning.alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
|
||||
| <code>dependabot:<em>n</em></code> | Display repositories that have *n* {% data variables.product.prodname_dependabot_alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
|
||||
| `code-scanning:NUMBER` | Display repositories that have NUMBER {% data variables.product.prodname_code_scanning %} alerts. This qualifier can use `=`, `>` and `<` comparison operators. |
|
||||
| `secret-scanning:NUMBER` | Display repositories that have NUMBER {% data variables.secret-scanning.alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
|
||||
| `dependabot:NUMBER` | Display repositories that have NUMBER {% data variables.product.prodname_dependabot_alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
|
||||
|
||||
|
||||
## Filter by team
|
||||
@@ -111,7 +111,7 @@ These qualifiers are available in the main summary views.
|
||||
|
||||
| Qualifier | Description |
|
||||
| -------- | -------- |
|
||||
| <code>team:<em>TEAM-NAME</em></code> | Displays repositories that *TEAM-NAME* has admin privileges for. |
|
||||
| `team:TEAM-NAME` | Displays repositories that TEAM-NAME has {% ifversion security-overview-team-write-access -%} write access or {% endif -%} admin access to. |
|
||||
|
||||
## Filter by topic
|
||||
|
||||
@@ -119,7 +119,7 @@ These qualifiers are available in the main summary views.
|
||||
|
||||
| Qualifier | Description |
|
||||
| -------- | -------- |
|
||||
| <code>topic:<em>TOPIC-NAME</em></code> | Displays repositories that are classified with *TOPIC-NAME*. |
|
||||
| `topic:TOPIC-NAME` | Displays repositories that are classified with TOPIC-NAME. |
|
||||
|
||||
{% ifversion security-overview-alert-views %}
|
||||
|
||||
@@ -159,4 +159,3 @@ You can filter the view to show {% data variables.product.prodname_dependabot_al
|
||||
| `secret-type:CUSTOM-PATTERN` | Displays alerts for secrets matching the specified custom pattern. |
|
||||
|
||||
For more information, see "[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns)."
|
||||
|
||||
|
||||
6
data/features/security-overview-team-write-access.yml
Normal file
6
data/features/security-overview-team-write-access.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
# Reference: #8973
|
||||
# Documentation for tweaks to the results of the team filter on the "Security Risk" and "Security Coverage" views
|
||||
versions:
|
||||
ghec: '*'
|
||||
ghes: '> 3.8'
|
||||
ghae: '> 3.8'
|
||||
Reference in New Issue
Block a user