Secret scanning: update permission and product callouts (#52473)
This commit is contained in:
@@ -0,0 +1,7 @@
|
||||
{%- ifversion fpt or ghec %}
|
||||
|
||||
{% data variables.secret-scanning.partner_alerts_caps %} runs by default on the following repositories:
|
||||
|
||||
* Public repositories and public npm packages on {% data variables.product.prodname_dotcom %}
|
||||
|
||||
{% endif %}
|
||||
@@ -1,11 +1,14 @@
|
||||
{%- ifversion fpt or ghec %}
|
||||
{% data variables.secret-scanning.partner_alerts_caps %} runs automatically on public repositories and public npm packages to notify service providers about leaked secrets on {% data variables.product.prodname_dotcom %}.
|
||||
{% data variables.product.prodname_secret_scanning_caps %} is available for the following repositories:
|
||||
|
||||
{% data variables.secret-scanning.user_alerts_caps %} are available for {% ifversion ghec %}user-owned {% endif %}public repositories for free. Organizations using {% data variables.product.prodname_ghe_cloud %} with a license for {% data variables.product.prodname_GH_advanced_security %} can also enable {% data variables.secret-scanning.user_alerts %} on their private and internal repositories. {% data reusables.secret-scanning.secret-scanning-user-owned-repos-beta %}
|
||||
{% ifversion fpt or ghec %}
|
||||
|
||||
{%- elsif ghes %}
|
||||
{% data variables.product.prodname_secret_scanning_caps %} is available for organization-owned repositories{% ifversion secret-scanning-user-owned-repos %}, and in {% data variables.release-phases.public_preview %} for user-owned repositories{% endif %} in {% data variables.product.product_name %} if your enterprise has a license for {% data variables.product.prodname_GH_advanced_security %}.
|
||||
* Public repositories (for free)
|
||||
* Private and internal repositories in organizations using {% data variables.product.prodname_ghe_cloud %} with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled{% ifversion secret-scanning-user-owned-repos %}
|
||||
* User-owned repositories for {% data variables.product.prodname_ghe_cloud %} with {% data variables.product.prodname_emus %}{% endif %}
|
||||
|
||||
{%- endif %} {% data reusables.advanced-security.more-info-ghas-secret-scanning %}
|
||||
{% elsif ghes %}
|
||||
|
||||
{% data reusables.advanced-security.ghas-trial %}
|
||||
* Organization-owned repositories with [{% data variables.product.prodname_GH_advanced_security %}](/get-started/learning-about-github/about-github-advanced-security) enabled
|
||||
* {% ifversion secret-scanning-user-owned-repos %}User-owned repositories{% endif %} for an enterprise with {% data variables.product.prodname_GH_advanced_security %} enabled
|
||||
|
||||
{% endif %}
|
||||
|
||||
1
data/reusables/permissions/secret-scanning-alerts.md
Normal file
1
data/reusables/permissions/secret-scanning-alerts.md
Normal file
@@ -0,0 +1 @@
|
||||
Repository owners, organization owners, security managers, and users with the **admin** role
|
||||
Reference in New Issue
Block a user