From c41ab3e8ca8c0fa6f568e82b2ff1dae477e087cf Mon Sep 17 00:00:00 2001 From: Sam Browning <106113886+sabrowning1@users.noreply.github.com> Date: Tue, 10 Jan 2023 15:58:16 -0500 Subject: [PATCH] Un-revert "Add security overview content for filtering for teams with write access" (#33711) --- .../filtering-alerts-in-the-security-overview.md | 15 +++++++-------- .../security-overview-team-write-access.yml | 6 ++++++ 2 files changed, 13 insertions(+), 8 deletions(-) create mode 100644 data/features/security-overview-team-write-access.yml diff --git a/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md b/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md index 48e8745d50..8ac7304c20 100644 --- a/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md +++ b/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md @@ -44,7 +44,7 @@ In the examples below, replace `:enabled` with `:not-enabled` to see repositorie | Qualifier | Description | | -------- | -------- | -| `code-scanning:enabled` | Display repositories that have set up {% data variables.product.prodname_code_scanning %}. | +| `code-scanning:enabled` | Display repositories that have set up {% data variables.product.prodname_code_scanning %}. | | `dependabot:enabled` | Display repositories that have enabled {% data variables.product.prodname_dependabot_alerts %}. | | `secret-scanning:enabled` | Display repositories that have enabled {% data variables.secret-scanning.alerts %}. {% ifversion security-overview-org-risk-coverage %} | | `any-feature:enabled` | Display repositories where at least one security feature is enabled. |{% else %} @@ -79,7 +79,7 @@ These qualifiers are available in the main summary views. {% ifversion ghec or ghes > 3.4 or ghae > 3.4 %} ## Filter by level of risk for repositories -The level of risk for a repository is determined by the number and severity of alerts from security features. If one or more security features are not enabled for a repository, the repository will have an unknown level of risk. If a repository has no risks that are detected by security features, the repository will have a clear level of risk. +The level of risk for a repository is determined by the number and severity of alerts from security features. If one or more security features are not enabled for a repository, the repository will have an unknown level of risk. If a repository has no risks that are detected by security features, the repository will have a clear level of risk. {% ifversion security-overview-org-risk-coverage %} These qualifiers are available in the enterprise-level view. @@ -100,9 +100,9 @@ These qualifiers are available in the enterprise-level view. | Qualifier | Description | | -------- | -------- | -| code-scanning:n | Display repositories that have *n* {% data variables.product.prodname_code_scanning %} alerts. This qualifier can use `=`, `>` and `<` comparison operators. | -| secret-scanning:n | Display repositories that have *n* {% data variables.secret-scanning.alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. | -| dependabot:n | Display repositories that have *n* {% data variables.product.prodname_dependabot_alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. | +| `code-scanning:NUMBER` | Display repositories that have NUMBER {% data variables.product.prodname_code_scanning %} alerts. This qualifier can use `=`, `>` and `<` comparison operators. | +| `secret-scanning:NUMBER` | Display repositories that have NUMBER {% data variables.secret-scanning.alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. | +| `dependabot:NUMBER` | Display repositories that have NUMBER {% data variables.product.prodname_dependabot_alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. | ## Filter by team @@ -111,7 +111,7 @@ These qualifiers are available in the main summary views. | Qualifier | Description | | -------- | -------- | -| team:TEAM-NAME | Displays repositories that *TEAM-NAME* has admin privileges for. | +| `team:TEAM-NAME` | Displays repositories that TEAM-NAME has {% ifversion security-overview-team-write-access -%} write access or {% endif -%} admin access to. | ## Filter by topic @@ -119,7 +119,7 @@ These qualifiers are available in the main summary views. | Qualifier | Description | | -------- | -------- | -| topic:TOPIC-NAME | Displays repositories that are classified with *TOPIC-NAME*. | +| `topic:TOPIC-NAME` | Displays repositories that are classified with TOPIC-NAME. | {% ifversion security-overview-alert-views %} @@ -159,4 +159,3 @@ You can filter the view to show {% data variables.product.prodname_dependabot_al | `secret-type:CUSTOM-PATTERN` | Displays alerts for secrets matching the specified custom pattern. | For more information, see "[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns)." - diff --git a/data/features/security-overview-team-write-access.yml b/data/features/security-overview-team-write-access.yml new file mode 100644 index 0000000000..ea0c55115e --- /dev/null +++ b/data/features/security-overview-team-write-access.yml @@ -0,0 +1,6 @@ +# Reference: #8973 +# Documentation for tweaks to the results of the team filter on the "Security Risk" and "Security Coverage" views +versions: + ghec: '*' + ghes: '> 3.8' + ghae: '> 3.8'