From c41ab3e8ca8c0fa6f568e82b2ff1dae477e087cf Mon Sep 17 00:00:00 2001
From: Sam Browning <106113886+sabrowning1@users.noreply.github.com>
Date: Tue, 10 Jan 2023 15:58:16 -0500
Subject: [PATCH] Un-revert "Add security overview content for filtering for
teams with write access" (#33711)
---
.../filtering-alerts-in-the-security-overview.md | 15 +++++++--------
.../security-overview-team-write-access.yml | 6 ++++++
2 files changed, 13 insertions(+), 8 deletions(-)
create mode 100644 data/features/security-overview-team-write-access.yml
diff --git a/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md b/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md
index 48e8745d50..8ac7304c20 100644
--- a/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md
+++ b/content/code-security/security-overview/filtering-alerts-in-the-security-overview.md
@@ -44,7 +44,7 @@ In the examples below, replace `:enabled` with `:not-enabled` to see repositorie
| Qualifier | Description |
| -------- | -------- |
-| `code-scanning:enabled` | Display repositories that have set up {% data variables.product.prodname_code_scanning %}. |
+| `code-scanning:enabled` | Display repositories that have set up {% data variables.product.prodname_code_scanning %}. |
| `dependabot:enabled` | Display repositories that have enabled {% data variables.product.prodname_dependabot_alerts %}. |
| `secret-scanning:enabled` | Display repositories that have enabled {% data variables.secret-scanning.alerts %}. {% ifversion security-overview-org-risk-coverage %} |
| `any-feature:enabled` | Display repositories where at least one security feature is enabled. |{% else %}
@@ -79,7 +79,7 @@ These qualifiers are available in the main summary views.
{% ifversion ghec or ghes > 3.4 or ghae > 3.4 %}
## Filter by level of risk for repositories
-The level of risk for a repository is determined by the number and severity of alerts from security features. If one or more security features are not enabled for a repository, the repository will have an unknown level of risk. If a repository has no risks that are detected by security features, the repository will have a clear level of risk.
+The level of risk for a repository is determined by the number and severity of alerts from security features. If one or more security features are not enabled for a repository, the repository will have an unknown level of risk. If a repository has no risks that are detected by security features, the repository will have a clear level of risk.
{% ifversion security-overview-org-risk-coverage %}
These qualifiers are available in the enterprise-level view.
@@ -100,9 +100,9 @@ These qualifiers are available in the enterprise-level view.
| Qualifier | Description |
| -------- | -------- |
-| code-scanning:n | Display repositories that have *n* {% data variables.product.prodname_code_scanning %} alerts. This qualifier can use `=`, `>` and `<` comparison operators. |
-| secret-scanning:n | Display repositories that have *n* {% data variables.secret-scanning.alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
-| dependabot:n | Display repositories that have *n* {% data variables.product.prodname_dependabot_alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
+| `code-scanning:NUMBER` | Display repositories that have NUMBER {% data variables.product.prodname_code_scanning %} alerts. This qualifier can use `=`, `>` and `<` comparison operators. |
+| `secret-scanning:NUMBER` | Display repositories that have NUMBER {% data variables.secret-scanning.alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
+| `dependabot:NUMBER` | Display repositories that have NUMBER {% data variables.product.prodname_dependabot_alerts %}. This qualifier can use `=`, `>` and `<` comparison operators. |
## Filter by team
@@ -111,7 +111,7 @@ These qualifiers are available in the main summary views.
| Qualifier | Description |
| -------- | -------- |
-| team:TEAM-NAME | Displays repositories that *TEAM-NAME* has admin privileges for. |
+| `team:TEAM-NAME` | Displays repositories that TEAM-NAME has {% ifversion security-overview-team-write-access -%} write access or {% endif -%} admin access to. |
## Filter by topic
@@ -119,7 +119,7 @@ These qualifiers are available in the main summary views.
| Qualifier | Description |
| -------- | -------- |
-| topic:TOPIC-NAME | Displays repositories that are classified with *TOPIC-NAME*. |
+| `topic:TOPIC-NAME` | Displays repositories that are classified with TOPIC-NAME. |
{% ifversion security-overview-alert-views %}
@@ -159,4 +159,3 @@ You can filter the view to show {% data variables.product.prodname_dependabot_al
| `secret-type:CUSTOM-PATTERN` | Displays alerts for secrets matching the specified custom pattern. |
For more information, see "[{% data variables.product.prodname_secret_scanning_caps %} patterns](/code-security/secret-scanning/secret-scanning-patterns)."
-
diff --git a/data/features/security-overview-team-write-access.yml b/data/features/security-overview-team-write-access.yml
new file mode 100644
index 0000000000..ea0c55115e
--- /dev/null
+++ b/data/features/security-overview-team-write-access.yml
@@ -0,0 +1,6 @@
+# Reference: #8973
+# Documentation for tweaks to the results of the team filter on the "Security Risk" and "Security Coverage" views
+versions:
+ ghec: '*'
+ ghes: '> 3.8'
+ ghae: '> 3.8'