1
0
mirror of synced 2025-12-25 02:17:36 -05:00

Merge branch 'main' into patch-2

This commit is contained in:
Ramya Parimi
2021-08-04 08:14:13 -05:00
committed by GitHub
3 changed files with 36 additions and 11 deletions

View File

@@ -79,7 +79,8 @@ This procedure demonstrates how to create the service account for your GKE integ
$ gcloud projects add-iam-policy-binding $GKE_PROJECT \
--member=serviceAccount:$SA_EMAIL \
--role=roles/container.admin \
--role=roles/storage.admin
--role=roles/storage.admin \
--role=roles/container.clusterViewer
```
{% endraw %}
1. Download the JSON keyfile for the service account:
@@ -88,7 +89,7 @@ This procedure demonstrates how to create the service account for your GKE integ
$ gcloud iam service-accounts keys create key.json --iam-account=$SA_EMAIL
```
{% endraw %}
1. Store the project ID as a secret named `GKE_PROJECT`:
1. Store the service account key as a secret named `GKE_SA_KEY`:
{% raw %}
```
$ export GKE_SA_KEY=$(cat key.json | base64)

View File

@@ -33,6 +33,7 @@ When you enable {% data variables.product.prodname_GH_advanced_security %} for y
- {% data variables.product.prodname_code_scanning_capc %}, see "[Configuring {% data variables.product.prodname_code_scanning %} for your appliance](/admin/advanced-security/configuring-code-scanning-for-your-appliance#prerequisites-for-code-scanning)."
- {% data variables.product.prodname_secret_scanning_caps %}, see "[Configuring {% data variables.product.prodname_secret_scanning %} for your appliance](/admin/advanced-security/configuring-secret-scanning-for-your-appliance#prerequisites-for-secret-scanning)."{% endif %}
- {% data variables.product.prodname_dependabot %}, see "[Enabling alerts for vulnerable dependencies on {% data variables.product.prodname_ghe_server %}](/admin/configuration/managing-connections-between-github-enterprise-server-and-github-enterprise-cloud/enabling-alerts-for-vulnerable-dependencies-on-github-enterprise-server)."
## Checking whether your license includes {% data variables.product.prodname_GH_advanced_security %}
@@ -72,22 +73,45 @@ When {% data variables.product.product_name %} has finished restarting, you're r
You can enable or disable features programmatically on {% data variables.product.product_location %}. For more information about the administrative shell and command-line utilities for {% data variables.product.prodname_ghe_server %}, see "[Accessing the administrative shell (SSH)](/admin/configuration/accessing-the-administrative-shell-ssh)" and "[Command-line utilities](/admin/configuration/command-line-utilities#ghe-config)."
For example, you can enable {% data variables.product.prodname_code_scanning %} with your infrastructure-as-code tooling when you deploy an instance for staging or disaster recovery.
For example, you can enable any {% data variables.product.prodname_GH_advanced_security %} feature with your infrastructure-as-code tooling when you deploy an instance for staging or disaster recovery.
1. SSH into {% data variables.product.product_location %}.
1. Enable {% data variables.product.prodname_code_scanning %}.
1. Enable features for {% data variables.product.prodname_GH_advanced_security %}.
- To enable {% data variables.product.prodname_code_scanning_capc %}, enter the following commands.
```shell
ghe-config app.minio.enabled true
ghe-config app.code-scanning.enabled true
ghe-config app.code-scanning.enabled true
```
2. Optionally, disable {% data variables.product.prodname_code_scanning %}.
- To enable {% data variables.product.prodname_secret_scanning_caps %}, enter the following command.
```shell
ghe-config app.secret-scanning.enabled true
```
- To enable {% data variables.product.prodname_dependabot %}, enter the following commands.
```shell
ghe-config app.github.dependency-graph-enabled true
ghe-config app.github.vulnerability-alerting-and-settings-enabled true
```
2. Optionally, disable features for {% data variables.product.prodname_GH_advanced_security %}.
- To disable {% data variables.product.prodname_code_scanning %}, enter the following commands.
```shell
ghe-config app.minio.enabled false
ghe-config app.code-scanning.enabled false
```
- To disable {% data variables.product.prodname_secret_scanning %}, enter the following command.
```shell
ghe-config app.secret-scanning.enabled false
```
- To disable {% data variables.product.prodname_dependabot %}, enter the following commands.
```shell
ghe-config app.github.dependency-graph-enabled false
ghe-config app.github.vulnerability-alerting-and-settings-enabled false
```
3. Apply the configuration.
```shell
ghe-config-apply
```
{% ifversion ghes > 2.22 %}To enable and disable {% data variables.product.prodname_secret_scanning %} in the same way, set: `ghe-config app.secret-scanning.enabled` true or false and apply the configuration.{% endif %}
ghe-config-apply
```

View File

@@ -1 +1 @@
When you use expressions in an `if` conditional, you may omit the expression syntax ({% raw %}`${{ }}`{% endraw %}) because {% data variables.product.prodname_dotcom %} automatically evaluates the `if` conditional as an expression, unless the expression contains any operators. If the expression contains any operators, the expression must be contained within {% raw %}`${{ }}`{% endraw %} to explicitly mark it for evaluation.
When you use expressions in an `if` conditional, you may omit the expression syntax ({% raw %}`${{ }}`{% endraw %}) because {% data variables.product.prodname_dotcom %} automatically evaluates the `if` conditional as an expression.