Skip to content

Commit 67b0298

Browse files
authored
Merge pull request #38490 from github/repo-sync
Repo sync
2 parents 4ccaec0 + ee34254 commit 67b0298

File tree

7 files changed

+49
-21
lines changed

7 files changed

+49
-21
lines changed

content/billing/managing-your-billing/managing-your-payment-and-billing-information.md

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,10 @@ redirect_from:
1010
- /billing/using-the-billing-platform/adding-information-to-your-receipts
1111
- /billing/using-the-billing-platform/setting-your-billing-email
1212
- /billing/using-the-new-billing-platform/managing-your-payment-and-billing-information
13+
- /billing/managing-your-github-billing-settings/adding-or-editing-a-payment-method
14+
- /billing/managing-your-github-billing-settings/adding-information-to-your-receipts
15+
- /billing/managing-your-github-billing-settings/setting-your-billing-email
16+
- /billing/managing-your-github-billing-settings/viewing-your-payment-history-and-receipts
1317
type: how_to
1418
topics:
1519
- Enterprise
@@ -101,18 +105,26 @@ You can view and edit your billing information, update your payment method, and
101105

102106
You can view your payment history, including the date, amount, and payment method. You can also download past payments.
103107

104-
1. Display the **Billing & Licensing** section of the sidebar of the {% data variables.enterprise.enterprise_or_org %} settings.
108+
1. Display the **Billing and Licensing** {% ifversion fpt %}section of the sidebar of the organization settings{% else %}page for the enterprise{% endif %}.
105109
1. Click **Payment history**.
106110

107-
{% ifversion ghec %}
108-
109111
## Managing billing contacts
110112

111113
You can add an email address to receive billing notifications regarding payments and budget threshold alerts.
112114

113-
1. Display the **Billing & Licensing** section of the sidebar of the enterprise settings.
115+
{% ifversion fpt %}
116+
117+
1. Display the **Billing and Licensing** section of the sidebar of the organization settings.
118+
1. Click **Additional billing details**.
119+
1. In the table of "Email recipients":
120+
* Click **Add** and follow the prompt to add a new billing contact.
121+
* Use the **Edit** drop-down for a contact to either remove the contact or make that contact the primary billing contact.
122+
123+
{% else %}
124+
125+
1. Display the **Billing and Licensing** page for the enterprise.
114126
1. Click **Billing contacts**.
115127
1. Click **Add** in the upper-right corner and follow the prompt.
116-
1. Click {% octicon "pencil" aria-label="The edit icon" %} to edit the primary billing contact or {% octicon "kebab-horizontal" aria-label="Show options" %} to either remove or make a contact the primary billing contact.
128+
1. Click {% octicon "pencil" aria-label="The edit icon" %} to edit the primary billing contact or {% octicon "kebab-horizontal" aria-label="Show options" %} to either remove a contact or make a contact the primary billing contact.
117129

118130
{% endif %}

content/code-security/secret-scanning/managing-alerts-from-secret-scanning/about-alerts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,12 +25,12 @@ allowTitleToDifferFromFilename: true
2525

2626
When {% data variables.product.company_short %} detects a supported secret in a repository that has {% data variables.product.prodname_secret_scanning %} enabled, a {% ifversion fpt or ghec %}user {% else %}{% data variables.product.prodname_secret_scanning %}{% endif %} alert is generated and displayed in the **Security** tab of the repository.
2727

28-
{% ifversion fpt or ghec %}User {% else %}{% data variables.product.prodname_secret_scanning %} {% endif %}alerts can be of the following types:
28+
{% ifversion fpt or ghec %}User {% else %}{% data variables.product.prodname_secret_scanning_caps %} {% endif %}alerts can be of the following types:
2929

3030
* {% ifversion secret-scanning-alert-experimental-list %}Default{% else %}High confidence{% endif %} alerts, which relate to supported patterns and specified custom patterns.
31-
* {% ifversion secret-scanning-alert-experimental-list %}Experimental{% else %}Other{% endif %} alerts, which can have a higher ratio of false positives or secrets used in tests.
31+
* {% ifversion secret-scanning-generic-tab %}Generic{% elsif ghes = 3.16 %}Experimental{% else %}Other{% endif %} alerts, which can have a higher ratio of false positives or secrets used in tests.
3232

33-
{% data variables.product.prodname_dotcom %} displays {% ifversion secret-scanning-alert-experimental-list %}experimental{% else %}these "other"{% endif %} alerts in a different list to {% ifversion secret-scanning-alert-experimental-list %}default{% else %}high confidence{% endif %} alerts, making triaging a better experience for users. For more information, see [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/viewing-alerts).
33+
{% data variables.product.prodname_dotcom %} displays {% ifversion secret-scanning-generic-tab %}generic{% elsif ghes = 3.16 %}experimental{% else %}these "other"{% endif %} alerts in a different list to {% ifversion secret-scanning-alert-experimental-list %}default{% else %}high confidence{% endif %} alerts, making triaging a better experience for users. For more information, see [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning/viewing-alerts).
3434

3535
{% data reusables.secret-scanning.secret-scanning-pattern-pair-matches %}
3636

content/code-security/secret-scanning/managing-alerts-from-secret-scanning/viewing-alerts.md

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,20 @@ allowTitleToDifferFromFilename: true
2323
To help you triage alerts more effectively, {% data variables.product.company_short %} separates alerts into two lists:
2424

2525
{% ifversion secret-scanning-alert-experimental-list %}
26-
* **Default** alerts
27-
* **Experimental** alerts
26+
* **Default** alerts{% ifversion secret-scanning-generic-tab %}
27+
* **Generic** alerts{% elsif ghes = 3.16 %}
28+
* **Experimental** alerts{% endif %}
29+
30+
{% ifversion ghes = 3.16 %}
2831

2932
{% ifversion secret-scanning-alert-experimental-list-toggle %}
3033
![Screenshot of the {% data variables.product.prodname_secret_scanning %} alert view. The button to toggle between "Default" and "Experimental" alerts is highlighted with an orange outline.](/assets/images/enterprise/3.16/help/security/secret-scanning-default-alert-view.png)
3134
{% else %}
3235
![Screenshot of the {% data variables.product.prodname_secret_scanning %} alert view. The sidebar menu items for "Default" and "Experimental" alerts are highlighted with an orange outline.](/assets/images/help/security/secret-scanning-default-alert-view.png)
3336
{% endif %}
3437

38+
{% endif %}
39+
3540
{% else %}
3641
* **High confidence** alerts.
3742
* **Other** alerts.
@@ -46,9 +51,9 @@ To help you triage alerts more effectively, {% data variables.product.company_sh
4651

4752
The default alerts list displays alerts that relate to supported patterns and specified custom patterns. This is the main view for alerts.
4853

49-
### Experimental alerts list
54+
### {% ifversion secret-scanning-generic-tab %}Generic{% elsif ghes = 3.16 %}Experimental{% endif %} alerts list
5055

51-
The experimental alerts list displays alerts that relate to non-provider patterns (such as private keys){% ifversion secret-scanning-ai-generic-secret-detection %}, or generic secrets detected using AI (such as passwords){% endif %}. These types of alerts can have a higher rate of false positives or secrets used in tests. You can toggle to the experimental alerts list from the default alerts list.
56+
The {% ifversion secret-scanning-generic-tab %}generic{% elsif ghes = 3.16 %}experimental{% endif %} alerts list displays alerts that relate to non-provider patterns (such as private keys){% ifversion secret-scanning-ai-generic-secret-detection %}, or generic secrets detected using AI (such as passwords){% endif %}. These types of alerts can have a higher rate of false positives or secrets used in tests. You can toggle to the {% ifversion secret-scanning-generic-tab %}generic{% elsif ghes = 3.16 %}experimental{% endif %} alerts list from the default alerts list.
5257

5358
{% else %}
5459

@@ -71,7 +76,7 @@ For {% data variables.product.company_short %} to scan for non-provider patterns
7176

7277
{% ifversion secret-scanning-alert-experimental-list %}
7378

74-
{% data variables.product.github %} will continue to release new patterns and secret types to the experimental alerts list and will promote them to the default list when feature-complete (e.g. when they have an appropriately low volume and false positive rate).
79+
{% data variables.product.github %} will continue to release new patterns and secret types to the {% ifversion secret-scanning-generic-tab %}generic{% elsif ghes = 3.16 %}experimental{% endif %} alerts list and will promote them to the default list when feature-complete (e.g. when they have an appropriately low volume and false positive rate).
7580

7681
{% endif %}
7782

@@ -82,7 +87,7 @@ Alerts for {% data variables.product.prodname_secret_scanning %} are displayed u
8287
{% data reusables.repositories.navigate-to-repo %}
8388
{% data reusables.repositories.sidebar-security %}
8489
1. In the left sidebar, under "Vulnerability alerts", click **{% data variables.product.prodname_secret_scanning_caps %}**.
85-
1. Optionally, toggle to {% ifversion secret-scanning-alert-experimental-list %}"Experimental"{% else %}"Other"{% endif %} to see alerts for non-provider patterns{% ifversion secret-scanning-ai-generic-secret-detection %} or generic secrets detected using AI{% endif %}.
90+
1. Optionally, toggle to {% ifversion secret-scanning-generic-tab %}"Generic"{% elsif ghes = 3.16 %}"Experimental"{% else %}"Other"{% endif %} to see alerts for non-provider patterns{% ifversion secret-scanning-ai-generic-secret-detection %} or generic secrets detected using AI{% endif %}.
8691
1. Under "{% data variables.product.prodname_secret_scanning_caps %}", click the alert you want to view.
8792
{% ifversion secret-scanning-user-owned-repos %}
8893

@@ -110,7 +115,9 @@ You can apply various filters to the alerts list to help you find the alerts you
110115
|`secret-type:SECRET-NAME`| Displays alerts for a specific secret type, for example, `secret-type:github_personal_access_token`. For a list of supported secret types, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secret). |
111116
|`provider:PROVIDER-NAME`|Displays alerts for a specific provider, for example, `provider:github`. For a list of supported partners, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#supported-secrets).|
112117
|{% ifversion secret-scanning-alert-experimental-list %}`results:default`{% else %}`confidence:high`{% endif %}| Displays alerts for {% ifversion secret-scanning-alert-experimental-list %}{% else %}high-confidence secrets, which relate to {% endif %}supported secrets and custom patterns. For a list of supported patterns, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns). |
113-
|{% ifversion secret-scanning-alert-experimental-list %}`results:experimental`{% else %}`confidence:other`{% endif %}| Displays alerts for non-provider patterns, such as private keys{% ifversion secret-scanning-ai-generic-secret-detection %}, and AI-detected generic secrets, such as passwords{% endif %}. For a list of supported non-provider patterns, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#non-provider-patterns). {% ifversion secret-scanning-ai-generic-secret-detection %}For more information about AI-detected generic secrets, see [AUTOTITLE](/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets).{% endif %}|
118+
|{% ifversion secret-scanning-generic-tab %}`results:generic`| Displays alerts for non-provider patterns, such as private keys{% ifversion secret-scanning-ai-generic-secret-detection %}, and AI-detected generic secrets, such as passwords{% endif %}. For a list of supported non-provider patterns, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#non-provider-patterns). {% ifversion secret-scanning-ai-generic-secret-detection %}For more information about AI-detected generic secrets, see [AUTOTITLE](/code-security/secret-scanning/copilot-secret-scanning/responsible-ai-generic-secrets).{% endif %}{% endif %}|
119+
|{% ifversion ghes = 3.16 %}`results:experimental`| Displays alerts for non-provider patterns, such as private keys. For a list of supported non-provider patterns, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#non-provider-patterns).{% endif %}|
120+
|{% ifversion ghes < 3.16 %}`confidence:other`| Displays alerts for non-provider patterns, such as private keys. For a list of supported non-provider patterns, see [AUTOTITLE](/code-security/secret-scanning/introduction/supported-secret-scanning-patterns#non-provider-patterns).{% endif %}|
114121

115122
## Next steps
116123

content/code-security/security-overview/filtering-alerts-in-security-overview.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -194,11 +194,15 @@ All {% data variables.product.prodname_code_scanning %} alerts have one of the c
194194
| Qualifier | Description |
195195
| -------- | -------- |
196196
|`bypassed` | Display {% data variables.secret-scanning.alerts %} where push protection was bypassed (`true`) or not bypassed (`false`).|
197-
|{% ifversion secret-scanning-alert-experimental-list %}|
197+
|{% ifversion secret-scanning-generic-tab %}|
198+
|`results`|Display default (`default`) or generic (`generic`) {% data variables.secret-scanning.alerts %}.|
199+
|{% endif %}|
200+
| {% ifversion ghes = 3.16 %} |
198201
|`results`|Display default (`default`) or experimental (`experimental`) {% data variables.secret-scanning.alerts %}.|
199-
|{% else %}|
200-
|`confidence`|Display {% data variables.secret-scanning.alerts %} of high (`high`) or other (`other`) confidence.|
201202
|{% endif %}|
203+
|{% ifversion ghes < 3.16 %}|
204+
|`confidence`|Display {% data variables.secret-scanning.alerts %} of high (`high`) or other (`other`) confidence.|
205+
|{% endif %} |
202206
|`is`|Display {% data variables.secret-scanning.alerts %} that are open (`open`) or closed (`closed`).|
203207
|`provider` | Display alerts for all secrets issued by a specified provider, for example: `adafruit`. |
204208
|`resolution`| Display {% data variables.secret-scanning.alerts %} closed as "false positive" (`false-positive`), "pattern deleted" (`pattern-deleted`), "pattern edited' (`pattern-edited`), "revoked" (`revoked`) "used in tests" (`used-in-tests`), or "won't fix" (`wont-fix`).|
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
# Reference: #17438 - Rename the secret scanning "Experimental" tab to curb confusion on alert confidence [GA]
2+
versions:
3+
fpt: '*'
4+
ghec: '*'
5+
ghes: '>3.16'

src/secret-scanning/data/public-docs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4198,7 +4198,7 @@
41984198
versions:
41994199
fpt: '*'
42004200
ghec: '*'
4201-
isPublic: false
4201+
isPublic: true
42024202
isPrivateWithGhas: true
42034203
hasPushProtection: false
42044204
hasValidityCheck: false

src/secret-scanning/lib/config.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"sha": "b457d82c2b0f5088913dcd44896a3db352cc1155",
3-
"blob-sha": "a08e918ef003ca9b95ddb1ad930e8f333beeb7a9",
2+
"sha": "f1b9f72ec20df903039f28b8ff8abb0ec25d5a89",
3+
"blob-sha": "3faaa576314802c2b4bfa13b6c57adbc19edd8e6",
44
"targetFilename": "code-security/secret-scanning/introduction/supported-secret-scanning-patterns"
55
}

0 commit comments

Comments
 (0)