Skip to content

Commit 492d77e

Browse files
authored
Hack week 2025: remove unneeded FBV instances (2) (#53872)
1 parent 3a2146a commit 492d77e

File tree

11 files changed

+19
-39
lines changed

11 files changed

+19
-39
lines changed

content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise.md

Lines changed: 5 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Enforcing policies for code security and analysis for your enterprise
3-
intro: 'You can enforce policies to manage the use of {% ifversion security-feature-enablement-policies %}code security and analysis{% else %}{% data variables.product.prodname_GH_advanced_security %}{% endif %} features within your enterprise''s organizations.'
4-
permissions: 'Enterprise owners can enforce {% ifversion security-feature-enablement-policies %}code security and analysis{% endif %} policies for {% data variables.product.prodname_GH_advanced_security %} in an enterprise.'
3+
intro: 'You can enforce policies to manage the use of code security and analysis features within your enterprise''s organizations.'
4+
permissions: 'Enterprise owners can enforce code security and analysis policies for {% data variables.product.prodname_GH_advanced_security %} in an enterprise.'
55
product: '{% data reusables.gated-features.ghas %}'
66
versions:
77
ghec: '*'
@@ -28,22 +28,12 @@ redirect_from:
2828
- /admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise
2929
shortTitle: Code security & analysis
3030
---
31-
{% ifversion security-feature-enablement-policies %}
3231

3332
## About policies for code security and analysis in your enterprise
3433

3534
You can enforce policies to manage the use of code security and analysis features within organizations owned by your enterprise. You can allow or disallow people with admin access to a repository to enable or disable the security and analysis features.
3635

3736
Additionally, you can enforce policies for the use of {% data variables.product.prodname_GH_advanced_security %} in your enterprise's organizations and repositories.
38-
{% else %}
39-
40-
## About policies for {% data variables.product.prodname_GH_advanced_security %} in your enterprise
41-
42-
{% data reusables.advanced-security.ghas-helps-developers %} For more information, see [AUTOTITLE](/get-started/learning-about-github/about-github-advanced-security).
43-
44-
{% ifversion ghes %}If you purchase a license for {% data variables.product.prodname_GH_advanced_security %}, any{% else %}Any{% endif %} organization on {% data variables.product.prodname_ghe_server %} can use {% data variables.product.prodname_advanced_security %} features. You can enforce policies to control how members of your enterprise on {% data variables.product.product_name %} use {% data variables.product.prodname_advanced_security %}.
45-
46-
{% endif %}
4737

4838
{% ifversion ghec %}
4939

@@ -84,16 +74,13 @@ Across all organizations owned by your enterprise, you can allow members with ad
8474
{% data reusables.enterprise.role-permission-hierarchy %}
8575

8676
{% data reusables.enterprise-accounts.access-enterprise %}
87-
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
88-
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}{% else %}
89-
{% data reusables.enterprise-accounts.advanced-security-policies %}{% endif %}{% ifversion security-feature-enablement-policies %}
77+
{% data reusables.enterprise-accounts.policies-tab %}
78+
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
9079
1. In the "{% data variables.product.prodname_GH_advanced_security %} policies" section, under "{% data variables.product.prodname_GH_advanced_security %} availability", select the dropdown menu and click a policy for the organizations owned by your enterprise.
9180

92-
{% data reusables.enterprise-accounts.advanced-security-organization-policy-drop-down %}{% endif %}
81+
{% data reusables.enterprise-accounts.advanced-security-organization-policy-drop-down %}
9382
{% data reusables.enterprise-accounts.advanced-security-individual-organization-policy-drop-down %}
9483

95-
{% ifversion security-feature-enablement-policies %}
96-
9784
## Enforcing a policy to manage the use of {% data variables.product.prodname_GH_advanced_security %} features in your enterprise's repositories
9885

9986
Across all of your enterprise's organizations, you can allow or disallow people with admin access to repositories to manage the use of {% data variables.product.prodname_GH_advanced_security %} features in the repositories. {% data reusables.advanced-security.ghas-must-be-enabled %}
@@ -114,8 +101,6 @@ Across all of your enterprise's organizations, you can allow or disallow people
114101
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
115102
1. In the "{% data variables.product.prodname_GH_advanced_security %} policies" section, under "Enable or disable {% data variables.product.prodname_secret_scanning %} by repository admins", select the dropdown menu and click a policy.
116103

117-
{% endif %}
118-
119104
{% ifversion secret-scanning-ai-generic-secret-detection %}
120105

121106
## Enforcing a policy to manage the use of {% data variables.secret-scanning.generic-secret-detection %} for {% data variables.product.prodname_secret_scanning %} in your enterprise's repositories

content/admin/managing-code-security/managing-github-advanced-security-for-your-enterprise/configuring-dependency-review-for-your-appliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ shortTitle: Configuring dependency review
44
intro: 'To help users understand dependency changes when reviewing pull requests, you can enable, configure, and disable dependency review for {% data variables.product.prodname_ghe_server %}.'
55
product: '{% data reusables.gated-features.dependency-review %}'
66
versions:
7-
feature: dependency-review-action-ghes
7+
ghes: '*'
88
type: how_to
99
topics:
1010
- Advanced Security

content/admin/managing-code-security/managing-github-advanced-security-for-your-enterprise/enabling-github-advanced-security-for-your-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ topics:
2323

2424
When you enable {% data variables.product.prodname_GH_advanced_security %} for your enterprise, repository administrators in all organizations can enable the features unless you set up a policy to restrict access. See [AUTOTITLE](/admin/policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise).
2525

26-
{% ifversion secret-scanning-enterprise-level-api %}{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}{% endif %}
26+
{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}
2727

2828
For guidance on a phased deployment of GitHub Advanced Security, see [AUTOTITLE](/code-security/adopting-github-advanced-security-at-scale/introduction-to-adopting-github-advanced-security-at-scale).
2929

content/admin/managing-code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,8 @@ title: Managing GitHub Advanced Security features for your enterprise
33
intro: 'You can control {% data variables.product.prodname_GH_advanced_security %} features that secure and analyze code across all organizations owned by your enterprise.'
44
permissions: 'Enterprise owners can manage {% data variables.product.prodname_advanced_security %} features for organizations in an enterprise.'
55
versions:
6-
feature: secret-scanning-enterprise-level
6+
ghec: '*'
7+
ghes: '*'
78
type: how_to
89
topics:
910
- Alerts
@@ -31,7 +32,7 @@ To manage individual {% data variables.product.prodname_GH_advanced_security %}
3132
3233
{% endif %}
3334

34-
{% ifversion secret-scanning-enterprise-level-api %}{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}{% endif %}
35+
{% data reusables.secret-scanning.secret-scanning-enterprise-level-api %}
3536

3637
{% ifversion ghes %}For information about buying a license for {% data variables.product.prodname_GH_advanced_security %}, see [AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/about-billing-for-github-advanced-security).{% elsif ghec %}For information about buying a license for {% data variables.product.prodname_GH_advanced_security %}, see [AUTOTITLE](/billing/managing-billing-for-your-products/managing-billing-for-github-advanced-security/signing-up-for-github-advanced-security).{% endif %}
3738

content/code-security/secret-scanning/enabling-secret-scanning-features/enabling-push-protection-for-your-repository.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If you're an organization owner, you can enable push protection for multiple rep
3636

3737
Organization owners, security managers, and repository administrators can also enable push protection for {% data variables.product.prodname_secret_scanning %} via the API. For more information, see [AUTOTITLE](/rest/repos#update-a-repository) and expand the "Properties of the `security_and_analysis` object" section.
3838

39-
{% ifversion secret-scanning-enterprise-level %}
39+
{% ifversion ghec or ghes %}
4040

4141
If your organization is owned by an enterprise account, an enterprise owner can also enable push protection at the enterprise level. For more information, see [AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise).
4242

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -142,11 +142,9 @@ Before defining a custom pattern, you must ensure that you enable secret scannin
142142
> * {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}
143143
144144
{% data reusables.enterprise-accounts.access-enterprise %}
145-
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
145+
{% data reusables.enterprise-accounts.policies-tab %}
146146
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
147-
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.{% else %}
148-
{% data reusables.enterprise-accounts.advanced-security-policies %}
149-
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
147+
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.
150148
1. Under "Secret scanning custom patterns", click **New pattern**.
151149
{% data reusables.advanced-security.secret-scanning-add-custom-pattern-details %}
152150
{%- ifversion custom-pattern-dry-run-ga %}

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,9 @@ You can enable {% data variables.product.prodname_secret_scanning %} as a push p
5555
Before enabling push protection for a custom pattern at enterprise level, you must also{% ifversion custom-pattern-dry-run-ga %} test your custom patterns using dry runs. {% data reusables.secret-scanning.dry-runs-enterprise-permissions %}{% else %} test your custom patterns in a repository before defining them for your entire enterprise, as there is no dry-run functionality. That way, you can avoid creating excess false-positive {% data variables.secret-scanning.alerts %}.{% endif %}
5656

5757
{% data reusables.enterprise-accounts.access-enterprise %}
58-
{% data reusables.enterprise-accounts.policies-tab %}{% ifversion security-feature-enablement-policies %}
58+
{% data reusables.enterprise-accounts.policies-tab %}
5959
{% data reusables.enterprise-accounts.code-security-and-analysis-policies %}
60-
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.{% else %}
61-
{% data reusables.enterprise-accounts.advanced-security-policies %}
62-
{% data reusables.enterprise-accounts.advanced-security-security-features %}{% endif %}
60+
1. Under "{% ifversion code-security-wording-only-enterprise %}Code security{% else %}Code security and analysis{% endif %}", click **Security features**.
6361
{% data reusables.advanced-security.secret-scanning-edit-custom-pattern %}
6462

6563
{% ifversion custom-pattern-dry-run-ga %}

content/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/browsing-security-advisories-in-the-github-advisory-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ For any {% data variables.product.company_short %}-reviewed advisory in the {% d
8585
1. Optionally, to filter the list, use the search bar or the drop-down menus. The "Organization" drop-down menu allows you to filter the {% data variables.product.prodname_dependabot_alerts %} per owner (organization or user).
8686
1. For more details about the advisory, and for advice on how to fix the vulnerable repository, click the repository name.
8787

88-
{% ifversion security-advisories-ghes %}
88+
{% ifversion ghes %}
8989

9090
## Accessing the local advisory database on {% data variables.product.prodname_ghe_server %}
9191

content/code-security/security-advisories/working-with-global-security-advisories-from-the-github-advisory-database/editing-security-advisories-in-the-github-advisory-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Only repository owners and administrators can edit repository-level security adv
4242

4343
You can also open a pull request directly on an advisory file in the [github/advisory-database](https://github.com/github/advisory-database) repository. For more information, see the [contribution guidelines](https://github.com/github/advisory-database/blob/main/CONTRIBUTING.md).
4444

45-
{% ifversion security-advisories-ghes %}
45+
{% ifversion ghes %}
4646

4747
## Editing advisories from {% data variables.product.prodname_ghe_server %}
4848

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1 @@
1-
{% ifversion secret-scanning-push-protection-email %}
21
When a contributor bypasses a push protection block for a secret, {% data variables.product.prodname_dotcom %} also sends an email alert to the organization owners, security managers, and repository administrators who have opted in for email notifications.
3-
{% endif %}

0 commit comments

Comments
 (0)