Skip to content

Commit e584ac5

Browse files
committed
add info on viewing submitted dependencies in dep graph
1 parent dcfd5a4 commit e584ac5

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

content/code-security/supply-chain-security/understanding-your-software-supply-chain/exploring-the-dependencies-of-a-repository.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,10 @@ Enterprise owners can configure the dependency graph at an enterprise level. For
4242
{% ifversion fpt or ghec %}
4343
Dependencies are grouped by ecosystem. You can expand a dependency to view its dependencies. Dependencies on private repositories, private packages, or unrecognized files are shown in plain text. If the package manager for the dependency is in a public repository, {% data variables.product.product_name %} will display a link to that repository.
4444

45+
{% ifversion dependency-submission-api %}
46+
Dependencies submitted to a project using the Dependency submission API (beta), although also grouped by ecosystem, are shown separately from dependencies identified through manifest or lock files in the repository. These submitted dependencies appear in the dependency graph as "Snapshot dependencies" because they are submitted as a snapshot, or set, of dependencies. For more information on using the dependency submission API, see "[Using the Dependency submission API](/code-security/supply-chain-security/understanding-your-software-supply-chain/using-the-dependency-submission-api)."
47+
{% endif %}
48+
4549
If vulnerabilities have been detected in the repository, these are shown at the top of the view for users with access to {% data variables.product.prodname_dependabot_alerts %}.
4650

4751
![Dependencies graph](/assets/images/help/graphs/dependencies_graph.png)

0 commit comments

Comments
 (0)