Skip to content

Commit e889b86

Browse files
Merge branch 'main' into patch-1
2 parents e3d59fd + b39823e commit e889b86

30 files changed

Lines changed: 445 additions & 296 deletions

File tree

content/admin/data-residency/network-details-for-ghecom.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,13 +177,43 @@ Japan region:
177177

178178
### Domains for Azure private networking
179179

180+
#### Required for all regions
181+
180182
* `*.<TENANT>.ghe.com`
181183
* `<TENANT>.ghe.com`
182184
* `github.com`
183185
* `*.githubusercontent.com`
184-
* `*.blob.core.windows.net`
186+
* `*.blob.core.windows.net` (can be further restricted by region, see below)
185187
* `*.web.core.windows.net`
186188

189+
#### EU
190+
191+
`*.blob.core.windows.net` can be replaced with:
192+
* `prodsdc01resultssa0.blob.core.windows.net`
193+
* `prodsdc01resultssa1.blob.core.windows.net`
194+
* `prodsdc01resultssa2.blob.core.windows.net`
195+
* `prodsdc01resultssa3.blob.core.windows.net`
196+
* `prodweu01resultssa0.blob.core.windows.net`
197+
* `prodweu01resultssa1.blob.core.windows.net`
198+
* `prodweu01resultssa2.blob.core.windows.net`
199+
* `prodweu01resultssa3.blob.core.windows.net`
200+
201+
#### Australia
202+
203+
`*.blob.core.windows.net` can be replaced with:
204+
* `prodae01resultssa0.blob.core.windows.net`
205+
* `prodae01resultssa1.blob.core.windows.net`
206+
* `prodae01resultssa2.blob.core.windows.net`
207+
* `prodae01resultssa3.blob.core.windows.net`
208+
209+
#### Japan
210+
211+
`*.blob.core.windows.net` can be replaced with:
212+
* `prodjpw01resultssa0.blob.core.windows.net`
213+
* `prodjpw01resultssa1.blob.core.windows.net`
214+
* `prodjpw01resultssa2.blob.core.windows.net`
215+
* `prodjpw01resultssa3.blob.core.windows.net`
216+
187217
## IP ranges for {% data variables.product.prodname_importer_proper_name %}
188218

189219
If you're running a migration to your enterprise with {% data variables.product.prodname_importer_proper_name %}, you may need to add certain ranges to an IP allow list. See [AUTOTITLE](/migrations/using-github-enterprise-importer/migrating-between-github-products/managing-access-for-a-migration-between-github-products#configuring-ip-allow-lists-for-migrations).

content/authentication/keeping-your-account-and-data-secure/about-githubs-ip-addresses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ These ranges are in [CIDR notation](https://en.wikipedia.org/wiki/Classless_Inte
3030

3131
We make changes to our IP addresses from time to time. We do not recommend allowing by IP address, but if you use these IP ranges we strongly encourage regular monitoring of our API.
3232

33-
For applications to function, you must allow TCP ports 22, 80, and 443 via our IP ranges for `github.com`.
33+
For applications to function, you must allow TCP ports 22, 80, and 443 via our IP ranges for `github.com` and `{% data variables.enterprise.data_residency_domain %}`.
3434

3535
## Further reading
3636

content/code-security/concepts/code-scanning/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ contentType: concepts
1515
children:
1616
- /about-code-scanning
1717
- /about-code-scanning-alerts
18-
- /evaluating-default-setup-for-code-scanning
18+
- /setup-types
1919
- /about-integration-with-code-scanning
2020
- /codeql
2121
---
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: About setup types for code scanning
3+
shortTitle: Setup types
4+
intro: Depending on your needs, {% data variables.product.github %} offers a default or advanced setup for code scanning.
5+
topics:
6+
- Code Security
7+
- Code scanning
8+
versions:
9+
fpt: '*'
10+
ghes: '*'
11+
ghec: '*'
12+
contentType: concepts
13+
---
14+
15+
## About default setup
16+
17+
Default setup for {% data variables.product.prodname_code_scanning %} is the quickest, easiest, most low-maintenance way to enable {% data variables.product.prodname_code_scanning %} for your repository. Based on the code in your repository, default setup will automatically create a custom {% data variables.product.prodname_code_scanning %} configuration. After enabling default setup, the code written in {% data variables.product.prodname_codeql %}-supported languages in your repository will be scanned:
18+
19+
* On each push to the repository's default branch, or any protected branch. For more information on protected branches, see [AUTOTITLE](/repositories/configuring-branches-and-merges-in-your-repository/managing-protected-branches/about-protected-branches).
20+
* When creating or committing to a pull request based against the repository's default branch, or any protected branch, excluding pull requests from forks.
21+
* On a weekly schedule.
22+
23+
If you need more granular control over your {% data variables.product.prodname_code_scanning %} configuration, you should instead configure advanced setup.
24+
25+
### Supported languages
26+
27+
{% data reusables.code-scanning.default-setup-pre-enablement-explanation %}
28+
29+
If the code in a repository changes to include any {% data variables.product.prodname_codeql %}-supported languages, {% data variables.product.prodname_dotcom %} will automatically update the {% data variables.product.prodname_code_scanning %} configuration to include the new language. If {% data variables.product.prodname_code_scanning %} fails with the new configuration, {% data variables.product.prodname_dotcom %} will resume the previous configuration automatically so the repository does not lose {% data variables.product.prodname_code_scanning %} coverage.
30+
31+
### Available runners
32+
33+
You can use default setup for all {% data variables.product.prodname_codeql %}-supported languages on self-hosted runners or {% data variables.product.prodname_dotcom %}-hosted runners.
34+
35+
You can assign self-hosted runners for default setup by giving the runners {% ifversion code-scanning-default-setup-customize-labels %}the default `code-scanning` label, or you can optionally give them custom labels so that individual repositories can use different runners.{% else %}the `code-scanning` label.{% endif %}
36+
37+
{% ifversion code-scanning-default-setup-customize-labels %}
38+
39+
Unless you have a specific use case, we recommend that you only assign runners with the default `code-scanning` label. However, you may want to use custom labels to:
40+
41+
* Assign more powerful self-hosted runners to critical repositories for faster {% data variables.product.prodname_code_scanning %} analysis.
42+
* Run your {% data variables.product.prodname_code_scanning %} analyses on a particular platform (for example, macOS).
43+
* Have granular control over the workload for your {% data variables.product.prodname_dotcom %}-hosted runners and self-hosted runners.
44+
45+
{% endif %}
46+
47+
## About advanced setup
48+
49+
Advanced setup for {% data variables.product.prodname_code_scanning %} is helpful when you need to customize your {% data variables.product.prodname_code_scanning %}. By creating and editing a workflow file, you can define how to build compiled languages, choose which queries to run, select the languages to scan, use a matrix build, and more. You also have access to all the options for controlling workflows, for example: changing the scan schedule, defining workflow triggers, specifying specialist runners to use.
50+
51+
{% ifversion fpt or ghec %}
52+
You can also configure {% data variables.product.prodname_code_scanning %} with third-party tools.
53+
54+
{% else %}
55+
Your site administrator can also make third-party actions available to users for {% data variables.product.prodname_code_scanning %}, by setting up {% data variables.product.prodname_github_connect %}. For more information, see [AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/configuring-code-scanning-for-your-appliance#configuring-github-connect-to-sync-github-actions).
56+
{% endif %}
57+
58+
{% data reusables.code-scanning.about-multiple-configurations-link %}
59+
60+
## Next steps
61+
62+
You can enable default setup for a single repository, multiple repositories, or all repositories in an organization at the same time.
63+
64+
* For a single repository, see [AUTOTITLE](/code-security/how-tos/scan-code-for-vulnerabilities/configure-code-scanning/configuring-default-setup-for-code-scanning).
65+
* For bulk enablement, see [AUTOTITLE](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning-at-scale).
66+
67+
To configure advanced setup instead, see [AUTOTITLE](/code-security/how-tos/scan-code-for-vulnerabilities/configure-code-scanning/configuring-advanced-setup-for-code-scanning).

content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,10 @@ redirect_from:
1818
contentType: concepts
1919
---
2020

21-
## About delegated bypass for push protection
22-
2321
{% data reusables.secret-scanning.push-protection-delegate-bypass-beta-note %}
2422

23+
## About delegated bypass for push protection
24+
2525
When push protection is enabled for a repository, users with write access can bypass push protection and push a secret if they provide a reason and the bypass is approved.
2626

2727
With delegated bypass for push protection, you can:
@@ -33,7 +33,7 @@ With delegated bypass for push protection, you can:
3333

3434
To set up delegated bypass, organization owners or repository administrators create a list of users with bypass privileges. This designated list of users can then:
3535
* Bypass push protection, by specifying a reason for bypassing the block.
36-
* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository.
36+
* Manage (approve or deny) bypass requests coming from all other contributors. These requests are located in the "Push protection bypass" page in the **Security** tab of the repository, and will expire after 7 days.
3737

3838
The following types of users can always bypass push protection without having to request bypass privileges:
3939
* Organization owners

content/code-security/concepts/secret-security/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ children:
1818
- /about-delegated-bypass-for-push-protection
1919
- /about-secret-scanning-for-partners
2020
- /github-secret-types
21+
- /push-protection-from-the-command-line
2122
- /working-with-push-protection-and-the-github-mcp-server
2223
- /working-with-push-protection-from-the-rest-api
2324
redirect_from:
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
title: Push protection from the command line
3+
shortTitle: Command line protection
4+
intro: Understand how {% data variables.product.github %} uses push protection to prevent secret leaks from the command line.
5+
permissions: '{% data reusables.permissions.push-protection-resolve-block %}'
6+
versions:
7+
fpt: '*'
8+
ghes: '*'
9+
ghec: '*'
10+
topics:
11+
- Secret scanning
12+
- Secret Protection
13+
- Alerts
14+
- Repositories
15+
contentType: concepts
16+
---
17+
18+
Push protection prevents you from accidentally committing secrets to a repository by blocking pushes containing supported secrets.
19+
20+
When you attempt to push a supported secret from the command line to a repository secured by push protection, {% data variables.product.prodname_dotcom %} will block the push.
21+
22+
You should either:
23+
24+
* **Remove** the secret from your branch. For more information, see [Resolving a blocked push](/code-security/how-tos/secure-your-secrets/work-with-leak-prevention/working-with-push-protection-from-the-command-line#resolving-a-blocked-push).
25+
* **Follow a provided URL** to see what options are available to you to allow the push. For more information, see [Bypassing push protection](/code-security/how-tos/secure-your-secrets/work-with-leak-prevention/working-with-push-protection-from-the-command-line#bypassing-push-protection) and [Requesting bypass privileges](/code-security/how-tos/secure-your-secrets/work-with-leak-prevention/working-with-push-protection-from-the-command-line#requesting-bypass-privileges).
26+
27+
Up to five detected secrets will be displayed at a time on the command line. If a particular secret has already been detected in the repository and an alert already exists, {% data variables.product.prodname_dotcom %} will not block that secret.
28+
29+
If you confirm a secret is real and that you intend to fix it later, you should aim to remediate the secret as soon as possible. For example, you might revoke the secret and remove the secret from the repository's commit history. Real secrets that have been exposed must be revoked to avoid unauthorized access. You might consider first rotating the secret before revoking it. For more information, see [AUTOTITLE](/authentication/keeping-your-account-and-data-secure/removing-sensitive-data-from-a-repository).
30+
31+
{% data reusables.secret-scanning.push-protection-multiple-branch-note %}

content/code-security/concepts/supply-chain-security/about-dependabot-security-updates.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,15 @@ contentType: concepts
2929

3030
## About {% data variables.product.prodname_dependabot_security_updates %}
3131

32-
{% data variables.product.prodname_dependabot_security_updates %} make it easier for you to fix vulnerable dependencies in your repository. You typically add a `dependabot.yml` file to your repository to enable {% data variables.product.prodname_dependabot_security_updates %}. You then configure options in this file to tell {% data variables.product.prodname_dependabot %} how to maintain your repository.
32+
{% data variables.product.prodname_dependabot_security_updates %} make it easier for you to fix vulnerable dependencies in your repository.
33+
34+
If you enable {% data variables.product.prodname_dependabot_security_updates %}, when a {% data variables.product.prodname_dependabot %} alert is raised for a vulnerable dependency in the dependency graph of your repository, {% data variables.product.prodname_dependabot %} automatically tries to fix it. For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/about-dependabot-alerts) and [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/configuring-dependabot-security-updates).
35+
36+
You can add a `dependabot.yml` configuration file to your repository to customize {% data variables.product.prodname_dependabot %} behavior, including update schedules, pull request settings, and which dependencies to monitor. For more information, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-the-dependabot-yml-file). You then configure options in this file to tell {% data variables.product.prodname_dependabot %} how to secure the dependencies your repository relies on.
3337

3438
{% data reusables.dependabot.dependabot-updates-supported-repos-ecosystems %}
3539

36-
If you enable {% data variables.product.prodname_dependabot_security_updates %}, when a {% data variables.product.prodname_dependabot %} alert is raised for a vulnerable dependency in the dependency graph of your repository, {% data variables.product.prodname_dependabot %} automatically tries to fix it. For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-alerts/about-dependabot-alerts) and [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/configuring-dependabot-security-updates).
40+
3741

3842
> [!NOTE]
3943
> There is no interaction between the settings specified in the `dependabot.yml` file and {% data variables.product.prodname_dependabot %} security alerts, other than the fact that alerts will be closed when related pull requests generated by {% data variables.product.prodname_dependabot %} for security updates are merged.

content/code-security/concepts/supply-chain-security/about-dependabot-version-updates.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ You enable {% data variables.product.prodname_dependabot_version_updates %} by c
4444

4545
The `dependabot.yml` configuration file specifies the location of the manifest, or of other package definition files, stored in your repository. {% data variables.product.prodname_dependabot %} uses this information to check for outdated packages and applications. {% data variables.product.prodname_dependabot %} determines if there is a new version of a dependency by looking at the semantic versioning ([semver](https://semver.org/)) of the dependency to decide whether it should update to that version. {% data reusables.dependabot.dependabot-updates-supported-repos-ecosystems %}
4646

47+
The `dependabot.yml` file can also be configured to tell {% data variables.product.prodname_dependabot %} how to maintain your dependencies. For more information, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-the-dependabot-yml-file).
48+
4749
For certain package managers, {% data variables.product.prodname_dependabot_version_updates %} also supports vendoring. Vendored (or cached) dependencies are dependencies that are checked in to a specific directory in a repository rather than referenced in a manifest. Vendored dependencies are available at build time even if package servers are unavailable. {% data variables.product.prodname_dependabot_version_updates %} can be configured to check vendored dependencies for new versions and update them if necessary.
4850

4951
When {% data variables.product.prodname_dependabot %} identifies an outdated dependency, it raises a pull request to update the manifest to the latest version of the dependency. For vendored dependencies, {% data variables.product.prodname_dependabot %} raises a pull request to replace the outdated dependency with the new version directly. You check that your tests pass, review the changelog and release notes included in the pull request summary, and then merge it. For more information, see [AUTOTITLE](/code-security/dependabot/dependabot-version-updates/configuring-dependabot-version-updates).

0 commit comments

Comments
 (0)