Skip to content

Commit dcbfffc

Browse files
authored
Merge pull request github#31918 from github/repo-sync
Repo sync
2 parents f8a98b4 + 566191d commit dcbfffc

24 files changed

+38
-101
lines changed

content/code-security/dependabot/dependabot-alerts/about-dependabot-alerts.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ For information about access requirements for actions related to {% data variabl
7878
{% data variables.product.product_name %} starts generating the dependency graph immediately and generates alerts for any insecure dependencies as soon as they are identified. The graph is usually populated within minutes but this may take longer for repositories with many dependencies. For more information, see "[AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#enabling-or-disabling-security-and-analysis-features-for-private-repositories)."
7979
{% endif %}
8080

81-
When {% data variables.product.product_name %} identifies a vulnerable dependency, we generate a {% data variables.product.prodname_dependabot %} alert and display it {% ifversion fpt or ghec or ghes %} on the **Security** tab for the repository and{% endif %} in the repository's dependency graph. The alert includes {% ifversion fpt or ghec or ghes %}a link to the affected file in the project, and {% endif %}information about a fixed version.
81+
When {% data variables.product.product_name %} identifies a vulnerable dependency, we generate a {% data variables.product.prodname_dependabot %} alert and display it on the **Security** tab for the repository and in the repository's dependency graph. The alert includes a link to the affected file in the project, and information about a fixed version.
8282

8383
{% data variables.product.product_name %} may also notify the maintainers of affected repositories about new alerts according to their notification preferences.{% ifversion dependabot-suppressed-notifications %} When {% data variables.product.prodname_dependabot %} is first enabled, {% data variables.product.product_name %} does not send notifications for all vulnerable dependencies found in your repository, only for new vulnerable dependencies identified after {% data variables.product.prodname_dependabot %} is enabled.{% endif %} For more information, see "[AUTOTITLE](/code-security/dependabot/dependabot-alerts/configuring-notifications-for-dependabot-alerts)."
8484

@@ -108,11 +108,9 @@ By default, we notify people with {% ifversion dependabot-alerts-permissions-wri
108108

109109
You can also see all the {% data variables.product.prodname_dependabot_alerts %} that correspond to a particular advisory in the {% data variables.product.prodname_advisory_database %}. {% data reusables.security-advisory.link-browsing-advisory-db %}
110110

111-
{% ifversion fpt or ghec or ghes %}
112-
113111
## Further reading
114112

115113
- "[AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates)"
116-
- "[AUTOTITLE](/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts)"{% endif %}
114+
- "[AUTOTITLE](/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts)"
117115
- "[AUTOTITLE](/code-security/getting-started/auditing-security-alerts)"
118116
{% ifversion fpt or ghec %}- "[AUTOTITLE](/get-started/privacy-on-github)"{% endif %}

content/code-security/dependabot/dependabot-alerts/viewing-and-updating-dependabot-alerts.md

Lines changed: 2 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -24,21 +24,17 @@ topics:
2424

2525
{% data reusables.dependabot.enterprise-enable-dependabot %}
2626

27-
Your repository's {% data variables.product.prodname_dependabot_alerts %} tab lists all open and closed {% data variables.product.prodname_dependabot_alerts %}{% ifversion fpt or ghec or ghes %} and corresponding {% data variables.product.prodname_dependabot_security_updates %}{% endif %}. You can filter alerts by package, ecosystem, or manifest. You can sort the list of alerts, and you can click into specific alerts for more details. {% ifversion dependabot-bulk-alerts %}You can also dismiss or reopen alerts, either one by one or by selecting multiple alerts at once.{% else %}You can also dismiss or reopen alerts. {% endif %} For more information, see "[AUTOTITLE](/code-security/dependabot/dependabot-alerts/about-dependabot-alerts)."
27+
Your repository's {% data variables.product.prodname_dependabot_alerts %} tab lists all open and closed {% data variables.product.prodname_dependabot_alerts %} and corresponding {% data variables.product.prodname_dependabot_security_updates %}. You can filter alerts by package, ecosystem, or manifest. You can sort the list of alerts, and you can click into specific alerts for more details. {% ifversion dependabot-bulk-alerts %}You can also dismiss or reopen alerts, either one by one or by selecting multiple alerts at once.{% else %}You can also dismiss or reopen alerts. {% endif %} For more information, see "[AUTOTITLE](/code-security/dependabot/dependabot-alerts/about-dependabot-alerts)."
2828

29-
{% ifversion fpt or ghec or ghes %}
3029
You can enable automatic security updates for any repository that uses {% data variables.product.prodname_dependabot_alerts %} and the dependency graph. For more information, see "[AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates)."
31-
{% endif %}
32-
33-
{% ifversion fpt or ghec or ghes %}
3430

3531
## About updates for vulnerable dependencies in your repository
3632

3733
{% data variables.product.product_name %} generates {% data variables.product.prodname_dependabot_alerts %} when we detect that the default branch of your codebase is using dependencies with known security risks. For repositories where {% data variables.product.prodname_dependabot_security_updates %} are enabled, when {% data variables.product.product_name %} detects a vulnerable dependency in the default branch, {% data variables.product.prodname_dependabot %} creates a pull request to fix it. The pull request will upgrade the dependency to the minimum possible secure version needed to avoid the vulnerability.
3834

3935
{% data reusables.dependabot.no-dependabot-alerts-for-malware %}
4036

41-
Each {% data variables.product.prodname_dependabot %} alert has a unique numeric identifier and the {% data variables.product.prodname_dependabot_alerts %} tab lists an alert for every detected vulnerability. Legacy {% data variables.product.prodname_dependabot_alerts %} grouped vulnerabilities by dependency and generated a single alert per dependency. If you navigate to a legacy {% data variables.product.prodname_dependabot %} alert, you will be redirected to a {% data variables.product.prodname_dependabot_alerts %} tab filtered for that package. {% endif %}
37+
Each {% data variables.product.prodname_dependabot %} alert has a unique numeric identifier and the {% data variables.product.prodname_dependabot_alerts %} tab lists an alert for every detected vulnerability. Legacy {% data variables.product.prodname_dependabot_alerts %} grouped vulnerabilities by dependency and generated a single alert per dependency. If you navigate to a legacy {% data variables.product.prodname_dependabot %} alert, you will be redirected to a {% data variables.product.prodname_dependabot_alerts %} tab filtered for that package.
4238

4339
You can filter and sort {% data variables.product.prodname_dependabot_alerts %} using a variety of filters and sort options available on the user interface. For more information, see "[Prioritizing {% data variables.product.prodname_dependabot_alerts %}](#prioritizing-across--data-variablesproductprodname_dependabot_alerts-)" below.
4440

@@ -134,12 +130,8 @@ You can view all open and closed {% data variables.product.prodname_dependabot_a
134130

135131
It’s important to ensure that all of your dependencies are clean of any security weaknesses. When {% data variables.product.prodname_dependabot %} discovers vulnerabilities in your dependencies, you should assess your project’s level of exposure and determine what remediation steps to take to secure your application.
136132

137-
{% ifversion fpt or ghec or ghes %}
138-
139133
If a patched version of the dependency is available, you can generate a {% data variables.product.prodname_dependabot %} pull request to update this dependency directly from a {% data variables.product.prodname_dependabot %} alert. If you have {% data variables.product.prodname_dependabot_security_updates %} enabled, the pull request may be linked in the {% data variables.product.prodname_dependabot %} alert.
140134

141-
{% endif %}
142-
143135
In cases where a patched version is not available, or you can’t update to the secure version, {% data variables.product.prodname_dependabot %} shares additional information to help you determine next steps. When you click through to view a {% data variables.product.prodname_dependabot %} alert, you can see the full details of the security advisory for the dependency including the affected functions. You can then check whether your code calls the impacted functions. This information can help you further assess your risk level, and determine workarounds or if you’re able to accept the risk represented by the security advisory.
144136

145137
{% ifversion dependabot-alerts-vulnerable-calls %}
@@ -151,18 +143,14 @@ For supported languages, {% data variables.product.prodname_dependabot %} detect
151143
### Fixing vulnerable dependencies
152144

153145
1. View the details for an alert. For more information, see "[Viewing {% data variables.product.prodname_dependabot_alerts %}](#viewing-dependabot-alerts)" (above).
154-
{% ifversion fpt or ghec or ghes %}
155146
1. If you have {% data variables.product.prodname_dependabot_security_updates %} enabled, there may be a link to a pull request that will fix the dependency. Alternatively, you can click **Create {% data variables.product.prodname_dependabot %} security update** at the top of the alert details page to create a pull request.
156147

157148
![Screenshot of a {% data variables.product.prodname_dependabot %} alert with the "Create {% data variables.product.prodname_dependabot %} security update" button highlighted with a dark orange outline.](/assets/images/help/repository/create-dependabot-security-update-button-ungrouped.png)
158149

159150
1. Optionally, if you do not use {% data variables.product.prodname_dependabot_security_updates %}, you can use the information on the page to decide which version of the dependency to upgrade to and create a pull request to update the dependency to a secure version.
160-
{% endif %}
161151
1. When you're ready to update your dependency and resolve the vulnerability, merge the pull request.
162152

163-
{% ifversion fpt or ghec or ghes %}
164153
Each pull request raised by {% data variables.product.prodname_dependabot %} includes information on commands you can use to control {% data variables.product.prodname_dependabot %}. For more information, see "[AUTOTITLE](/code-security/dependabot/working-with-dependabot/managing-pull-requests-for-dependency-updates#managing-dependabot-pull-requests-with-comment-commands)."
165-
{% endif %}
166154

167155
## Dismissing {% data variables.product.prodname_dependabot_alerts %}
168156

content/code-security/dependabot/dependabot-version-updates/configuration-options-for-the-dependabot.yml-file.md

Lines changed: 2 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -422,15 +422,12 @@ updates:
422422

423423
{% endnote %}
424424

425-
{% ifversion fpt or ghec or ghes %}
426425
{% note %}
427426

428427
**Note**: For the `pub` ecosystem, {% data variables.product.prodname_dependabot %} won't perform an update when the version that it tries to update to is ignored, even if an earlier version is available.
429428

430429
{% endnote %}
431430

432-
{% endif %}
433-
434431
### `insecure-external-code-execution`
435432

436433
Package managers with the `package-ecosystem` values `bundler`, `mix`, and `pip` may execute external code in the manifest as part of the version update process. This might allow a compromised package to steal credentials or gain access to configured registries. When you add a [`registries`](#registries) setting within an `updates` configuration, {% data variables.product.prodname_dependabot %} automatically prevents external code execution, in which case the version update may fail. You can choose to override this behavior and allow external code execution for `bundler`, `mix`, and `pip` package managers by setting `insecure-external-code-execution` to `allow`.
@@ -1354,8 +1351,6 @@ registries:
13541351

13551352
{% endraw %}
13561353

1357-
{% ifversion fpt or ghec or ghes %}
1358-
13591354
## Enabling support for beta-level ecosystems
13601355

13611356
### `enable-beta-ecosystems`
@@ -1370,12 +1365,9 @@ There are currently no ecosystems in beta.
13701365
13711366
version: 2
13721367
enable-beta-ecosystems: true
1373-
updates:{% ifversion fpt or ghec or ghes %}
1374-
- package-ecosystem: "beta-ecosystem"{% else %}
1375-
- package-ecosystem: "pub"{% endif %}
1368+
updates:
1369+
- package-ecosystem: "beta-ecosystem"
13761370
directory: "/"
13771371
schedule:
13781372
interval: "weekly"
13791373
```
1380-
1381-
{% endif %}

content/code-security/dependabot/working-with-dependabot/automating-dependabot-with-github-actions.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@ For workflows initiated by {% data variables.product.prodname_dependabot %} (`gi
4141

4242
For more information, see "[Keeping your GitHub Actions and workflows secure: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)."
4343

44-
{% ifversion fpt or ghec or ghes %}
45-
4644
### Changing `GITHUB_TOKEN` permissions
4745

4846
By default, {% data variables.product.prodname_actions %} workflows triggered by {% data variables.product.prodname_dependabot %} get a `GITHUB_TOKEN` with read-only permissions. You can use the `permissions` key in your workflow to increase the access for the token:
@@ -102,8 +100,6 @@ jobs:
102100
run: docker build . --file Dockerfile --tag my-image-name:$(date +%s)
103101
```
104102

105-
{% endif %}
106-
107103
### Manually re-running a workflow
108104

109105
{% ifversion actions-stable-actor-ids %}

0 commit comments

Comments
 (0)