Skip to content

Commit

Permalink
Merge pull request #36592 from github/repo-sync
Browse files Browse the repository at this point in the history
Repo sync
  • Loading branch information
docs-bot authored Mar 3, 2025
2 parents df69496 + d2d4e1a commit b590bae
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 3 deletions.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Excluding folders and files from secret scanning
intro: 'You can customize {% data variables.product.prodname_secret_scanning %} to exclude directories or files from analysis, by configuring a `secret_scanning.yml` file in your repository.'
intro: 'You can customize {% data variables.product.prodname_secret_scanning %} to automatically close alerts for secrets found in specific directories or files by configuring a `secret_scanning.yml` file in your repository.'
permissions: '{% data reusables.permissions.secret-scanning-alerts %}'
shortTitle: Exclude folders and files
versions:
Expand All @@ -22,7 +22,7 @@ topics:

You may have a reason to commit a secret to a repository, such as when you want to provide a fake secret in documentation, or in an example application. In these scenarios, you can quickly dismiss the alert and document the reasons. However, there may be cases where you want to ignore a directory entirely to avoid creating false positive alerts at scale. For example, you might have a monolithic application with several integrations containing a file of dummy keys that could set off numerous false alerts to triage.

You can configure a `secret_scanning.yml` file to exclude directories from {% data variables.product.prodname_secret_scanning %}, including when you use push protection.
You can configure a `secret_scanning.yml` file to automatically close alerts found in specific directories from {% data variables.product.prodname_secret_scanning %}, and exclude these directories included in push protection. These alerts are closed as "ignored by configuration".

## Excluding directories from {% data variables.secret-scanning.user_alerts %}

Expand All @@ -36,7 +36,7 @@ You can configure a `secret_scanning.yml` file to exclude directories from {% da
- "docs/**"
```
This tells {% data variables.product.prodname_secret_scanning %} to ignore everything in the `docs` directory. You can use this example file as a template to add the files and folders you’d like to exclude from your own repositories.
This tells {% data variables.product.prodname_secret_scanning %} to automatically close alerts for everything in the `docs` directory. You can use this example file as a template to add the files and folders you’d like to exclude from your own repositories.

You can also use special characters, such as `*` to filter paths. For more information about filter patterns, see [Workflow syntax for GitHub Actions](/actions/reference/workflow-syntax-for-github-actions#filter-pattern-cheat-sheet).

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -362,6 +362,8 @@ To share feedback about {% data variables.product.prodname_copilot_chat_short %}

{% xcode %}

{% data reusables.copilot.xcode-chat-public-preview-note %}

## Prerequisites

To use {% data variables.product.prodname_copilot %} for Xcode, you must install the {% data variables.product.prodname_copilot %} for Xcode extension. See [AUTOTITLE](/copilot/configuring-github-copilot/installing-the-github-copilot-extension-in-your-environment).
Expand Down
1 change: 1 addition & 0 deletions data/reusables/copilot/xcode-chat-public-preview-note.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
> [!NOTE] {% data variables.product.prodname_copilot_chat_short %} in Xcode is in {% data variables.release-phases.public_preview %} and subject to change.

0 comments on commit b590bae

Please sign in to comment.