Skip to content

Commit d11f050

Browse files
GeekTrainerCopilot
andcommitted
Reset actions-workshop content to main, remove .dev/ and PLAN.md
- Revert content/github-actions/2-code-scanning.md to main (remove UI text changes) - Remove orphaned content/shared-images/setup-secret-protection.png - Remove .dev/ sandbox tooling (not needed for this PR) - Remove root PLAN.md planning artifact Path updates in actions content (server/ → app/server/, client/ → app/client/) are unchanged as they were already correct. Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
1 parent b091dc6 commit d11f050

6 files changed

Lines changed: 5 additions & 199 deletions

File tree

.dev/Dockerfile.sandbox

Lines changed: 0 additions & 19 deletions
This file was deleted.

.dev/sandbox.json

Lines changed: 0 additions & 8 deletions
This file was deleted.

.dev/start-copilot-sandbox.sh

Lines changed: 0 additions & 72 deletions
This file was deleted.

PLAN.md

Lines changed: 0 additions & 95 deletions
This file was deleted.

content/github-actions/2-code-scanning.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Most projects depend on open source and external libraries. While modern develop
3535
Public repositories on GitHub automatically have Dependabot alerts enabled. Let's configure Dependabot to also create PRs that update insecure library versions automatically.
3636

3737
1. Navigate to your repository on GitHub.
38-
2. Select **Settings** > **Advanced security** (under **Security** in the sidebar).
38+
2. Select **Settings** > **Code security** (under **Security** in the sidebar).
3939
3. Locate the **Dependabot** section.
4040

4141
![Screenshot of the Dependabot section](../shared-images/dependabot-settings.png)
@@ -54,11 +54,11 @@ You've now enabled Dependabot alerts and security updates! When an insecure libr
5454

5555
Many developers have accidentally checked in code containing tokens or credentials. Regardless of the reason, even seemingly innocuous tokens can create a security issue. [Secret scanning][about-secret-scanning] detects tokens in your source code and raises alerts. With push protection enabled, pushes containing supported secrets are blocked before they reach your repository.
5656

57-
1. On the same **Advanced security** settings page, locate the **Secret Protection** section.
58-
2. Next to **GitHub will always send alerts to partners for detected secrets in public repositories**, select **Enable**.
57+
1. On the same **Code security** settings page, locate the **Secret scanning** section.
58+
2. Next to **Receive alerts on GitHub for detected secrets, keys or other tokens**, select **Enable**.
5959
3. Next to **Push protection**, select **Enable** to block pushes containing a [supported secret][supported-secrets].
6060

61-
![Screenshot of fully configured secret scanning](../shared-images/setup-secret-protection.png)
61+
![Screenshot of fully configured secret scanning](../shared-images/secret-scanning-settings.png)
6262

6363
You've now enabled secret scanning and push protection — helping prevent credentials from reaching your repository.
6464

@@ -68,7 +68,7 @@ There is a direct relationship between the amount of code an organization writes
6868

6969
Let's enable code scanning with the default CodeQL setup. This runs automatically whenever code is pushed to `main` or a pull request targets `main`, and on a regular schedule to catch newly discovered vulnerabilities.
7070

71-
1. On the same **Advanced security** settings page, locate the **Code scanning** section.
71+
1. On the same **Code security** settings page, locate the **Code scanning** section.
7272
2. Next to **CodeQL analysis**, select **Set up** > **Default**.
7373

7474
![Screenshot of code scanning dropdown menu](../shared-images/code-scanning-setup.png)
-33.2 KB
Binary file not shown.

0 commit comments

Comments
 (0)