Organization owners and security managers can now filter the table of repositories on the code security configurations settings page by configuration attachment failure reason.
This is useful when you’ve attempted to attach a code security configuration to many repositories at the same time, and some have failed. The reason for the failure is also now listed in the row with the repository name.
Use the search bar to filter by failure-reason:
and then insert one of the following options:
– actions_disabled
– When you are attempting to rollout default setup for code scanning, but the repository does not have Actions enabled on it.
– code_scanning
– When you are attempting to rollout default setup for code scanning, but the repository already has advanced setup for code scanning.
– enterprise_policy
– When the enterprise does not permit GitHub Advanced Security to be enabled in this organization.
– not_enough_licenses
– When enabling advanced security on these repositories would exceed your seat allowance.
– not_purchased
– When you are attempting to rollout a configuration with GitHub Advanced Security features, but GitHub Advanced Security has not been purchased.
– unknown
– When something unexpected occurred.
Learn more about code security configurations, the configurations REST API, or send us your feedback.