@@ -70,7 +70,22 @@ If you set up the {% data variables.product.prodname_codeql %} action sync tool,
|
||||
3. The next step is to configure access to actions on {% data variables.product.prodname_dotcom_the_website %} using {% data variables.product.prodname_github_connect %}. For more information, see "[Enabling automatic access to {% data variables.product.prodname_dotcom_the_website %} actions using {% data variables.product.prodname_github_connect %}](/enterprise/admin/github-actions/enabling-automatic-access-to-githubcom-actions-using-github-connect)."
|
||||
4. Add a self-hosted runner to your repository, organization, or enterprise account. For more information, see "[Adding self-hosted runners](/actions/hosting-your-own-runners/adding-self-hosted-runners)."
|
||||
|
||||
|
||||
## Running code scanning using the {% data variables.product.prodname_codeql_cli %}
|
||||
|
||||
If you don't want to use {% data variables.product.prodname_actions %}, you should run {% data variables.product.prodname_code_scanning %} using the {% data variables.product.prodname_codeql_cli %}.
|
||||
|
||||
The {% data variables.product.prodname_codeql_cli %} is a command-line tool that you use to analyze codebases on any machine, including a third-party CI/CD system. For more information, see "[Installing CodeQL CLI in your CI system](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)."
|
||||
|
||||
|
||||
{% if codeql-runner-supported %}
|
||||
|
||||
## Running {% data variables.product.prodname_code_scanning %} using the {% data variables.product.prodname_codeql_runner %}
|
||||
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
If you don't want to use {% data variables.product.prodname_actions %}, you can run {% data variables.product.prodname_code_scanning %} using the {% data variables.product.prodname_codeql_runner %}.
|
||||
|
||||
The {% data variables.product.prodname_codeql_runner %} is a command-line tool that you can add to your third-party CI/CD system. The tool runs {% data variables.product.prodname_codeql %} analysis on a checkout of a {% data variables.product.prodname_dotcom %} repository. For more information, see "[Running {% data variables.product.prodname_code_scanning %} in your CI system](/github/finding-security-vulnerabilities-and-errors-in-your-code/running-codeql-code-scanning-in-your-ci-system)."
|
||||
|
||||
{% endif %}
|
||||
@@ -29,14 +29,17 @@ shortTitle: Configure code scanning
|
||||
{% data reusables.code-scanning.beta %}
|
||||
{% data reusables.code-scanning.enterprise-enable-code-scanning-actions %}
|
||||
|
||||
{% ifversion ghes or ghae %}
|
||||
{% note %}
|
||||
|
||||
**Note:** This article describes the features available with the version of the CodeQL action and associated CodeQL CLI bundle included in the initial release of this version of {% data variables.product.product_name %}. If your enterprise uses a more recent version of the CodeQL action, see the [{% data variables.product.prodname_ghe_cloud %} article](/enterprise-cloud@latest/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning) for information on the latest features. {% ifversion not ghae %} For information on using the latest version, see "[Configuring code scanning for your appliance](/admin/advanced-security/configuring-code-scanning-for-your-appliance#configuring-codeql-analysis-on-a-server-without-internet-access)."{% endif %}
|
||||
|
||||
{% endnote %}
|
||||
{% endif %}
|
||||
|
||||
## About {% data variables.product.prodname_code_scanning %} configuration
|
||||
|
||||
You can run {% data variables.product.prodname_code_scanning %} on {% data variables.product.product_name %}, using {% data variables.product.prodname_actions %}, or from your continuous integration (CI) system. For more information, see "[About {% data variables.product.prodname_actions %}](/actions/getting-started-with-github-actions/about-github-actions)" or
|
||||
{%- ifversion fpt or ghes > 3.0 or ghae %}
|
||||
"[About {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in your CI system](/code-security/secure-coding/about-codeql-code-scanning-in-your-ci-system)."
|
||||
{%- else %}
|
||||
"[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)."
|
||||
{% endif %}
|
||||
You can run {% data variables.product.prodname_code_scanning %} on {% data variables.product.product_name %}, using {% data variables.product.prodname_actions %}, or from your continuous integration (CI) system. For more information, see "[About {% data variables.product.prodname_actions %}](/actions/getting-started-with-github-actions/about-github-actions)" or "[About {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in your CI system](/code-security/secure-coding/about-codeql-code-scanning-in-your-ci-system)."
|
||||
|
||||
This article is about running {% data variables.product.prodname_code_scanning %} on {% data variables.product.product_name %} using actions.
|
||||
|
||||
|
||||
@@ -25,17 +25,12 @@ topics:
|
||||
|
||||
|
||||
{% data reusables.code-scanning.beta %}
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
## About {% data variables.product.prodname_code_scanning %} with a containerized build
|
||||
|
||||
If you're setting up {% data variables.product.prodname_code_scanning %} for a compiled language, and you're building the code in a containerized environment, the analysis may fail with the error message "No source code was seen during the build." This indicates that {% data variables.product.prodname_codeql %} was unable to monitor your code as it was compiled.
|
||||
|
||||
{% ifversion fpt or ghes > 3.0 or ghae or ghec %}
|
||||
You must run {% data variables.product.prodname_codeql %} inside the container in which you build your code. This applies whether you are using the {% data variables.product.prodname_codeql_cli %}, the {% data variables.product.prodname_codeql_runner %}, or {% data variables.product.prodname_actions %}. For the {% data variables.product.prodname_codeql_cli %} or the {% data variables.product.prodname_codeql_runner %}, see "[Installing {% data variables.product.prodname_codeql_cli %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)" or "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)" for more information. If you're using {% data variables.product.prodname_actions %}, configure your workflow to run all the actions in the same container. For more information, see "[Example workflow](#example-workflow)."
|
||||
{% else %}
|
||||
You must run {% data variables.product.prodname_codeql %} inside the container in which you build your code. This applies whether you are using the {% data variables.product.prodname_codeql_runner %} or {% data variables.product.prodname_actions %}. For the {% data variables.product.prodname_codeql_runner %}, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)" for more information. If you're using {% data variables.product.prodname_actions %}, configure your workflow to run all the actions in the same container. For more information, see "[Example workflow](#example-workflow)."
|
||||
{% endif %}
|
||||
You must run {% data variables.product.prodname_codeql %} inside the container in which you build your code. This applies whether you are using the {% data variables.product.prodname_codeql_cli %}{% if codeql-runner-supported %}, the {% data variables.product.prodname_codeql_runner %},{% endif %} or {% data variables.product.prodname_actions %}. For the {% data variables.product.prodname_codeql_cli %} {% if codeql-runner-supported %}or the {% data variables.product.prodname_codeql_runner %}{% endif %}, see "[Installing {% data variables.product.prodname_codeql_cli %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)"{% if codeql-runner-supported %} or "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)"{% endif %} for more information. If you're using {% data variables.product.prodname_actions %}, configure your workflow to run all the actions in the same container. For more information, see "[Example workflow](#example-workflow)."
|
||||
|
||||
## Dependencies
|
||||
|
||||
@@ -47,6 +42,14 @@ You may have difficulty running {% data variables.product.prodname_code_scanning
|
||||
|
||||
## Example workflow
|
||||
|
||||
{% ifversion ghes or ghae %}
|
||||
{% note %}
|
||||
|
||||
**Note:** This article describes the features available with the version of the CodeQL action and associated CodeQL CLI bundle included in the initial release of this version of {% data variables.product.product_name %}. If your enterprise uses a more recent version of the CodeQL action, see the [{% data variables.product.prodname_ghe_cloud %} article](/enterprise-cloud@latest/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/running-codeql-code-scanning-in-a-container) for information on the latest features.{% ifversion not ghae %} For information on using the latest version, see "[Configuring code scanning for your appliance](/admin/advanced-security/configuring-code-scanning-for-your-appliance#configuring-codeql-analysis-on-a-server-without-internet-access)."{% endif %}
|
||||
|
||||
{% endnote %}
|
||||
{% endif %}
|
||||
|
||||
This sample workflow uses {% data variables.product.prodname_actions %} to run {% data variables.product.prodname_codeql %} analysis in a containerized environment. The value of `container.image` identifies the container to use. In this example the image is named `codeql-container`, with a tag of `f0f91db`. For more information, see "[Workflow syntax for {% data variables.product.prodname_actions %}](/actions/reference/workflow-syntax-for-github-actions#jobsjob_idcontainer)."
|
||||
|
||||
``` yaml
|
||||
|
||||
@@ -43,6 +43,14 @@ Enterprise owners, organization and repository administrators can add self-hoste
|
||||
|
||||
## Setting up {% data variables.product.prodname_code_scanning %} using actions
|
||||
|
||||
{% ifversion ghes or ghae %}
|
||||
{% note %}
|
||||
|
||||
**Note:** This article describes the features available with the version of the CodeQL action and associated CodeQL CLI bundle included in the initial release of this version of {% data variables.product.product_name %}. If your enterprise uses a more recent version of the CodeQL action, see the [{% data variables.product.prodname_ghe_cloud %} article](/enterprise-cloud@latest/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/setting-up-code-scanning-for-a-repository) for information on the latest features. {% ifversion not ghae %} For information on using the latest version, see "[Configuring code scanning for your appliance](/admin/advanced-security/configuring-code-scanning-for-your-appliance#configuring-codeql-analysis-on-a-server-without-internet-access)."{% endif %}
|
||||
|
||||
{% endnote %}
|
||||
{% endif %}
|
||||
|
||||
{% ifversion fpt or ghec %}Using actions to run {% data variables.product.prodname_code_scanning %} will use minutes. For more information, see "[About billing for {% data variables.product.prodname_actions %}](/billing/managing-billing-for-github-actions/about-billing-for-github-actions)."{% endif %}
|
||||
|
||||
{% data reusables.repositories.navigate-to-repo %}
|
||||
|
||||
@@ -31,6 +31,14 @@ topics:
|
||||
{% data reusables.code-scanning.beta %}
|
||||
{% data reusables.code-scanning.not-available %}
|
||||
|
||||
{% ifversion ghes or ghae %}
|
||||
{% note %}
|
||||
|
||||
**Note:** This article describes the features available with the version of the CodeQL action and associated CodeQL CLI bundle included in the initial release of this version of {% data variables.product.product_name %}. If your enterprise uses a more recent version of the CodeQL action, see the [{% data variables.product.prodname_ghe_cloud %} article](/enterprise-cloud@latest/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/troubleshooting-the-codeql-workflow) for information on the latest features. {% ifversion not ghae %} For information on using the latest version, see "[Configuring code scanning for your appliance](/admin/advanced-security/configuring-code-scanning-for-your-appliance#configuring-codeql-analysis-on-a-server-without-internet-access)."{% endif %}
|
||||
|
||||
{% endnote %}
|
||||
{% endif %}
|
||||
|
||||
## Producing detailed logs for debugging
|
||||
|
||||
To produce more detailed logging output, you can enable step debug logging. For more information, see "[Enabling debug logging](/actions/managing-workflow-runs/enabling-debug-logging#enabling-step-debug-logging)."
|
||||
|
||||
@@ -24,7 +24,6 @@ topics:
|
||||
|
||||
|
||||
{% data reusables.code-scanning.beta %}
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
## About SARIF support
|
||||
|
||||
@@ -32,10 +31,7 @@ SARIF (Static Analysis Results Interchange Format) is an [OASIS Standard](https:
|
||||
|
||||
To upload a SARIF file from a third-party static code analysis engine, you'll need to ensure that uploaded files use the SARIF 2.1.0 version. {% data variables.product.prodname_dotcom %} will parse the SARIF file and show alerts using the results in your repository as a part of the {% data variables.product.prodname_code_scanning %} experience. For more information, see "[Uploading a SARIF file to {% data variables.product.prodname_dotcom %}](/code-security/secure-coding/uploading-a-sarif-file-to-github)." For more information about the SARIF 2.1.0 JSON schema, see [`sarif-schema-2.1.0.json`](https://github.com/oasis-tcs/sarif-spec/blob/master/Documents/CommitteeSpecifications/2.1.0/sarif-schema-2.1.0.json).
|
||||
|
||||
If you're using {% data variables.product.prodname_actions %} with the {% data variables.product.prodname_codeql_workflow %} or using the {% data variables.product.prodname_codeql_runner %}, then the {% data variables.product.prodname_code_scanning %} results will automatically use the supported subset of SARIF 2.1.0. For more information, see "[Setting up {% data variables.product.prodname_code_scanning %} for a repository](/code-security/secure-coding/setting-up-code-scanning-for-a-repository)" or "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)."
|
||||
|
||||
{% ifversion fpt or ghes > 3.0 or ghae or ghec %}
|
||||
If you're using the {% data variables.product.prodname_codeql_cli %}, then you can specify the version of SARIF to use. For more information, see "[Configuring {% data variables.product.prodname_codeql_cli %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/configuring-codeql-cli-in-your-ci-system#analyzing-a-codeql-database)."{% endif %}
|
||||
If you're using {% data variables.product.prodname_actions %} with the {% data variables.product.prodname_codeql_workflow %}{% if codeql-runner-supported %}, using the {% data variables.product.prodname_codeql_runner %},{% endif %} or using the {% data variables.product.prodname_codeql_cli %}, then the {% data variables.product.prodname_code_scanning %} results will automatically use the supported subset of SARIF 2.1.0. For more information, see "[Setting up {% data variables.product.prodname_code_scanning %} for a repository](/code-security/secure-coding/setting-up-code-scanning-for-a-repository)"{% if codeql-runner-supported %}, "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)",{% endif %} or "[Installing CodeQL CLI in your CI system](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)."
|
||||
|
||||
{% ifversion fpt or ghes > 3.1 or ghae or ghec %}
|
||||
You can upload multiple SARIF files for the same commit, and display the data from each file as {% data variables.product.prodname_code_scanning %} results. When you upload multiple SARIF files for a commit, you must indicate a "category" for each analysis. The way to specify a category varies according to the analysis method:
|
||||
@@ -57,7 +53,7 @@ Each time the results of a new code scan are uploaded, the results are processed
|
||||
|
||||
{% data variables.product.prodname_dotcom %} uses the `partialFingerprints` property in the OASIS standard to detect when two results are logically identical. For more information, see the "[partialFingerprints property](https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html#_Toc16012611)" entry in the OASIS documentation.
|
||||
|
||||
SARIF files created by the {% data variables.product.prodname_codeql_workflow %} or using the {% data variables.product.prodname_codeql_runner %} include fingerprint data. If you upload a SARIF file using the `upload-sarif` action and this data is missing, {% data variables.product.prodname_dotcom %} attempts to populate the `partialFingerprints` field from the source files. For more information about uploading results, see "[Uploading a SARIF file to {% data variables.product.prodname_dotcom %}](/code-security/secure-coding/uploading-a-sarif-file-to-github#uploading-a-code-scanning-analysis-with-github-actions)."
|
||||
SARIF files created by the {% data variables.product.prodname_codeql_workflow %}, {% if codeql-runner-supported %}using the {% data variables.product.prodname_codeql_runner %}, {% endif %}or using the {% data variables.product.prodname_codeql_cli %} include fingerprint data. If you upload a SARIF file using the `upload-sarif` action and this data is missing, {% data variables.product.prodname_dotcom %} attempts to populate the `partialFingerprints` field from the source files. For more information about uploading results, see "[Uploading a SARIF file to {% data variables.product.prodname_dotcom %}](/code-security/secure-coding/uploading-a-sarif-file-to-github#uploading-a-code-scanning-analysis-with-github-actions)."
|
||||
|
||||
If you upload a SARIF file without fingerprint data using the `/code-scanning/sarifs` API endpoint, the {% data variables.product.prodname_code_scanning %} alerts will be processed and displayed, but users may see duplicate alerts. To avoid seeing duplicate alerts, you should calculate fingerprint data and populate the `partialFingerprints` property before you upload the SARIF file. You may find the script that the `upload-sarif` action uses a helpful starting point: https://github.com/github/codeql-action/blob/main/src/fingerprints.ts. For more information about the API, see "[Upload an analysis as SARIF data](/rest/reference/code-scanning#upload-an-analysis-as-sarif-data)."
|
||||
|
||||
|
||||
@@ -28,7 +28,6 @@ topics:
|
||||
|
||||
{% data reusables.code-scanning.beta %}
|
||||
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
## About SARIF file uploads for {% data variables.product.prodname_code_scanning %}
|
||||
|
||||
@@ -36,12 +35,12 @@ topics:
|
||||
|
||||
You can generate SARIF files using many static analysis security testing tools, including {% data variables.product.prodname_codeql %}. The results must use SARIF version 2.1.0. For more information, see "[SARIF support for {% data variables.product.prodname_code_scanning %}](/code-security/secure-coding/sarif-support-for-code-scanning)."
|
||||
|
||||
You can upload the results using {% data variables.product.prodname_actions %}, the {% data variables.product.prodname_code_scanning %} API, {% ifversion fpt or ghes > 3.0 or ghae or ghec %}the {% data variables.product.prodname_codeql_cli %}, {% endif %}or the {% data variables.product.prodname_codeql_runner %}. The best upload method will depend on how you generate the SARIF file, for example, if you use:
|
||||
You can upload the results using {% data variables.product.prodname_actions %}, the {% data variables.product.prodname_code_scanning %} API,{% if codeql-runner-supported %} the {% data variables.product.prodname_codeql_runner %},{% endif %} or the {% data variables.product.prodname_codeql_cli %}. The best upload method will depend on how you generate the SARIF file, for example, if you use:
|
||||
|
||||
- {% data variables.product.prodname_actions %} to run the {% data variables.product.prodname_codeql %} action, there is no further action required. The {% data variables.product.prodname_codeql %} action uploads the SARIF file automatically when it completes analysis.
|
||||
- {% data variables.product.prodname_actions %} to run a SARIF-compatible analysis tool, you could update the workflow to include a final step that uploads the results (see below). {% ifversion fpt or ghes > 3.0 or ghae or ghec %}
|
||||
- The {% data variables.product.prodname_codeql_cli %} to run {% data variables.product.prodname_code_scanning %} in your CI system, you can use the CLI to upload results to {% data variables.product.prodname_dotcom %} (for more information, see "[Installing {% data variables.product.prodname_codeql_cli %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)").{% endif %}
|
||||
- The {% data variables.product.prodname_codeql_runner %}, to run {% data variables.product.prodname_code_scanning %} in your CI system, by default the runner automatically uploads results to {% data variables.product.prodname_dotcom %} on completion. If you block the automatic upload, when you are ready to upload results you can use the `upload` command (for more information, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)").
|
||||
- {% data variables.product.prodname_actions %} to run a SARIF-compatible analysis tool, you could update the workflow to include a final step that uploads the results (see below).
|
||||
- The {% data variables.product.prodname_codeql_cli %} to run {% data variables.product.prodname_code_scanning %} in your CI system, you can use the CLI to upload results to {% data variables.product.prodname_dotcom %} (for more information, see "[Installing {% data variables.product.prodname_codeql_cli %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)").{% if codeql-runner-supported %}
|
||||
- The {% data variables.product.prodname_codeql_runner %}, to run {% data variables.product.prodname_code_scanning %} in your CI system, by default the runner automatically uploads results to {% data variables.product.prodname_dotcom %} on completion. If you block the automatic upload, when you are ready to upload results you can use the `upload` command (for more information, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)").{% endif %}
|
||||
- A tool that generates results as an artifact outside of your repository, you can use the {% data variables.product.prodname_code_scanning %} API to upload the file (for more information, see "[Upload an analysis as SARIF data](/rest/reference/code-scanning#upload-an-analysis-as-sarif-data)").
|
||||
|
||||
{% data reusables.code-scanning.not-available %}
|
||||
@@ -143,7 +142,6 @@ jobs:
|
||||
## Further reading
|
||||
|
||||
- "[Workflow syntax for {% data variables.product.prodname_actions %}](/actions/reference/workflow-syntax-for-github-actions)"
|
||||
- "[Viewing your workflow history](/actions/managing-workflow-runs/viewing-workflow-run-history)"{%- ifversion fpt or ghes > 3.0 or ghae %}
|
||||
- "[About {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in your CI system](/code-security/secure-coding/about-codeql-code-scanning-in-your-ci-system)"{% else %}
|
||||
- "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)"{% endif %}
|
||||
- "[Viewing your workflow history](/actions/managing-workflow-runs/viewing-workflow-run-history)"
|
||||
- "[About {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in your CI system](/code-security/secure-coding/about-codeql-code-scanning-in-your-ci-system)"
|
||||
- "[Upload an analysis as SARIF data](/rest/reference/code-scanning#upload-an-analysis-as-sarif-data)"
|
||||
|
||||
@@ -54,9 +54,9 @@ For more information, see "[Installing {% data variables.product.prodname_codeql
|
||||
{% data reusables.code-scanning.licensing-note %}
|
||||
|
||||
{% ifversion ghes = 3.2 %}
|
||||
<!-- Content for GHES 3.2 only. CodeQL CLI 2.6.2, which introduces full feature parity between CodeQL CLI and CodeQL runner, is officially recommended for GHES 3.3+, so some people may need to use the CodeQL runner -->
|
||||
<!-- Content for GHES 3.2 only. CodeQL CLI 2.6.2, which introduces full feature parity between CodeQL CLI and CodeQL runner, is officially recommended for GHES 3.0+ -->
|
||||
|
||||
{% data reusables.code-scanning.use-codeql-runner-not-cli %}
|
||||
Since version 2.6.3, the {% data variables.product.prodname_codeql_cli %} has had full feature parity with the {% data variables.product.prodname_codeql_runner %}.
|
||||
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
@@ -65,39 +65,25 @@ For more information, see "[Installing {% data variables.product.prodname_codeql
|
||||
{% endif %}
|
||||
|
||||
<!--Content for GHES 3.1 only. Both CodeQL CLI and CodeQL runner are available -->
|
||||
{% ifversion ghes = 3.1 %}
|
||||
{% ifversion ghes < 3.2 %}
|
||||
You add the {% data variables.product.prodname_codeql_cli %} or the {% data variables.product.prodname_codeql_runner %} to your third-party system, then call the tool to analyze code and upload the SARIF results to {% data variables.product.product_name %}. The resulting {% data variables.product.prodname_code_scanning %} alerts are shown alongside any alerts generated within {% data variables.product.product_name %}.
|
||||
|
||||
[{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-cli-binaries/releases) version 2.6.3 is available now for {% data variables.product.prodname_ghe_server %} 3.0 and later versions. For more information on migrating to the {% data variables.product.prodname_codeql_cli %}, see "[Migrating from the CodeQL runner to CodeQL CLI](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/migrating-from-the-codeql-runner-to-codeql-cli)."
|
||||
|
||||
{% data reusables.code-scanning.upload-sarif-ghas %}
|
||||
|
||||
## Comparing {% data variables.product.prodname_codeql_cli %} and {% data variables.product.prodname_codeql_runner %}
|
||||
|
||||
{% data reusables.code-scanning.what-is-codeql-cli %}
|
||||
|
||||
The {% data variables.product.prodname_codeql_runner %} is a command-line tool that uses the {% data variables.product.prodname_codeql_cli %} to analyze code and upload the results to {% data variables.product.product_name %}. The tool mimics the analysis run natively within {% data variables.product.product_name %} using actions. The runner is able to integrate with more complex build environments than the CLI, but this ability makes it more difficult and error-prone to set up. It is also more difficult to debug any problems. Generally, it is better to use the {% data variables.product.prodname_codeql_cli %} directly unless it doesn't support your use case.
|
||||
The {% data variables.product.prodname_codeql_runner %} is a deprecated command-line tool that uses the {% data variables.product.prodname_codeql_cli %} to analyze code and upload the results to {% data variables.product.product_name %}. The tool mimics the analysis run natively within {% data variables.product.product_name %} using actions.
|
||||
|
||||
Use the {% data variables.product.prodname_codeql_cli %} to analyze:
|
||||
|
||||
- Dynamic languages, for example, JavaScript and Python.
|
||||
- Codebases with a compiled language that can be built with a single command or by running a single script.
|
||||
{% data variables.product.prodname_codeql_cli %} 2.6.3 is a complete replacement for the runner with full feature parity. Generally, it is better to use the {% data variables.product.prodname_codeql_cli %} directly.
|
||||
|
||||
For more information, see "[Installing {% data variables.product.prodname_codeql_cli %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system)."
|
||||
|
||||
{% data reusables.code-scanning.use-codeql-runner-not-cli %}
|
||||
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
For more information, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)."
|
||||
For more information about the {% data variables.product.prodname_codeql_runner %}, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)."
|
||||
|
||||
{% endif %}
|
||||
|
||||
<!--Content for GHES 3.0 only. Only CodeQL runner is available -->
|
||||
{% ifversion ghes = 3.0 %}
|
||||
{% data reusables.code-scanning.upload-sarif-ghas %}
|
||||
|
||||
You add the {% data variables.product.prodname_codeql_runner %} to your third-party system, then call the tool to analyze code and upload the SARIF results to {% data variables.product.product_name %}. The resulting {% data variables.product.prodname_code_scanning %} alerts are shown alongside any alerts generated within {% data variables.product.product_name %}.
|
||||
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
To set up code scanning in your CI system, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/running-codeql-runner-in-your-ci-system)."
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
@@ -8,7 +8,7 @@ redirect_from:
|
||||
- /code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/configuring-codeql-cli-in-your-ci-system
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '>=3.1'
|
||||
ghes: '>=3.0'
|
||||
ghae: '*'
|
||||
ghec: '*'
|
||||
type: how_to
|
||||
@@ -24,6 +24,14 @@ topics:
|
||||
---
|
||||
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
||||
|
||||
{% ifversion ghes or ghae %}
|
||||
{% note %}
|
||||
|
||||
**Note:** This article describes features present in the version of {% data variables.product.prodname_codeql_cli %} available at the time of the release of {% data variables.product.product_name %}. If your enterprise uses a more recent version of {% data variables.product.prodname_codeql_cli %}, see the [{% data variables.product.prodname_ghe_cloud %} documentation](/enterprise-cloud@latest/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/configuring-codeql-cli-in-your-ci-system) instead.
|
||||
|
||||
{% endnote %}
|
||||
{% endif %}
|
||||
|
||||
## About generating code scanning results with {% data variables.product.prodname_codeql_cli %}
|
||||
|
||||
Once you've made the {% data variables.product.prodname_codeql_cli %} available to servers in your CI system, and ensured that they can authenticate with {% data variables.product.product_name %}, you're ready to generate data.
|
||||
@@ -329,22 +337,6 @@ By default, {% data variables.product.prodname_code_scanning %} expects one SARI
|
||||
|
||||
If you want to upload more than one set of results to the {% data variables.product.prodname_code_scanning %} API for a commit in a repository, you must identify each set of results as a unique set. For repositories where you create more than one {% data variables.product.prodname_codeql %} database to analyze for each commit, use the `--sarif-category` option to specify a language or other unique category for each SARIF file that you generate for that repository.
|
||||
|
||||
### Alternative if your CI system cannot trigger the {% data variables.product.prodname_codeql_cli %}
|
||||
|
||||
{% ifversion fpt or ghes > 3.2 or ghae or ghec %}
|
||||
|
||||
If your CI system cannot trigger the {% data variables.product.prodname_codeql_cli %} autobuild and you cannot specify a command line for the build, you can use indirect build tracing to create {% data variables.product.prodname_codeql %} databases for compiled languages. For more information, see [Using indirect build tracing](https://codeql.github.com/docs/codeql-cli/creating-codeql-databases/#using-indirect-build-tracing) in the documentation for the {% data variables.product.prodname_codeql_cli %}.
|
||||
|
||||
{% endif %}
|
||||
|
||||
{% ifversion ghes < 3.3 %}
|
||||
|
||||
{% data reusables.code-scanning.use-codeql-runner-not-cli %}
|
||||
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
|
||||
{% endif %}
|
||||
|
||||
{% endif %}
|
||||
|
||||
## Further reading
|
||||
|
||||
@@ -11,10 +11,7 @@ redirect_from:
|
||||
- /code-security/secure-coding/configuring-codeql-runner-in-your-ci-system
|
||||
- /code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/configuring-codeql-runner-in-your-ci-system
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
ghae: '*'
|
||||
ghec: '*'
|
||||
feature: 'codeql-runner-supported'
|
||||
type: how_to
|
||||
topics:
|
||||
- Advanced Security
|
||||
|
||||
@@ -6,7 +6,7 @@ product: '{% data reusables.gated-features.code-scanning %}'
|
||||
miniTocMaxHeadingLevel: 3
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '>=3.1'
|
||||
ghes: '>=3.0'
|
||||
ghae: '*'
|
||||
ghec: '*'
|
||||
type: how_to
|
||||
@@ -44,6 +44,17 @@ You should download the {% data variables.product.prodname_codeql %} bundle from
|
||||
- A compatible version of the queries and libraries from https://github.com/github/codeql
|
||||
- Precompiled versions of all the queries included in the bundle
|
||||
|
||||
{% ifversion ghes %}
|
||||
|
||||
{% note %}
|
||||
{% ifversion ghes = 3.0 %}For {% data variables.product.prodname_ghe_server %} 3.0, we recommend {% data variables.product.prodname_codeql_cli %} version 2.6.3.{% endif %}
|
||||
{% ifversion ghes = 3.1 %}For {% data variables.product.prodname_ghe_server %} 3.1, we recommend {% data variables.product.prodname_codeql_cli %} version 2.6.3.{% endif %}
|
||||
{% ifversion ghes = 3.2 %}For {% data variables.product.prodname_ghe_server %} 3.2, we recommend {% data variables.product.prodname_codeql_cli %} version 2.6.3.{% endif %}
|
||||
{% ifversion ghes > 3.2 %}For {% data variables.product.prodname_ghe_server %} 3.3 and greater, we recommend {% data variables.product.prodname_codeql_cli %} version 2.7.6 or greater.{% endif %}
|
||||
{% endnote %}
|
||||
|
||||
{% endif %}
|
||||
|
||||
You should always use the {% data variables.product.prodname_codeql %} bundle as this ensures compatibility and also gives much better performance than a separate download of the {% data variables.product.prodname_codeql_cli %} and checkout of the {% data variables.product.prodname_codeql %} queries. If you will only be running the CLI on one specific platform, download the appropriate `codeql-bundle-PLATFORM.tar.gz` file. Alternatively, you can download `codeql-bundle.tar.gz`, which contains the CLI for all supported platforms.
|
||||
|
||||
{% data reusables.code-scanning.beta-codeql-packs-cli %}
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: 'You can use the {% data variables.product.prodname_codeql_cli %} to comp
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '>=3.1'
|
||||
ghes: '>=3.0'
|
||||
ghae: '*'
|
||||
ghec: '*'
|
||||
topics:
|
||||
|
||||
@@ -28,6 +28,8 @@ topics:
|
||||
|
||||
<!--UI-LINK: When GitHub Enterprise Server <=3.0 doesn't have GitHub Actions set up, the Security > Code scanning alerts view links to this article.-->
|
||||
|
||||
{% if codeql-runner-supported %}
|
||||
|
||||
{% data reusables.code-scanning.deprecation-codeql-runner %}
|
||||
{% data reusables.code-scanning.beta %}
|
||||
{% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
||||
@@ -182,3 +184,17 @@ This example is similar to the previous example, however this time the repositor
|
||||
|
||||
- "[Configuring {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/configuring-codeql-runner-in-your-ci-system)"
|
||||
- "[Troubleshooting {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/troubleshooting-codeql-runner-in-your-ci-system)"
|
||||
|
||||
{% else %}
|
||||
|
||||
## About the {% data variables.product.prodname_codeql_runner %}
|
||||
|
||||
The {% data variables.product.prodname_codeql_runner %} has been deprecated. [{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-cli-binaries/releases) version 2.7.6 has complete feature parity.
|
||||
|
||||
For information on migrating to {% data variables.product.prodname_codeql_cli %}, see "[Migrating from the CodeQL runner to CodeQL CLI](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/migrating-from-the-codeql-runner-to-codeql-cli)."
|
||||
|
||||
## Further reading
|
||||
|
||||
- [CodeQL runner deprecation](https://github.blog/changelog/2021-09-21-codeql-runner-deprecation/) in the GitHub Blog
|
||||
|
||||
{% endif %}
|
||||
@@ -10,10 +10,7 @@ redirect_from:
|
||||
- /code-security/secure-coding/troubleshooting-codeql-runner-in-your-ci-system
|
||||
- /code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/troubleshooting-codeql-runner-in-your-ci-system
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghes: '*'
|
||||
ghae: '*'
|
||||
ghec: '*'
|
||||
feature: 'codeql-runner-supported'
|
||||
type: how_to
|
||||
topics:
|
||||
- Advanced Security
|
||||
|
||||
6
data/features/codeql-runner-supported.yml
Normal file
6
data/features/codeql-runner-supported.yml
Normal file
@@ -0,0 +1,6 @@
|
||||
# Tracking deprecation of CodeQL runner
|
||||
versions:
|
||||
fpt: '*'
|
||||
ghec: '*'
|
||||
ghes: '*'
|
||||
ghae: '*'
|
||||
@@ -1,7 +1,23 @@
|
||||
{% note %}
|
||||
|
||||
**Note:** The {% data variables.product.prodname_codeql_runner %} is being deprecated. Please use the [{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-cli-binaries/releases) version 2.6.2 or greater instead.
|
||||
{% data variables.product.prodname_ghe_server %} 3.3 will be the final release series that supports the {% data variables.product.prodname_codeql_runner %}. On {% data variables.product.prodname_ghe_cloud %}, the {% data variables.product.prodname_codeql_runner %} will be supported until March 2022.
|
||||
For more information, see [the CodeQL runner deprecation](https://github.blog/changelog/2021-09-21-codeql-runner-deprecation/).
|
||||
{% ifversion fpt or ghec %}
|
||||
|
||||
**Note:** The {% data variables.product.prodname_codeql_runner %} is being deprecated. On {% data variables.product.product_name %}, the {% data variables.product.prodname_codeql_runner %} will be supported until March 2022. You should upgrade to the latest version of [{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-action/releases).
|
||||
|
||||
{% elsif ghes > 3.3 %}
|
||||
|
||||
**Note:** The {% data variables.product.prodname_codeql_runner %} has been deprecated and is not included in {% data variables.product.prodname_ghe_server %} 3.4. You should migrate to [{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-action/releases) version 2.7.6.
|
||||
|
||||
{% elsif ghes < 3.4 %}
|
||||
|
||||
**Note:** The {% data variables.product.prodname_codeql_runner %} is being deprecated. On {% data variables.product.prodname_ghe_server %} 3.0 and greater, you can install [{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-action/releases) version 2.6.3 to replace {% data variables.product.prodname_codeql_runner %}.
|
||||
|
||||
{% elsif ghae %}
|
||||
|
||||
**Note:** The {% data variables.product.prodname_codeql_runner %} has been deprecated. You should migrate to [{% data variables.product.prodname_codeql_cli %}](https://github.com/github/codeql-action/releases).
|
||||
|
||||
{% endif %}
|
||||
|
||||
For more information, see [the CodeQL runner deprecation](https://github.blog/changelog/2021-09-21-codeql-runner-deprecation/). For information on migrating to {% data variables.product.prodname_codeql_cli %}, see "[Migrating from the CodeQL runner to CodeQL CLI](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/migrating-from-the-codeql-runner-to-codeql-cli)."
|
||||
|
||||
{% endnote %}
|
||||
|
||||
@@ -1,8 +1,4 @@
|
||||
| <nobr>Type of analysis</nobr> | Options for generating alerts |
|
||||
|------------------|-------------------------------|
|
||||
{%- ifversion fpt or ghes > 3.0 or ghae %}
|
||||
| {% data variables.product.prodname_codeql %} | Using {% data variables.product.prodname_actions %} (see "[Setting up {% data variables.product.prodname_code_scanning %} using actions](/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/setting-up-code-scanning-for-a-repository#setting-up-code-scanning-using-actions)") or running {% data variables.product.prodname_codeql %} analysis in a third-party continuous integration (CI) system (see "[About {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in your CI system](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system)").
|
||||
{%- else %}
|
||||
| {% data variables.product.prodname_codeql %} | Using {% data variables.product.prodname_actions %} (see "[Setting up {% data variables.product.prodname_code_scanning %} using actions](/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/setting-up-code-scanning-for-a-repository#setting-up-code-scanning-using-actions)") or using the {% data variables.product.prodname_codeql_runner %} in a third-party continuous integration (CI) system (see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/running-codeql-runner-in-your-ci-system)").
|
||||
{%- endif %}
|
||||
| Third‑party | Using {% data variables.product.prodname_actions %} (see "[Setting up {% data variables.product.prodname_code_scanning %} using actions](/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/setting-up-code-scanning-for-a-repository#setting-up-code-scanning-using-actions)") or generated externally and uploaded to {% data variables.product.product_name %} (see "[Uploading a SARIF file to {% data variables.product.prodname_dotcom %}](/code-security/code-scanning/integrating-with-code-scanning/uploading-a-sarif-file-to-github)").|
|
||||
|
||||
@@ -1,9 +0,0 @@
|
||||
{% ifversion fpt or ghes > 3.1 or ghae or ghec %}
|
||||
If the {% data variables.product.prodname_codeql_cli %} is unsuitable for use in your CI system, the {% data variables.product.prodname_codeql_runner %} is available as an alternative. Typically, this is needed if the CI system would need to orchestrate compiler invocations as well as running {% data variables.product.prodname_codeql %} analysis. For more information, see "[Running {% data variables.product.prodname_codeql_runner %} in your CI system](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/running-codeql-runner-in-your-ci-system)."
|
||||
{% endif %}
|
||||
|
||||
{% ifversion ghes = 3.1 %}
|
||||
You will need to use the {% data variables.product.prodname_codeql_runner %} if you need to:
|
||||
- Set up the CI system to orchestrate compiler invocations as well as running {% data variables.product.prodname_codeql %} analysis.
|
||||
- Analyze more than one language in a repository.
|
||||
{% endif %}
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ad495955bf4dbf471ff73384117657af07d4febfd430d332410e6487a4601867
|
||||
size 661523
|
||||
oid sha256:5ca55a51f21f0249e262f82f3a4d950305d88760a007b0c47d7194b111d74ac0
|
||||
size 661090
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:5ad03c624fd895682493a613f0d52d592cc28f45f0157394c24c6bcb34d49b57
|
||||
size 1377641
|
||||
oid sha256:630a3d2acb5049116e25a099555dc1a43391cbea717930fbea23457062a54c09
|
||||
size 1377782
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:55092e613eab6c38284ddc5f695466d16fe67f28eb662881ce138a09c3bdab5b
|
||||
size 979739
|
||||
oid sha256:f81b11d506ad60afe58ff173effb22193f3423b6b6196ca93f395fe981cdb29e
|
||||
size 981515
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:e46fc8b08c5dafa39171231434e113181e481e70bc936c26f4af77be35192a34
|
||||
size 3989151
|
||||
oid sha256:15be05f347b8659164d0a2fd33836e53d17771cffe11b7e7c3c416eedc8c6083
|
||||
size 3988493
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:d9a44cad36399623e67812bd04fadd4b301506dba1f704e66746f918dae9aa29
|
||||
size 614734
|
||||
oid sha256:17790468dc0526a0c0f529b9790be6c53d7966ee800283fae644812c50319ba2
|
||||
size 614888
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:666bb6ea14b3285420cb53ddfd61b96e8c54bfdee5586e557909d52306081db8
|
||||
size 2571661
|
||||
oid sha256:3645b251b9a659af3db16d141ac14cfdede364ab59fb96e132525a1293905917
|
||||
size 2573025
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:8a5f856f1cd6f32b5ccc30c7c9700e78391d0620dbc71ed6b219fef207d25e7d
|
||||
size 680096
|
||||
oid sha256:a974994571a167ed56180607ea0eaf27c77018582f80d5cfe21c048c2a5b6139
|
||||
size 679774
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:28717e93df6608c3ce5d73722a0fe28096888320057932f266fead61e0c56e8a
|
||||
size 3598394
|
||||
oid sha256:722e3714f16e2b7bf1ff238dfaf14ddffebc0d8ab2889db013d5eb6b8c88551e
|
||||
size 3596168
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:bc5c4b1ac7bd72100f98078b8f1d69e776471a24e9bc0514141eb3e98c8b3023
|
||||
size 606078
|
||||
oid sha256:478588b19238f427ce4ce6eba2a5fddf9aac54fe944062a0db846ec5bf61f853
|
||||
size 605225
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:f1f741dd3dcda753c9307bd336f0c4a00ca300375155d51e7d0db51e0918bd25
|
||||
size 2466806
|
||||
oid sha256:9d8a19abc4bd82c332c9309cf2aeb6b5d15bfad029b68c8c0af08f3ed0c2fe7d
|
||||
size 2467042
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:2401c7797a3c30fba923d0ed54331df67911e2d85292628a3327e288d6e3d3b2
|
||||
size 675282
|
||||
oid sha256:f27a294cba9e18c64d4f7658b2f478fb6fef0c19c01bf80b658ca59e252cac11
|
||||
size 675258
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:95c2321b8587ad217d4c2558498615bcbe186fcff1de15d950ca484f037060d8
|
||||
size 1413900
|
||||
oid sha256:2d810a8f3ed5028f17f96daacc38da5ea18cb07a46760b1aab5272cc7a827013
|
||||
size 1414923
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:f0c6b6f75fc051cefc0f5a1c5307c8c3d4e0d8d20c87f65dc39977997b389560
|
||||
size 1005018
|
||||
oid sha256:19c45a4b45fef9e20904e1e579daa4f19b22885c646c5aa20e1d9f6f4275a3da
|
||||
size 1005672
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:b8d854bb453c129c459229683f1f386273f8ac642e371b85aa8716f542974cb9
|
||||
size 4077692
|
||||
oid sha256:96c7e7af40255f9e5a21471d5542e3ffa03674b4733d89e4f76ed7ceeb089d26
|
||||
size 4078909
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:f590dc84c133e2e733cadde4788fd36bbd4992495a44c05e8e9641d4f0c04315
|
||||
size 626202
|
||||
oid sha256:587508815e317a38165b8ef2e68aa21b57cdd7d55a94c57a7f5d3a6a369ef791
|
||||
size 626259
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:47ac7e471aed6604b9edcce596f17501cb2741bf4182e7c42c84503a25d83d7b
|
||||
size 2632609
|
||||
oid sha256:6cabd528a9130c61ab399ece3eadd9b72339ef12d62b25c0dbd40a70c6ef0515
|
||||
size 2631786
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:a6726d64418ea8c768e9a5e72f0f377e49b48a2f4ed8e2905a8d6eef016677cf
|
||||
size 694174
|
||||
oid sha256:ee2c52376e5bed0f4d4a94e67bf5355bcfcf632f7170dfebd5b1cb2686acc803
|
||||
size 694025
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:7033475bd2828f6236c887b3746d8a93ec52d550c56422e646ae55063d632c94
|
||||
size 3679134
|
||||
oid sha256:c3350029ee41b8ea12ac5327c4283d95b890f99e6e0d2b8bac5ed7162fa65ae4
|
||||
size 3678098
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:188b07f5c8c04bccd252676415a3ced2cb4b968f4f578056b70dbc6b4865ad33
|
||||
size 617214
|
||||
oid sha256:6b3bebee69466a670bc4b29a958ae3b855b1003341d65e4f1a062e2cd4ca7ad8
|
||||
size 617782
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:fd658c5fb357920bd1f49349f79097d59f130670e913ed009e0885b0dc34b861
|
||||
size 2519431
|
||||
oid sha256:05b36b62510a0320f1f8cf67eb99b6ab6d91899c0c3dc7fa9bb18bfc43e31cef
|
||||
size 2521608
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:915a06d90236340a4b4372b93e44a55434acd531eca3ded771defbd13e4aba4b
|
||||
size 690251
|
||||
oid sha256:883fed2c02193257ab42553c993ff1ea56d72200befc5cf5b8798e25793fbd7c
|
||||
size 690624
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:233423a48886ea0fb7bd542f40cc7f45b2e41eb9f730882e9e1a428ac9e0e55a
|
||||
size 1446159
|
||||
oid sha256:5a03cb5ca51b7b71c54c57d200da27bb393c0e9d064815a7bd58b8d1d75ac4b3
|
||||
size 1445439
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:869eacd89cb812dfb884e06ce77f5335a2aa73069cc38a2f776363cf168eb9da
|
||||
size 1037730
|
||||
oid sha256:5bd102cbb37968dc1f2cc11ad8c587c58f87376b52b3337ea9f534fe4ef7bd29
|
||||
size 1037654
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:df7de3478533adc4e4e6f7586d7ac25acac20cd642f7abd92d2525addc1909d6
|
||||
size 4210326
|
||||
oid sha256:de25ed238eee7223f1320e895609b6c22d6c7092bc6450aac08ebf55548a4f7a
|
||||
size 4211084
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:c417de5bc9d32897568c66608db3fab9a532fb626f2272c58a95ec1c647ef669
|
||||
size 640659
|
||||
oid sha256:d521473dbb6103ecc0f1e5a4c1324a37e29df2bc3219fbdf8b586593d2fe5105
|
||||
size 641647
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:6f447a6f7f487b5beb870e10a4744753a2acef614a0c6fba62ad1e55894af2b0
|
||||
size 2692986
|
||||
oid sha256:0f4cd43fb487bdf27007719a25ab2016fd948931ed216225c570311561ac120c
|
||||
size 2694889
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:b4479845ed1bdc56a665303b5e228dfbbe19e048c883b240d177eebccafd564f
|
||||
size 707720
|
||||
oid sha256:6e2fec78fdde691f4d1d81d6f4daada690011694e337fd82298936ffdf6ae891
|
||||
size 707472
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:805de48302d421d89cb7de5ed87f563b7c28e6bc31856d884073221228911db5
|
||||
size 3760558
|
||||
oid sha256:c86cc09420d5420410e819073d06f6c454966d31cc9d362d81c3656abec44064
|
||||
size 3758100
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:bdf9412b1ee1727d2ef8ec8a8dae728eebe5a64509f1e4198ea1ae046de3bf2b
|
||||
size 630968
|
||||
oid sha256:c03ffbdd7db5de5ed98f6237b865ad6f27ed51fa626b327bc61dd3588ee852fd
|
||||
size 630817
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:950db6f7dcd9d2ee5d0ac691126c7066e8640f0e00cdaa0e38acd654257cccb2
|
||||
size 2578754
|
||||
oid sha256:9ffd929222f10237e59e2f59255e81703e45b0aaf73552ab2593cb3d2ed14977
|
||||
size 2576138
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0a72f5dd062b0e1628016f706906342a3e198f248bfb0951ed0c4ba8472c5330
|
||||
size 712899
|
||||
oid sha256:4997dffdfca4857a08a8b1f8146beee58fbb3c454489d667dc3c7d6605dfd945
|
||||
size 712652
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:b4e6db2740dbb871cfbcdc730b845d1276a0af00a22e66eaa30839dc2706933b
|
||||
size 1505664
|
||||
oid sha256:b7ede44e2bcce32fae4fe49de5486e5cc914a350a23e065757158e1092bd774c
|
||||
size 1505506
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:96e6d0ac4483be6d5a2b0567f17a1ddb414058703c7607e080fb23fe045e7d64
|
||||
size 1073502
|
||||
oid sha256:f5e1e944e1b5a57ff595fa71125f0506f1dc2c5cf5d33d65de9065df7859aabc
|
||||
size 1077194
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:06d26640d0668fce291b6b99c92b0a43ab7f2fc36843112423923a0d52e864ab
|
||||
size 4313205
|
||||
oid sha256:fa42fe856f786714e1d908a2285c29d86cd88d4151e674f5a7e7bf8796a3aa4a
|
||||
size 4310996
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ed3ef73ec189760efa247b361d00d011925d70b25aa3f67754ef9d52ca735cd6
|
||||
size 660641
|
||||
oid sha256:80d7b5cb87315ad8f4b8c16b03610995898b725368a14a5420bc6c07da00d448
|
||||
size 660074
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:832bd101501946de847558f5048bf61f9b3286f6079e8f9445101b3bbf41e6d6
|
||||
size 2795859
|
||||
oid sha256:838321eaa2c0b6d606a68aa4480d644734310ab5cd5ac636f459052ef46e113e
|
||||
size 2796983
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:0aa05ef0f2c91bda47f3b13a415191efa2053ef0d478ce5f0363e1c547d34a28
|
||||
size 730845
|
||||
oid sha256:23ed6283dbfe54503684105f15a08e83641635a77da62e7e09bde9bea654cd8b
|
||||
size 731117
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:c6b3477463aa7ce1aa714f23cfb62a755c3c6000cfd16ca26461808ffd3300b0
|
||||
size 3885440
|
||||
oid sha256:46c45a3d2627935b6160473e7402ca5bd39d0216975e75e5ddf263b215525226
|
||||
size 3885937
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:64124d66a630fec0d14d2078d44c12b6a0e805a86404a92bf9efeea16d0b4a2a
|
||||
size 650744
|
||||
oid sha256:04174d2888b41be55174defecb70300345f0f7445713aaaf15117557b842e36f
|
||||
size 650084
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:d8d6e54b1b2efde0044ec8e5a13ae4f9e15b13b8c0162119de864be22330eb33
|
||||
size 2659878
|
||||
oid sha256:70da60665ef860ff22bb55e3d72ddff87e72afd2d0d81ed5d3035e3344bd08c6
|
||||
size 2659202
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:b6b70df7657927142c3044994d780da0232e81bf5c81d92f29228be2d286cda9
|
||||
size 913561
|
||||
oid sha256:156c409b18ff2c737779a4c393c5fdad5e15dfc71ce43871857e72302d4d4f29
|
||||
size 914421
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:d22d36852b06fa338883bc71f72e2865fbb38a3be87b4e6894c1355737935f79
|
||||
size 1683070
|
||||
oid sha256:e7db77c47fd2fef54d057d1353f977f6e41d8ccc12628f3f3bfe839cd50487a5
|
||||
size 1683826
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:5b2df0016b9d815939adb5fad570038317bd55ee5feed797c20a71386bd8de4f
|
||||
size 1362871
|
||||
oid sha256:1fbc6c728288c1258f530cf68fd4525dc975bddcb75d8b64ae1bdb19ef4041c6
|
||||
size 1363949
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:096b3892b67ffd9137c3eb7b230e30e1386d53aa267da609136cb1fc20f0cb96
|
||||
size 5202022
|
||||
oid sha256:f85edaebc2585ff62305cbed74da862a9912e59dcf7719e8ded0ac244db615f7
|
||||
size 5201451
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:7b5609f12f94015845b5c548081c549a2c98fc248271c5a5338bea5a1ce563c2
|
||||
size 829425
|
||||
oid sha256:9ea724e6b0310969a7697d17f1b5444bf6075af29faa7dfa46e55b889a2f1e37
|
||||
size 829997
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:b34a6c0bc4b9c4a46e1ef559a760ae13674435787aef9eed54bc893ed8aca0f2
|
||||
size 3352707
|
||||
oid sha256:eac3bc71ae04751e315b120158212b24902a0901328a72438fec7dcad11dbe80
|
||||
size 3353653
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3d33f9a7393939783e4d3e3096e6ca5503870b34433938f08a03fd0542a34292
|
||||
size 932489
|
||||
oid sha256:9aedee7846e502e45454a1ab718e70f77bf093dfd7a6402dcb846581b645a0de
|
||||
size 934269
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3ab3c7ddb0245fc369a36ea67ce0042c532fc022b2f2a5b4726ee4d2218e60e4
|
||||
size 4746133
|
||||
oid sha256:2328725936f23ac96186717c065e3a7a03e075add70075aa6e050ac802c7e02e
|
||||
size 4747740
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ba48313cf5878d45ce342758356c028dde6c019d767998d7df71906730385c46
|
||||
size 820358
|
||||
oid sha256:f8df12c0e67ba91ffcd1e9222958e41ae74fa51d34217f67b33a8e9aa2aff6a6
|
||||
size 820425
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:4be930827ff2cab6ad6c18da618498d8da5445e4abd0c73e56ee6dc6deac9ec4
|
||||
size 3195820
|
||||
oid sha256:69a16cbe1b6a6a151ca52592e4b33b61c2ba1a65b5ebf1f8f74fe980fb714f08
|
||||
size 3195441
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:96a76ad2ae2e23d2cafc71fbe5a760e6e7ede83bef7635cc03ba4906c9eb1f1e
|
||||
size 559467
|
||||
oid sha256:db81e63e98fad9dfb4905d46e7299a8dbaa223d04ad44f36b19cc0cce2d05cd3
|
||||
size 560356
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3754c6bda2308aedba5d66acc6ea156f8f64969b462a733146c26d8d3e93b8de
|
||||
size 1127318
|
||||
oid sha256:d744a82d142acc04490668fa65a736eaf0613cc286a63b35e1829261da88af48
|
||||
size 1127981
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:728017aa0e305bca0e37bef4f85e8e42fb7e4a2e8e08814713a665945aa72c49
|
||||
size 858190
|
||||
oid sha256:e617a08a9e01a41de38bd5b69bf3a761a65114a59a6d822f7288e0d00cb240b5
|
||||
size 858492
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:d1227d56b3eb198f83640056bd743b4f234f1b2ad20644ea03f06eff34529284
|
||||
size 3434582
|
||||
oid sha256:fbaae38f16d1b0626612ac16a7f1ec87804d7a35a610786560e121ba3aa5c798
|
||||
size 3433176
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:c4fd97bb4345d12f0e063e70b4b376f1d53b63f1aabf95387e7ec355b601da61
|
||||
size 519495
|
||||
oid sha256:abb19f02df2c620c558ad6679c5a8bff9c00e35dd4d2b5aaf692c2ed08a2ca88
|
||||
size 520572
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:811e8f249e5c028e8a09fda609c702d42940de21060152bd8e65f7abc6d5480d
|
||||
size 2115662
|
||||
oid sha256:0c274e9747b3d8834adeeb813c4f4ada040abc312034ce4ffa8455873d6d1913
|
||||
size 2117646
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ad63cf60d4399157b2aa910d81520aeacde42dc5552aa4199bf82f067434a0a6
|
||||
size 571996
|
||||
oid sha256:74dad1a99b8a3d35d15841ff08eacd19e3eed3718500b9fffef7c1cb07b0283f
|
||||
size 572172
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:7764209b0698957bd0975e15b3436412dcc820545a621cf5114c0c3ba50b9980
|
||||
size 2931596
|
||||
oid sha256:7fc9e97af97a8da5fc2384efeae170ba41d385bd259179d05c499b03ab0778d7
|
||||
size 2931138
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:14d93c2b5c45c957317bcef3cba11171fe8a6e06e694876a6a124d183727b26a
|
||||
size 512144
|
||||
oid sha256:9105e609b6f45392837c376d46a8ecacdb4a7e7a9caed37c0f1c04b3e12b336c
|
||||
size 512673
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3f8f63042d5f74253c9a021b4aede4f7248338f5a7724744223393597d496049
|
||||
size 2007530
|
||||
oid sha256:5aad20658ce06d2968eaf392a3b2c88b22958bc2481b7c27485c82c54893e6b0
|
||||
size 2007815
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ab59b269a618453c2587d881603ba915aca0f88a97e5bce2bd4ef2aa19d61575
|
||||
size 841049
|
||||
oid sha256:a24359be4e6c8c70f787bfc679767fab965eb8cfbd7f9e620953bdc9d4235cf8
|
||||
size 841055
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:607042ae1f0da3ea6feb304b9a84de2f05722c130c875c107a62ad12050fbb0a
|
||||
size 1751854
|
||||
oid sha256:56a2e30655e1f78f6de30cd9f0226584c0d8ae31b89e15bf4629560652676dfb
|
||||
size 1752199
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:4527da07c61aa62b2cbf4592e9c8b5f66267a1a7620097973530bc333428ce90
|
||||
size 1239184
|
||||
oid sha256:7ab9bc41d804f09ac45c9abcb28756de1b31f87996f0f8ccc105d0c20dd6ee8b
|
||||
size 1233963
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:adae1cf914eeef685804ab4aabf56989b13a1c08ec29b673424254df40c45005
|
||||
size 4983993
|
||||
oid sha256:80cdea7f001b52e4050a2ca70d3eec0d24abe95f7f7fc59e767fac2743ffff4d
|
||||
size 4984580
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:ff4d540983d43a8b4d7efccfcd9f6d6fd57488819fb46aa7c7cf781ebc2a908f
|
||||
size 788733
|
||||
oid sha256:c007b66447696f9affec1844dba168eb148422df8e31f810bab659e09a04ba19
|
||||
size 787284
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:8dbb00d9602ee4fee16709a27ed16e6927beac56ff57f9d7c385f78b0abe8b88
|
||||
size 3339849
|
||||
oid sha256:037813b8bd187c975faefc6414d58610ac7e0eb4e57dc7f924343a2ea8498352
|
||||
size 3337862
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:4930f50255ca5f8bc21b734350e0d5680fc9806513b329c9be547b7993d7a097
|
||||
size 861784
|
||||
oid sha256:033e3a4ff5d22c8086326d8722fd28f6e31b3cda1e7079dc2114521449200c67
|
||||
size 863218
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:4f0e05861b6045d32c923a45dc4dc89336fe6399222ee7729c71b6354d021c5d
|
||||
size 4613765
|
||||
oid sha256:b437e6a136a2be56a68aa3b36576f3b979a20daccc4667582da589e213d7f9ba
|
||||
size 4616456
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:4efb5e828997ef06f7901b3bedbb848fd1de6fce81e7afac22f380d69f58bdcd
|
||||
size 777032
|
||||
oid sha256:0e6b8b9ee0033c79084223803f8d3b9d3f2b8ff58b4520a55276c13c4238da54
|
||||
size 779194
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:2223b6ab597be5bb310880ecbda27ed000ed67d1a1ffce8ba89725ff1f152b97
|
||||
size 3174248
|
||||
oid sha256:e3439998d986926d5b3f62a106acf2dc3bdd36193d08dbd0ee0d2762a1bdcfee
|
||||
size 3175848
|
||||
|
||||
Reference in New Issue
Block a user