ran script/content-migrations/use-short-versions.js
This commit is contained in:
@@ -3,7 +3,7 @@ title: About code scanning
|
||||
intro: 'You can use {% data variables.product.prodname_code_scanning %} to find security vulnerabilities and errors in the code for your project on {% data variables.product.prodname_dotcom %}.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -5,7 +5,7 @@ product: '{% data reusables.gated-features.code-scanning %}'
|
||||
permissions: 'People with write permissions to a repository can configure {% data variables.product.prodname_code_scanning %} for the repository.'
|
||||
miniTocMaxHeadingLevel: 3
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
@@ -156,7 +156,7 @@ If your workflow does not contain a matrix called `language`, then {% data varia
|
||||
with:
|
||||
languages: cpp, csharp, python
|
||||
```
|
||||
{% if currentVersion == "free-pro-team@latest" %}
|
||||
{% ifversion fpt %}
|
||||
## Analyzing Python dependencies
|
||||
|
||||
For GitHub-hosted runners that use Linux only, the {% data variables.product.prodname_codeql_workflow %} will try to auto-install Python dependencies to give more results for the CodeQL analysis. You can control this behavior by specifying the `setup-python-dependencies` parameter for the action called by the "Initialize CodeQL" step. By default, this parameter is set to `true`:
|
||||
@@ -171,7 +171,7 @@ Alternatively, you can install Python dependencies manually on any operating sys
|
||||
jobs:
|
||||
CodeQL-Build:
|
||||
|
||||
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
|
||||
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
|
||||
permissions:
|
||||
security-events: write
|
||||
actions: read{% endif %}
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: 'You can configure how {% data variables.product.prodname_dotcom %} uses
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
permissions: 'If you have write permissions to a repository, you can configure {% data variables.product.prodname_code_scanning %} for that repository.'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: Scanning automatically
|
||||
intro: 'You can find vulnerabilities and errors in your project''s code on {% data variables.product.prodname_dotcom %}, as well as view, triage, understand, and resolve the related {% data variables.product.prodname_code_scanning %} alerts.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: 'From the security view, you can view, fix, or close alerts for potential
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
permissions: 'If you have write permission to a repository you can manage {% data variables.product.prodname_code_scanning %} alerts for that repository.'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository
|
||||
---
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: '{% data variables.product.prodname_code_scanning_capc %} in a conta
|
||||
intro: 'You can run {% data variables.product.prodname_code_scanning %} in a container by ensuring that all processes run in the same container.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
@@ -46,7 +46,7 @@ on:
|
||||
jobs:
|
||||
analyze:
|
||||
name: Analyze
|
||||
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
|
||||
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
|
||||
permissions:
|
||||
security-events: write
|
||||
actions: read{% endif %}
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: 'You can set up {% data variables.product.prodname_code_scanning %} by ad
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
permissions: 'If you have write permissions to a repository, you can set up or configure {% data variables.product.prodname_code_scanning %} for that repository.'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: 'When {% data variables.product.prodname_code_scanning %} identifies a pr
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
permissions: 'If you have read permission for a repository, you can see annotations on pull requests. With write permission, you can see detailed information and resolve {% data variables.product.prodname_code_scanning %} alerts for that repository.'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: Troubleshooting CodeQL
|
||||
intro: 'If you''re having problems with {% data variables.product.prodname_code_scanning %}, you can troubleshoot by using these tips for resolving issues.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
@@ -31,7 +31,7 @@ If an automatic build of code for a compiled language within your project fails,
|
||||
|
||||
```yaml
|
||||
jobs:
|
||||
analyze:{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
|
||||
analyze:{% ifversion fpt or ghes > 3.1 or ghae-next %}
|
||||
permissions:
|
||||
security-events: write
|
||||
actions: read{% endif %}
|
||||
|
||||
@@ -3,7 +3,7 @@ title: Finding security vulnerabilities and errors in your code
|
||||
shortTitle: Finding vulnerabilities and coding errors
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: About integration
|
||||
intro: 'You can perform {% data variables.product.prodname_code_scanning %} externally and then display the results in {% data variables.product.prodname_dotcom %}, or set up webhooks that listen to {% data variables.product.prodname_code_scanning %} activity in your repository.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: Integration
|
||||
intro: 'You can integrate third-party code analysis tools with {% data variables.product.prodname_dotcom %} {% data variables.product.prodname_code_scanning %} by uploading data as SARIF files.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: SARIF support
|
||||
intro: 'To display results from a third-party static analysis tool in your repository on {% data variables.product.prodname_dotcom %}, you''ll need your results stored in a SARIF file that supports a specific subset of the SARIF 2.1.0 JSON schema for {% data variables.product.prodname_code_scanning %}. If you use the default {% data variables.product.prodname_codeql %} static analysis engine, then your results will display in your repository on {% data variables.product.prodname_dotcom %} automatically.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: '{% data reusables.code-scanning.you-can-upload-third-party-analysis %}'
|
||||
permissions: 'People with write permissions to a repository can upload {% data variables.product.prodname_code_scanning %} data generated outside {% data variables.product.prodname_dotcom %}.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
@@ -65,7 +65,7 @@ on:
|
||||
|
||||
jobs:
|
||||
build:
|
||||
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
|
||||
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
|
||||
permissions:
|
||||
security-events: write{% endif %}
|
||||
steps:
|
||||
@@ -99,7 +99,7 @@ on:
|
||||
|
||||
jobs:
|
||||
build:
|
||||
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
|
||||
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
|
||||
permissions:
|
||||
security-events: write{% endif %}
|
||||
steps:
|
||||
|
||||
@@ -5,7 +5,7 @@ intro: 'You can configure how the {% data variables.product.prodname_codeql_runn
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
miniTocMaxHeadingLevel: 3
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: CodeQL CI system support
|
||||
intro: 'The {% data variables.product.prodname_codeql_runner %} allows you to use your existing CI system to run {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %}.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: Running in your CI
|
||||
intro: 'You can use the {% data variables.product.prodname_codeql_runner %} to perform {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in a third-party continuous integration system.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
@@ -4,7 +4,7 @@ shortTitle: Troubleshooting in your CI
|
||||
intro: 'If you''re having problems with the {% data variables.product.prodname_codeql_runner %}, you can troubleshoot by using these tips.'
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
ghes: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
|
||||
Reference in New Issue
Block a user