1
0
mirror of synced 2025-12-21 19:06:49 -05:00

ran script/content-migrations/use-short-versions.js

This commit is contained in:
Sarah Schneider
2021-06-24 10:21:07 -04:00
parent 7de66fe4ef
commit cb12455649
1976 changed files with 6155 additions and 6133 deletions

View File

@@ -3,7 +3,7 @@ title: About code scanning
intro: 'You can use {% data variables.product.prodname_code_scanning %} to find security vulnerabilities and errors in the code for your project on {% data variables.product.prodname_dotcom %}.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -5,7 +5,7 @@ product: '{% data reusables.gated-features.code-scanning %}'
permissions: 'People with write permissions to a repository can configure {% data variables.product.prodname_code_scanning %} for the repository.'
miniTocMaxHeadingLevel: 3
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:
@@ -156,7 +156,7 @@ If your workflow does not contain a matrix called `language`, then {% data varia
with:
languages: cpp, csharp, python
```
{% if currentVersion == "free-pro-team@latest" %}
{% ifversion fpt %}
## Analyzing Python dependencies
For GitHub-hosted runners that use Linux only, the {% data variables.product.prodname_codeql_workflow %} will try to auto-install Python dependencies to give more results for the CodeQL analysis. You can control this behavior by specifying the `setup-python-dependencies` parameter for the action called by the "Initialize CodeQL" step. By default, this parameter is set to `true`:
@@ -171,7 +171,7 @@ Alternatively, you can install Python dependencies manually on any operating sys
jobs:
CodeQL-Build:
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
permissions:
security-events: write
actions: read{% endif %}

View File

@@ -5,7 +5,7 @@ intro: 'You can configure how {% data variables.product.prodname_dotcom %} uses
product: '{% data reusables.gated-features.code-scanning %}'
permissions: 'If you have write permissions to a repository, you can configure {% data variables.product.prodname_code_scanning %} for that repository.'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -4,7 +4,7 @@ shortTitle: Scanning automatically
intro: 'You can find vulnerabilities and errors in your project''s code on {% data variables.product.prodname_dotcom %}, as well as view, triage, understand, and resolve the related {% data variables.product.prodname_code_scanning %} alerts.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
children:

View File

@@ -5,7 +5,7 @@ intro: 'From the security view, you can view, fix, or close alerts for potential
product: '{% data reusables.gated-features.code-scanning %}'
permissions: 'If you have write permission to a repository you can manage {% data variables.product.prodname_code_scanning %} alerts for that repository.'
versions:
enterprise-server: '2.22'
ghes: '2.22'
redirect_from:
- /github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository
---

View File

@@ -4,7 +4,7 @@ shortTitle: '{% data variables.product.prodname_code_scanning_capc %} in a conta
intro: 'You can run {% data variables.product.prodname_code_scanning %} in a container by ensuring that all processes run in the same container.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:
@@ -46,7 +46,7 @@ on:
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
permissions:
security-events: write
actions: read{% endif %}

View File

@@ -5,7 +5,7 @@ intro: 'You can set up {% data variables.product.prodname_code_scanning %} by ad
product: '{% data reusables.gated-features.code-scanning %}'
permissions: 'If you have write permissions to a repository, you can set up or configure {% data variables.product.prodname_code_scanning %} for that repository.'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -5,7 +5,7 @@ intro: 'When {% data variables.product.prodname_code_scanning %} identifies a pr
product: '{% data reusables.gated-features.code-scanning %}'
permissions: 'If you have read permission for a repository, you can see annotations on pull requests. With write permission, you can see detailed information and resolve {% data variables.product.prodname_code_scanning %} alerts for that repository.'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -4,7 +4,7 @@ shortTitle: Troubleshooting CodeQL
intro: 'If you''re having problems with {% data variables.product.prodname_code_scanning %}, you can troubleshoot by using these tips for resolving issues.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:
@@ -31,7 +31,7 @@ If an automatic build of code for a compiled language within your project fails,
```yaml
jobs:
analyze:{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
analyze:{% ifversion fpt or ghes > 3.1 or ghae-next %}
permissions:
security-events: write
actions: read{% endif %}

View File

@@ -3,7 +3,7 @@ title: Finding security vulnerabilities and errors in your code
shortTitle: Finding vulnerabilities and coding errors
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
children:

View File

@@ -4,7 +4,7 @@ shortTitle: About integration
intro: 'You can perform {% data variables.product.prodname_code_scanning %} externally and then display the results in {% data variables.product.prodname_dotcom %}, or set up webhooks that listen to {% data variables.product.prodname_code_scanning %} activity in your repository.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -4,7 +4,7 @@ shortTitle: Integration
intro: 'You can integrate third-party code analysis tools with {% data variables.product.prodname_dotcom %} {% data variables.product.prodname_code_scanning %} by uploading data as SARIF files.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
children:

View File

@@ -4,7 +4,7 @@ shortTitle: SARIF support
intro: 'To display results from a third-party static analysis tool in your repository on {% data variables.product.prodname_dotcom %}, you''ll need your results stored in a SARIF file that supports a specific subset of the SARIF 2.1.0 JSON schema for {% data variables.product.prodname_code_scanning %}. If you use the default {% data variables.product.prodname_codeql %} static analysis engine, then your results will display in your repository on {% data variables.product.prodname_dotcom %} automatically.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -5,7 +5,7 @@ intro: '{% data reusables.code-scanning.you-can-upload-third-party-analysis %}'
permissions: 'People with write permissions to a repository can upload {% data variables.product.prodname_code_scanning %} data generated outside {% data variables.product.prodname_dotcom %}.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:
@@ -65,7 +65,7 @@ on:
jobs:
build:
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
permissions:
security-events: write{% endif %}
steps:
@@ -99,7 +99,7 @@ on:
jobs:
build:
runs-on: ubuntu-latest{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@3.1" or currentVersion == "github-ae@next" %}
runs-on: ubuntu-latest{% ifversion fpt or ghes > 3.1 or ghae-next %}
permissions:
security-events: write{% endif %}
steps:

View File

@@ -5,7 +5,7 @@ intro: 'You can configure how the {% data variables.product.prodname_codeql_runn
product: '{% data reusables.gated-features.code-scanning %}'
miniTocMaxHeadingLevel: 3
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -4,7 +4,7 @@ shortTitle: CodeQL CI system support
intro: 'The {% data variables.product.prodname_codeql_runner %} allows you to use your existing CI system to run {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %}.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
children:

View File

@@ -4,7 +4,7 @@ shortTitle: Running in your CI
intro: 'You can use the {% data variables.product.prodname_codeql_runner %} to perform {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} in a third-party continuous integration system.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from:

View File

@@ -4,7 +4,7 @@ shortTitle: Troubleshooting in your CI
intro: 'If you''re having problems with the {% data variables.product.prodname_codeql_runner %}, you can troubleshoot by using these tips.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
enterprise-server: '2.22'
ghes: '2.22'
topics:
- Security
redirect_from: