ran script/content-migrations/remove-map-topics.js && script/content-migrations/update-tocs.js
This commit is contained in:
@@ -6,6 +6,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/about-code-scanning
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -8,6 +8,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -8,6 +8,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-the-codeql-workflow-for-compiled-languages
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -2,11 +2,19 @@
|
||||
title: Automatically scanning your code for vulnerabilities and errors
|
||||
shortTitle: Scanning automatically
|
||||
intro: 'You can find vulnerabilities and errors in your project''s code on {% data variables.product.prodname_dotcom %}, as well as view, triage, understand, and resolve the related {% data variables.product.prodname_code_scanning %} alerts.'
|
||||
mapTopic: true
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
- /about-code-scanning
|
||||
- /triaging-code-scanning-alerts-in-pull-requests
|
||||
- /setting-up-code-scanning-for-a-repository
|
||||
- /managing-code-scanning-alerts-for-your-repository
|
||||
- /configuring-code-scanning
|
||||
- /configuring-the-codeql-workflow-for-compiled-languages
|
||||
- /troubleshooting-the-codeql-workflow
|
||||
- /running-codeql-code-scanning-in-a-container
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
@@ -6,6 +6,8 @@ product: '{% data reusables.gated-features.code-scanning %}'
|
||||
permissions: 'If you have write permission to a repository you can manage {% data variables.product.prodname_code_scanning %} alerts for that repository.'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -7,6 +7,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/running-codeql-code-scanning-in-a-container
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -8,6 +8,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/setting-up-code-scanning-for-a-repository
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -8,6 +8,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -7,6 +7,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/troubleshooting-the-codeql-workflow
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -6,25 +6,9 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
- /automatically-scanning-your-code-for-vulnerabilities-and-errors
|
||||
- /integrating-with-code-scanning
|
||||
- /using-codeql-code-scanning-with-your-existing-ci-system
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
### Table of Contents
|
||||
|
||||
{% topic_link_in_list /automatically-scanning-your-code-for-vulnerabilities-and-errors %}
|
||||
{% link_in_list /about-code-scanning %}
|
||||
{% link_in_list /triaging-code-scanning-alerts-in-pull-requests %}
|
||||
{% link_in_list /setting-up-code-scanning-for-a-repository %}
|
||||
{% link_in_list /managing-code-scanning-alerts-for-your-repository %}
|
||||
{% link_in_list /configuring-code-scanning %}
|
||||
{% link_in_list /configuring-the-codeql-workflow-for-compiled-languages %}
|
||||
{% link_in_list /troubleshooting-the-codeql-workflow %}
|
||||
{% link_in_list /running-codeql-code-scanning-in-a-container %}
|
||||
{% topic_link_in_list /integrating-with-code-scanning %}
|
||||
{% link_in_list /about-integration-with-code-scanning %}
|
||||
{% link_in_list /uploading-a-sarif-file-to-github %}
|
||||
{% link_in_list /sarif-support-for-code-scanning %}
|
||||
{% topic_link_in_list /using-codeql-code-scanning-with-your-existing-ci-system %}
|
||||
{% link_in_list /running-codeql-code-scanning-in-your-ci-system %}
|
||||
{% link_in_list /configuring-codeql-code-scanning-in-your-ci-system %}
|
||||
{% link_in_list /troubleshooting-codeql-code-scanning-in-your-ci-system %}
|
||||
|
||||
@@ -7,6 +7,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/about-integration-with-code-scanning
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -2,11 +2,14 @@
|
||||
title: Integrating with code scanning
|
||||
shortTitle: Integration
|
||||
intro: 'You can integrate third-party code analysis tools with {% data variables.product.prodname_dotcom %} {% data variables.product.prodname_code_scanning %} by uploading data as SARIF files.'
|
||||
mapTopic: true
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
- /about-integration-with-code-scanning
|
||||
- /uploading-a-sarif-file-to-github
|
||||
- /sarif-support-for-code-scanning
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
@@ -7,6 +7,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/sarif-support-for-code-scanning
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -8,6 +8,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/uploading-a-sarif-file-to-github
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -8,6 +8,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-codeql-code-scanning-in-your-ci-system
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
@@ -2,11 +2,14 @@
|
||||
title: Using CodeQL code scanning with your existing CI system
|
||||
shortTitle: CodeQL CI system support
|
||||
intro: 'The {% data variables.product.prodname_codeql_runner %} allows you to use your existing CI system to run {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %}.'
|
||||
mapTopic: true
|
||||
product: '{% data reusables.gated-features.code-scanning %}'
|
||||
versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
children:
|
||||
- /running-codeql-code-scanning-in-your-ci-system
|
||||
- /configuring-codeql-code-scanning-in-your-ci-system
|
||||
- /troubleshooting-codeql-code-scanning-in-your-ci-system
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
@@ -7,6 +7,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/running-codeql-code-scanning-in-your-ci-system
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
<!--UI-LINK: When GitHub Enterprise Server doesn't have GitHub Actions set up, the Security > Code scanning alerts view links to this article.-->
|
||||
@@ -7,6 +7,8 @@ versions:
|
||||
enterprise-server: '2.22'
|
||||
topics:
|
||||
- Security
|
||||
redirect_from:
|
||||
- /github/finding-security-vulnerabilities-and-errors-in-your-code/troubleshooting-codeql-code-scanning-in-your-ci-system
|
||||
---
|
||||
<!--See /content/code-security/secure-coding for the latest version of this article -->
|
||||
|
||||
Reference in New Issue
Block a user