* Use conditioning to revert dismiss/delete alert changes on GHES
* Add new dotcom version text that is also good for GHES
* Reinstate original subheading for GHES 2.22
Edited introductory paragraph and step 4 of the section to state that admin permissions are required to delete alerts.
Introductory paragraph changed to say, "Alternatively, if you have admin permissions for the repository, you can delete alerts."
and step 4 to "If you have admin permissions for the repository, and you want to delete alerts[...]"
Co-authored-by: hubwriter <54933897+hubwriter@users.noreply.github.com>
* Run script/new-versioning/update-not-fpt-conditionals.js
* Fix a few things
* Remove outdated versioning
* Fix broken link
Co-authored-by: jmarlena <6732600+jmarlena@users.noreply.github.com>
* Add new placeholder topic file - WiP
* Add content for new topic + cross-refs to it
* Change topic title just to get through the PR check for matching filename & title
* Rework the workflow example section
* Remove 4 lines from workflow - see:
https://github.com/github/code-scanning/issues/1826
* Updates for delete and dismiss alerts
* Add back the text for the now-deleted reusable
* Make s/shots relevant to the PR context of the text
* Make review comment changes
* More review comments attended to
* Restructure files and change topic titles and file names
* Update links to files whose names have changed
* Finish restructuring work for runner topics
* Makes changes suggested by James
* Add more information to the codescan enabling topic - WiP
* Add more details and s/shots to the Enabling topic
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Make change suggested by Justin, but in step 5 rather than step 4.
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Not all workflows will have `on:push` and `on:pull_request` so clarify that this refers to the CodeQL workflow.
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Update content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
* Revert changes to this file to the file as it currently is on main
* Attempt to remove package.json
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
Co-authored-by: Chiedo <chiedo@users.noreply.github.com>
Co-authored-by: Sarah Schneider <sarahs@users.noreply.github.com>
* ran script/remove-unused-assets.js (manually removed unused variables printed by the script)
* package-lock
* turn elsif into two ifs to prepare for running Liquid deprecation script
* ran script/remove-deprecated-enterprise-version-markup.js --release 2.14 (ONLY UPDATES LINE BREAKS ETC.)
* ran script/remove-deprecated-enterprise-version-markup.js --release 2.15
* ran script/remove-deprecated-enterprise-version-markup.js --release 2.17
* ran script/remove-deprecated-enterprise-version-markup.js --release 2.18
* update hardcoded test
* Update content/github/collaborating-with-issues-and-pull-requests/filtering-files-in-a-pull-request.md
Co-authored-by: Matt Pollard <mattpollard@users.noreply.github.com>
* add currentVersion is NOT free-pro-team to conditional, to make sure the deprecation script does the right thing when it is time to deprecate 2.21
Co-authored-by: Matt Pollard <mattpollard@users.noreply.github.com>
* Add back changes from prior to purge
* Manually fix some invalid Liquid
* Updoot render-content
* Improve test messages to show correct output
* Run el scripto
* Pass the remaining test