1
0
mirror of synced 2025-12-20 10:28:40 -05:00
Files
docs/content/code-security/secure-coding/index.md
Rachael Sewell 46fda7b959 [DO NOT MERGE] GitHub Enterprise Server 3.1 release candidate megabranch (#18399)
* 3.1 megabranch

* these should be in a topic branch to avoid unnecessary ci failures

* add copies of 3.0 schema files

* update link veresion from 3.0 -> 3.1

* update correct version 🤦‍♀️

* update with 3.1 version links

* first stab of this work

* fix product variable and links to section that has been moved

* simplify Liquid conditions

* elsif

* Update content/github/managing-subscriptions-and-notifications-on-github/viewing-your-subscriptions.md

Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>

* [GHES 3.1] Code scanning: SARIF limit increased to 5000 (#18539)

* revert api previews

* delete 3.1 preview

* Revert "delete 3.1 preview"

This reverts commit 0a7df3e17a1e182e5b01b0fdafacb6bb19100f70.

* regenerate decorated file

* make security policy docs available in GHES 3.1 and GHAE docs

* adapt for GHES/GHAE and remove the word

* revert a whole bunch of stuff

* more reverting and further updating

* update links to Adding a security policy to your repo article

* fix broken links and remove responsibly

* simplify Liquid versioning

* Update content/code-security/getting-started/adding-a-security-policy-to-your-repository.md

Co-authored-by: Felicity Chapman <felicitymay@github.com>

* address comment

* Remove overcomplicated versioning (#18934)

* Update information on licensing and billing for GHES 3.1 (#18835)

* regenerate graphql files with new prerendered input object

* add release notes placeholder file

* add scaffolding

* use real date

* ✂️  3.1 schema added accidentally

* update enterprise release dates

* add base files

* Correct versioning for branch renaming and master to main transition in GHES docs (#19050)

* update versioning

* apply Alistair's suggestion

* add new cached index names

* Update docs for code scanning in external CI to cover CodeQL CLI usage (#19030)

* 3893 add missing flag for GHES and GHAE (next) users (#19129)

* [GHES 3.1] Release candidate 1 release notes  (#18419)

* fleshing out the 33.1 RC1 release notes

* update with moreee

* really flesh it all out

* format a bit

* fix linter errors

* fix errors again

* add quotes around heading with Liquid

* placeholder to get error fixed

* add quotes

* just remove thoose things

* typo

* Update 0-rc1.yml

* update with feedback

* add workflow beta

* upload increase

* some last changes

* change the date

* fix links

Co-authored-by: Sarah Schneider <sarahs@github.com>
Co-authored-by: Rachael Sewell <rachmari@github.com>

* Conflict resolution between 19082 and 3.1 Megabranch (#19158)

* Fix typo in new reusable

* delete 3.1 rest schema files

* Update OpenAPI Descriptions (#19166)

* last minute additions yikes

* redeploy staging

Co-authored-by: Melanie Yarbrough <11952755+myarb@users.noreply.github.com>
Co-authored-by: Shati Patel <42641846+shati-patel@users.noreply.github.com>
Co-authored-by: mchammer01 <42146119+mchammer01@users.noreply.github.com>
Co-authored-by: skedwards88 <skedwards88@github.com>
Co-authored-by: Matt Pollard <mattpollard@users.noreply.github.com>
Co-authored-by: Felicity Chapman <felicitymay@github.com>
Co-authored-by: Meg Bird <megbird@github.com>
Co-authored-by: Sarah Schneider <sarahs@github.com>
Co-authored-by: github-openapi-bot <69533958+github-openapi-bot@users.noreply.github.com>
2021-05-06 09:41:42 -07:00

2.0 KiB

title, shortTitle, intro, product, redirect_from, versions, topics
title shortTitle intro product redirect_from versions topics
Finding security vulnerabilities and errors in your code Secure coding Keep your code secure by using {% data variables.product.prodname_code_scanning %} to identify and fix potential security vulnerabilities and other errors in your code. {% data reusables.gated-features.code-scanning %}
/github/managing-security-vulnerabilities/finding-security-vulnerabilities-in-your-projects-code
/github/finding-security-vulnerabilities-and-errors-in-your-code
free-pro-team enterprise-server github-ae
* >=3.0 *
Security

Table of Contents

{% topic_link_in_list /automatically-scanning-your-code-for-vulnerabilities-and-errors %} {% link_in_list /about-code-scanning %} {% link_in_list /triaging-code-scanning-alerts-in-pull-requests %} {% link_in_list /setting-up-code-scanning-for-a-repository %} {% link_in_list /managing-code-scanning-alerts-for-your-repository %} {% link_in_list /configuring-code-scanning %} {% link_in_list /configuring-the-codeql-workflow-for-compiled-languages %} {% link_in_list /troubleshooting-the-codeql-workflow %} {% link_in_list /running-codeql-code-scanning-in-a-container %} {% topic_link_in_list /integrating-with-code-scanning %} {% link_in_list /about-integration-with-code-scanning %} {% link_in_list /uploading-a-sarif-file-to-github %} {% link_in_list /sarif-support-for-code-scanning %} {% topic_link_in_list /using-codeql-code-scanning-with-your-existing-ci-system %} {% link_in_list /about-codeql-code-scanning-in-your-ci-system %} {% link_in_list /running-codeql-cli-in-your-ci-system %} {% link_in_list /running-codeql-runner-in-your-ci-system %} {% link_in_list /configuring-codeql-runner-in-your-ci-system %} {% link_in_list /troubleshooting-codeql-runner-in-your-ci-system %}