1
0
mirror of synced 2026-01-04 00:06:20 -05:00
Files
docs/translations/ru-RU/content/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system.md
2022-12-12 17:21:29 +00:00

64 lines
3.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
---
title: Сведения о проверке кода CodeQL в системе CI
shortTitle: Code scanning in your CI
intro: 'Вы можете проанализировать код с помощью {% data variables.product.prodname_codeql %} в сторонней системе непрерывной интеграции и отправить результаты в {% data variables.location.product_location %}. Полученные оповещения {% data variables.product.prodname_code_scanning %} отображаются вместе с любыми другими оповещениями, которые создаются в {% data variables.product.product_name %}.'
product: '{% data reusables.gated-features.code-scanning %}'
versions:
fpt: '*'
ghes: '*'
ghae: '*'
ghec: '*'
topics:
- Advanced Security
- Code scanning
- CodeQL
- Repositories
- Pull requests
- Integration
- CI
- SARIF
redirect_from:
- /code-security/secure-coding/about-codeql-code-scanning-in-your-ci-system
- /code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system
ms.openlocfilehash: d650ba0768c9406295626321e908a6e6785a7666
ms.sourcegitcommit: f638d569cd4f0dd6d0fb967818267992c0499110
ms.translationtype: MT
ms.contentlocale: ru-RU
ms.lasthandoff: 10/25/2022
ms.locfileid: '148106408'
---
<!--UI-LINK: When GitHub Enterprise Server 3.1+ doesn't have GitHub Actions set up, the Security > Code scanning alerts view links to this article.-->
{% data reusables.code-scanning.beta %} {% data reusables.code-scanning.enterprise-enable-code-scanning %}
## Сведения о {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} в системе CI
{% data reusables.code-scanning.about-code-scanning %} Дополнительные сведения см. в статье [Сведения о {% data variables.product.prodname_code_scanning %} с {% data variables.product.prodname_codeql %}](/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql).
{% data reusables.code-scanning.codeql-context-for-actions-and-third-party-tools %}
<!--Content for GitHub.com, GHAE next, and GHES 3.2 and onward. CodeQL CLI is the preferred method, and CodeQL runner is deprecated. -->
{% data reusables.code-scanning.codeql-cli-context-for-third-party-tools %}
{% ifversion fpt or ghes > 3.4 or ghae > 3.4 or ghec %} {% data reusables.code-scanning.about-analysis-origins-link %} {% endif %}
{% data reusables.code-scanning.upload-sarif-ghas %}
## Сведения о {% data variables.product.prodname_codeql_cli %}
{% data reusables.code-scanning.what-is-codeql-cli %}
Используйте {% data variables.product.prodname_codeql_cli %} для анализа следующих параметров:
- Динамические языки, например JavaScript и Python.
- Скомпилированные языки, например C/C++, C#,{% ifversion codeql-go-autobuild %} Go,{% endif %} и Java.
- Базы кода написаны на нескольких языках.
Дополнительные сведения см. в статье [Установка {% data variables.product.prodname_codeql_cli %} в системе CI](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system).
{% data reusables.code-scanning.licensing-note %}
<!--Content for GHES 3.1 only. Both CodeQL CLI and CodeQL runner are available -->