64 lines
3.5 KiB
Markdown
64 lines
3.5 KiB
Markdown
---
|
||
title: Сведения о проверке кода CodeQL в системе CI
|
||
shortTitle: Code scanning in your CI
|
||
intro: 'Вы можете проанализировать код с помощью {% data variables.product.prodname_codeql %} в сторонней системе непрерывной интеграции и отправить результаты в {% data variables.location.product_location %}. Полученные оповещения {% data variables.product.prodname_code_scanning %} отображаются вместе с любыми другими оповещениями, которые создаются в {% data variables.product.product_name %}.'
|
||
product: '{% data reusables.gated-features.code-scanning %}'
|
||
versions:
|
||
fpt: '*'
|
||
ghes: '*'
|
||
ghae: '*'
|
||
ghec: '*'
|
||
topics:
|
||
- Advanced Security
|
||
- Code scanning
|
||
- CodeQL
|
||
- Repositories
|
||
- Pull requests
|
||
- Integration
|
||
- CI
|
||
- SARIF
|
||
redirect_from:
|
||
- /code-security/secure-coding/about-codeql-code-scanning-in-your-ci-system
|
||
- /code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/about-codeql-code-scanning-in-your-ci-system
|
||
ms.openlocfilehash: d650ba0768c9406295626321e908a6e6785a7666
|
||
ms.sourcegitcommit: f638d569cd4f0dd6d0fb967818267992c0499110
|
||
ms.translationtype: MT
|
||
ms.contentlocale: ru-RU
|
||
ms.lasthandoff: 10/25/2022
|
||
ms.locfileid: '148106408'
|
||
---
|
||
<!--UI-LINK: When GitHub Enterprise Server 3.1+ doesn't have GitHub Actions set up, the Security > Code scanning alerts view links to this article.-->
|
||
|
||
{% data reusables.code-scanning.beta %} {% data reusables.code-scanning.enterprise-enable-code-scanning %}
|
||
|
||
## Сведения о {% data variables.product.prodname_codeql %} {% data variables.product.prodname_code_scanning %} в системе CI
|
||
|
||
{% data reusables.code-scanning.about-code-scanning %} Дополнительные сведения см. в статье [Сведения о {% data variables.product.prodname_code_scanning %} с {% data variables.product.prodname_codeql %}](/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql).
|
||
|
||
{% data reusables.code-scanning.codeql-context-for-actions-and-third-party-tools %}
|
||
|
||
<!--Content for GitHub.com, GHAE next, and GHES 3.2 and onward. CodeQL CLI is the preferred method, and CodeQL runner is deprecated. -->
|
||
|
||
{% data reusables.code-scanning.codeql-cli-context-for-third-party-tools %}
|
||
|
||
{% ifversion fpt or ghes > 3.4 or ghae > 3.4 or ghec %} {% data reusables.code-scanning.about-analysis-origins-link %} {% endif %}
|
||
|
||
{% data reusables.code-scanning.upload-sarif-ghas %}
|
||
|
||
## Сведения о {% data variables.product.prodname_codeql_cli %}
|
||
|
||
{% data reusables.code-scanning.what-is-codeql-cli %}
|
||
|
||
Используйте {% data variables.product.prodname_codeql_cli %} для анализа следующих параметров:
|
||
|
||
- Динамические языки, например JavaScript и Python.
|
||
- Скомпилированные языки, например C/C++, C#,{% ifversion codeql-go-autobuild %} Go,{% endif %} и Java.
|
||
- Базы кода написаны на нескольких языках.
|
||
|
||
Дополнительные сведения см. в статье [Установка {% data variables.product.prodname_codeql_cli %} в системе CI](/code-security/secure-coding/using-codeql-code-scanning-with-your-existing-ci-system/installing-codeql-cli-in-your-ci-system).
|
||
|
||
{% data reusables.code-scanning.licensing-note %}
|
||
|
||
|
||
<!--Content for GHES 3.1 only. Both CodeQL CLI and CodeQL runner are available -->
|