Skip to content

Repo sync #37236

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Apr 1, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/actions/install-cocofix/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,4 +18,4 @@ runs:
npm install --no-save \
'--@github:registry=https://npm.pkg.github.com' \
'--//npm.pkg.github.com/:_authToken=${TOKEN}' \
@github/cocofix
@github/cocofix codeql-ts
2 changes: 1 addition & 1 deletion .github/workflows/generate-code-scanning-query-lists.yml
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ jobs:

- name: Build code scanning query list
run: |
for lang in "cpp" "csharp" "go" "java" "javascript" "python" "ruby" "swift"; do
for lang in "actions" "cpp" "csharp" "go" "java" "javascript" "python" "ruby" "swift"; do
echo "Generating code scanning query list for $lang"
npm run generate-code-scanning-query-list -- \
--verbose \
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -63,10 +63,10 @@ You can customize your {% data variables.product.prodname_codeql %} analysis by
{% data reusables.repositories.navigate-to-repo %}
{% data reusables.repositories.sidebar-settings %}
{% data reusables.repositories.navigate-to-code-security-and-analysis %}
1. Scroll down to "{% data variables.product.UI_code_security_scanning %}", select **Set up** {% octicon "triangle-down" aria-hidden="true" %}, then click **Advanced**.
1. Scroll down to "{% data variables.product.UI_code_security_scanning %}", in the "{% data variables.product.prodname_codeql %} analysis" row select **Set up** {% octicon "triangle-down" aria-hidden="true" %}, then click **Advanced**.

> [!NOTE]
> If you are switching from default setup to advanced setup, in the "{% data variables.product.UI_code_security_scanning %}" section, select {% octicon "kebab-horizontal" aria-label="Menu" %}, then click **{% octicon "workflow" aria-hidden="true" %} Switch to advanced**. In the pop-up window that appears, click **Disable {% data variables.product.prodname_codeql %}**.
> If you are switching from default setup to advanced setup, in the "{% data variables.product.prodname_codeql %} analysis" row, select {% octicon "kebab-horizontal" aria-label="Menu" %}, then click **{% octicon "workflow" aria-hidden="true" %} Switch to advanced**. In the pop-up window that appears, click **Disable {% data variables.product.prodname_codeql %}**.

{% ifversion ghas-products %}

Expand Down Expand Up @@ -120,6 +120,8 @@ For information on bulk enablement, see [AUTOTITLE](/code-security/code-scanning

![Screenshot showing a workflow template file open for editing. The "Documentation" button is highlighted with an orange outline.](/assets/images/help/security/actions-workflows-documentation.png)

1. When you have finished defining your configuration, add the new workflow to your default branch.

For more information, see [AUTOTITLE](/actions/learn-github-actions/using-starter-workflows#choosing-and-using-a-starter-workflow) and [AUTOTITLE](/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning).

{% endif %}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,16 +33,20 @@ If you need to change any other aspects of your {% data variables.product.prodna
1. In the "{% data variables.product.prodname_codeql %} analysis" row of the "{% data variables.product.UI_code_security_scanning %}" section, select {% octicon "kebab-horizontal" aria-label="Menu" %}, then click **{% octicon "gear" aria-hidden="true" %} View {% data variables.product.prodname_codeql %} configuration**.
1. In the "{% data variables.product.prodname_codeql %} default configuration" window, click **{% octicon "pencil" aria-hidden="true" %} Edit**.
1. Optionally, in the "Languages" section, select or deselect languages for analysis.
1. Optionally, in the "Query suite" row of the "Scan settings" section, select a different query suite to run against your code.{% ifversion codeql-threat-models %}
1. Optionally, in the "Query suite" row of the "Scan settings" section, select a different query suite to run against your code.

{% ifversion code-scanning-default-setup-customize-labels %}

1. Optionally, to use labeled runners, in the "Runner type" section of the "{% data variables.product.prodname_codeql %} default configuration" modal dialog, select **Standard {% data variables.product.company_short %} runner** {% octicon "triangle-down" aria-hidden="true" %} to open a dropdown menu, then select **Labeled runner**. Then, next to "Runner label", enter the label of an existing self-hosted or {% data variables.product.company_short %}-hosted runner. For more information, see [AUTOTITLE](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning#assigning-labels-to-runners).

{% endif %}

1. ({% data variables.release-phases.public_preview_caps %}) Optionally, in the "Threat model" row of the "Scan settings" section, select **Remote and local sources**.
{% ifversion codeql-threat-models %}

1. ({% data variables.release-phases.public_preview_caps %}) Optionally, in the "Threat model" row of the "Scan settings" section, select **Remote and local sources**. This option is only available for repositories with code in a supported language: {% data variables.code-scanning.code_scanning_threat_model_support %}.

{% endif %}

1. To update your configuration, as well as run an initial analysis of your code with the new configuration, click **Save changes**. All future analyses will use your new configuration.

## Defining the alert severities that cause a check failure for a pull request
Expand Down
5 changes: 0 additions & 5 deletions data/features/security-feature-enablement-policies.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/security-log-oauth-access-tokens.yml

This file was deleted.

This file was deleted.

8 changes: 0 additions & 8 deletions data/features/security-overview-org-risk-coverage.yml

This file was deleted.

7 changes: 0 additions & 7 deletions data/features/security-overview-team-write-access.yml

This file was deleted.

4 changes: 0 additions & 4 deletions data/features/server-statistics.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/slack-and-team-integrations.yml

This file was deleted.

5 changes: 0 additions & 5 deletions data/features/ssh-cert-policy-allow-u2s-tokens.yml

This file was deleted.

5 changes: 0 additions & 5 deletions data/features/streaming-datadog.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/syncing-fork-web-ui.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/target-runner-groups.yml

This file was deleted.

4 changes: 0 additions & 4 deletions data/features/team-discussions-migration.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/team-mentions-setting.yml

This file was deleted.

3 changes: 0 additions & 3 deletions data/features/token-audit-log.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/totp-and-mobile-sudo-challenge.yml

This file was deleted.

7 changes: 0 additions & 7 deletions data/features/upload-expired-or-revoked-gpg-key.yml

This file was deleted.

6 changes: 0 additions & 6 deletions data/features/workflow-nav-2022.yml

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -55,8 +55,8 @@ import chalk from 'chalk'
import { program } from 'commander'
// We don't want to introduce a global dependency on @github/cocofix, so we install it by hand
// as described above and suppress the import warning.
import { getSupportedQueries } from '@github/cocofix/dist/querySuites.js' // eslint-disable-line import/no-extraneous-dependencies
import { type Language } from '@github/cocofix/dist/codeql' // eslint-disable-line import/no-extraneous-dependencies
import { getSupportedQueries } from '@github/cocofix/dist/querySuites.js' /* eslint-disable-line import/no-extraneous-dependencies, import/no-unresolved */
import type { Language } from 'codeql-ts'

program
.description('Generate a reusable Markdown for for a code scanning query language')
Expand Down