Skip to content

Commit 863862d

Browse files
authored
Merge branch 'main' into add-missing-path-posix-for-windows
2 parents 02e95f5 + 01b5d89 commit 863862d

5,279 files changed

Lines changed: 137672 additions & 8014 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

content/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ You can set up {% data variables.product.prodname_code_scanning %} to check the
2020

2121
By default, {% data variables.product.prodname_code_scanning %} analyzes your code periodically on the default branch and during pull requests. For information about managing alerts on a pull request, see "[Triaging {% data variables.product.prodname_code_scanning %} alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests)."
2222

23+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
24+
2325
### About alerts details
2426

2527
Each alert highlights a problem with the code and the name of the tool that identified it. You can see the line of code that triggered the alert, as well as properties of the alert, such as the severity and the nature of the problem. Alerts also tell you when the issue was first introduced. For alerts identified by {% data variables.product.prodname_codeql %} analysis, you will also see information on how to fix the problem.

content/github/finding-security-vulnerabilities-and-errors-in-your-code/running-codeql-code-scanning-in-your-ci-system.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@ You can configure where the {% data variables.product.prodname_codeql_runner %}
9191

9292
To view the command-line reference for the runner, use the `-h` flag. For example, to list all commands run: `codeql-runner-OS -h`, or to list all the flags available for the `init` command run: `codeql-runner-OS init -h` (where `OS` varies according to the executable that you are using). For more information, see "[Configuring {% data variables.product.prodname_code_scanning %} in your CI system](/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-codeql-code-scanning-in-your-ci-system#codeql-runner-command-reference)."
9393

94+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
95+
9496
#### Basic example
9597

9698
This example runs {% data variables.product.prodname_codeql %} analysis on a Linux CI server for the `octo-org/example-repo` repository hosted on `{% data variables.command_line.git_url_example %}`. The process is very simple because the repository contains only languages that can be analyzed by {% data variables.product.prodname_codeql %} directly, without being built (that is, Go, JavaScript, Python, and TypeScript).

content/github/finding-security-vulnerabilities-and-errors-in-your-code/sarif-support-for-code-scanning.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ If you upload a SARIF file without fingerprint data using the `/code-scanning/sa
4040

4141
You can check a SARIF file is compatible with {% data variables.product.prodname_code_scanning %} by testing it against the {% data variables.product.prodname_dotcom %} ingestion rules. For more information, visit the [Microsoft SARIF validator](https://sarifweb.azurewebsites.net/).
4242

43+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
44+
4345
### Supported SARIF output file properties
4446

4547
If you use a code analysis engine other than {% data variables.product.prodname_codeql %}, you can review the supported SARIF properties to optimize how your analysis results will appear on {% data variables.product.prodname_dotcom %}.
@@ -82,14 +84,16 @@ Any valid SARIF 2.1.0 output file can be uploaded, however, {% data variables.pr
8284

8385
#### `result` object
8486

87+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
88+
8589
| Name | Description |
8690
|----|----|
8791
| `ruleId`| **Optional.** The unique identifier of the rule (`reportingDescriptor.id`). For more information, see the [`reportingDescriptor` object](#reportingdescriptor-object). {% data variables.product.prodname_code_scanning_capc %} uses the rule identifier to filter results by rule on {% data variables.product.prodname_dotcom %}.
8892
| `ruleIndex`| **Optional.** The index of the associated rule (`reportingDescriptor` object) in the tool component `rules` array. For more information, see the [`run` object](#run-object).
8993
| `rule`| **Optional.** A reference used to locate the rule (reporting descriptor) for this result. For more information, see the [`reportingDescriptor` object](#reportingdescriptor-object).
9094
| `level`| **Optional.** The severity of the result. This level overrides the default severity defined by the rule. {% data variables.product.prodname_code_scanning_capc %} uses the level to filter results by severity on {% data variables.product.prodname_dotcom %}.
9195
| `message.text`| **Required.** A message that describes the result. {% data variables.product.prodname_code_scanning_capc %} displays the message text as the title of the result. Only the first sentence of the message will be displayed when visible space is limited.
92-
| `locations[]`| **Required.** The set of locations where the result was detected. Only one location should be included unless the problem can only be corrected by making a change at every specified location. **Note:** At least one location is required for {% data variables.product.prodname_code_scanning %} to display a result. {% data variables.product.prodname_code_scanning_capc %} will use this property to decide which file to annotate with the result. Only the first value of this array is used. All other values are ignored.
96+
| `locations[]`| **Required.** The set of locations where the result was detected up to a maximum of 10. Only one location should be included unless the problem can only be corrected by making a change at every specified location. **Note:** At least one location is required for {% data variables.product.prodname_code_scanning %} to display a result. {% data variables.product.prodname_code_scanning_capc %} will use this property to decide which file to annotate with the result. Only the first value of this array is used. All other values are ignored.
9397
| `partialFingerprints`| **Required.** A set of strings used to track the unique identity of the result. {% data variables.product.prodname_code_scanning_capc %} uses `partialFingerprints` to accurately identify which results are the same across commits and branches. {% data variables.product.prodname_code_scanning_capc %} will attempt to use `partialFingerprints` if they exist. If you are uploading third-party SARIF files with the `upload-action`, the action will create `partialFingerprints` for you when they are not included in the SARIF file. For more information, see "[Preventing duplicate alerts using fingerprints](#preventing-duplicate-alerts-using-fingerprints)." **Note:** {% data variables.product.prodname_code_scanning_capc %} only uses the `primaryLocationLineHash`.
9498
| `codeFlows[].threadFlows[].locations[]`| **Optional.** An array of `location` objects for a `threadFlow` object, which describes the progress of a program through a thread of execution. A `codeFlow` object describes a pattern of code execution used to detect a result. If code flows are provided, {% data variables.product.prodname_code_scanning %} will expand code flows on {% data variables.product.prodname_dotcom %} for the relevant result. For more information, see the [`location` object](#location-object).
9599
| `relatedLocations[]`| A set of locations relevant to this result. {% data variables.product.prodname_code_scanning_capc %} will link to related locations when they are embedded in the result message. For more information, see the [`location` object](#location-object).

content/github/finding-security-vulnerabilities-and-errors-in-your-code/uploading-a-sarif-file-to-github.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ The `upload-sarif` action can be configured to run when the `push` and `schedule
3939

4040
If your SARIF file doesn't include `partialFingerprints`, the `upload-sarif` action will calculate the `partialFingerprints` field for you and attempt to prevent duplicate alerts. {% data variables.product.prodname_dotcom %} can only create `partialFingerprints` when the repository contains both the SARIF file and the source code used in the static analysis. For more information about preventing duplicate alerts, see "[About SARIF support for code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/about-sarif-support-for-code-scanning#preventing-duplicate-alerts-using-fingerprints)."
4141

42+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
43+
4244
#### Example workflow for SARIF files generated outside of a repository
4345

4446
You can create a new workflow that uploads SARIF files after you commit them to your repository. This is useful when the SARIF file is generated as an artifact outside of your repository.

data/graphql/ghae/schema.docs-ghae.graphql

Lines changed: 130 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -3085,12 +3085,12 @@ type Commit implements GitObject & Node & Subscribable & UniformResourceLocatabl
30853085
committedDate: DateTime!
30863086

30873087
"""
3088-
Check if commited via GitHub web UI.
3088+
Check if committed via GitHub web UI.
30893089
"""
30903090
committedViaWeb: Boolean!
30913091

30923092
"""
3093-
Committership details of the commit.
3093+
Committer details of the commit.
30943094
"""
30953095
committer: GitActor
30963096

@@ -3955,6 +3955,12 @@ type ContributionCalendarDay {
39553955
"""
39563956
contributionCount: Int!
39573957

3958+
"""
3959+
Indication of contributions, relative to other days. Can be used to indicate
3960+
which color to represent this day on a calendar.
3961+
"""
3962+
contributionLevel: ContributionLevel!
3963+
39583964
"""
39593965
The day this square represents.
39603966
"""
@@ -4006,6 +4012,36 @@ type ContributionCalendarWeek {
40064012
firstDay: Date!
40074013
}
40084014

4015+
"""
4016+
Varying levels of contributions from none to many.
4017+
"""
4018+
enum ContributionLevel {
4019+
"""
4020+
Lowest 25% of days of contributions.
4021+
"""
4022+
FIRST_QUARTILE
4023+
4024+
"""
4025+
Highest 25% of days of contributions. More contributions than the third quartile.
4026+
"""
4027+
FOURTH_QUARTILE
4028+
4029+
"""
4030+
No contributions occurred.
4031+
"""
4032+
NONE
4033+
4034+
"""
4035+
Second lowest 25% of days of contributions. More contributions than the first quartile.
4036+
"""
4037+
SECOND_QUARTILE
4038+
4039+
"""
4040+
Second highest 25% of days of contributions. More contributions than second quartile, less than the fourth quartile.
4041+
"""
4042+
THIRD_QUARTILE
4043+
}
4044+
40094045
"""
40104046
Ordering options for contribution connections.
40114047
"""
@@ -5387,7 +5423,7 @@ input CreateTeamDiscussionInput {
53875423
clientMutationId: String
53885424

53895425
"""
5390-
If true, restricts the visiblity of this discussion to team members and
5426+
If true, restricts the visibility of this discussion to team members and
53915427
organization admins. If false or not specified, allows any organization member
53925428
to view this discussion.
53935429
"""
@@ -6844,6 +6880,11 @@ enum DeploymentStatusState {
68446880
The deployment was successful.
68456881
"""
68466882
SUCCESS
6883+
6884+
"""
6885+
The deployment is waiting.
6886+
"""
6887+
WAITING
68476888
}
68486889

68496890
"""
@@ -10458,7 +10499,7 @@ enum GitSignatureState {
1045810499
NO_USER
1045910500

1046010501
"""
10461-
Valid siganture, though certificate revocation check failed
10502+
Valid signature, though certificate revocation check failed
1046210503
"""
1046310504
OCSP_ERROR
1046410505

@@ -13512,7 +13553,7 @@ type Milestone implements Closable & Node & UniformResourceLocatable {
1351213553
number: Int!
1351313554

1351413555
"""
13515-
Indentifies the percentage complete for the milestone
13556+
Identifies the percentage complete for the milestone
1351613557
"""
1351713558
progressPercentage: Float!
1351813559

@@ -16982,7 +17023,7 @@ type OrgRestoreMemberAuditEntry implements AuditEntry & Node & OrganizationAudit
1698217023
restoredCustomEmailRoutingsCount: Int
1698317024

1698417025
"""
16985-
The number of issue assignemnts for the restored member.
17026+
The number of issue assignments for the restored member.
1698617027
"""
1698717028
restoredIssueAssignmentsCount: Int
1698817029

@@ -18502,7 +18543,7 @@ type OrganizationIdentityProvider implements Node {
1850218543
id: ID!
1850318544

1850418545
"""
18505-
The x509 certificate used by the Identity Provder to sign assertions and responses.
18546+
The x509 certificate used by the Identity Provider to sign assertions and responses.
1850618547
"""
1850718548
idpCertificate: X509Certificate
1850818549

@@ -19121,7 +19162,7 @@ type PinnedIssueEdge @preview(toggledBy: "elektra-preview") {
1912119162
}
1912219163

1912319164
"""
19124-
An ISO-8601 encoded UTC date string with millisecond precison.
19165+
An ISO-8601 encoded UTC date string with millisecond precision.
1912519166
"""
1912619167
scalar PreciseDateTime
1912719168

@@ -23827,6 +23868,11 @@ type Release implements Node & UniformResourceLocatable {
2382723868
"""
2382823869
isDraft: Boolean!
2382923870

23871+
"""
23872+
Whether or not the release is the latest releast
23873+
"""
23874+
isLatest: Boolean!
23875+
2383023876
"""
2383123877
Whether or not the release is a prerelease
2383223878
"""
@@ -26277,7 +26323,7 @@ type RepoCreateAuditEntry implements AuditEntry & Node & OrganizationAuditEntryD
2627726323
forkParentName: String
2627826324

2627926325
"""
26280-
The name of the root repository for this netork.
26326+
The name of the root repository for this network.
2628126327
"""
2628226328
forkSourceName: String
2628326329
id: ID!
@@ -27305,6 +27351,11 @@ type Repository implements Node & ProjectOwner & RepositoryInfo & Starrable & Su
2730527351
orderBy: LanguageOrder
2730627352
): LanguageConnection
2730727353

27354+
"""
27355+
Get the latest release for the repository if one exists.
27356+
"""
27357+
latestRelease: Release
27358+
2730827359
"""
2730927360
The license associated with the repository
2731027361
"""
@@ -28926,7 +28977,7 @@ type RepositoryVulnerabilityAlert implements Node & RepositoryNode {
2892628977
dismissReason: String
2892728978

2892828979
"""
28929-
When was the alert dimissed?
28980+
When was the alert dismissed?
2893028981
"""
2893128982
dismissedAt: DateTime
2893228983

@@ -28947,7 +28998,7 @@ type RepositoryVulnerabilityAlert implements Node & RepositoryNode {
2894728998
securityAdvisory: SecurityAdvisory
2894828999

2894929000
"""
28950-
The associated security vulnerablity
29001+
The associated security vulnerability
2895129002
"""
2895229003
securityVulnerability: SecurityVulnerability
2895329004

@@ -30065,7 +30116,7 @@ type SmimeSignature implements GitSignature {
3006530116
}
3006630117

3006730118
"""
30068-
Entites that can sponsor others via GitHub Sponsors
30119+
Entities that can sponsor others via GitHub Sponsors
3006930120
"""
3007030121
union Sponsor = Organization | User
3007130122

@@ -35314,7 +35365,7 @@ input UpdateTeamReviewAssignmentInput @preview(toggledBy: "stone-crop-preview")
3531435365
excludedTeamMemberIds: [ID!] @possibleTypes(concreteTypes: ["User"])
3531535366

3531635367
"""
35317-
The Node ID of the team to update review assginments of
35368+
The Node ID of the team to update review assignments of
3531835369
"""
3531935370
id: ID! @possibleTypes(concreteTypes: ["Team"])
3532035371

@@ -36710,6 +36761,72 @@ enum UserStatusOrderField {
3671036761
UPDATED_AT
3671136762
}
3671236763

36764+
"""
36765+
A domain that can be verified for an organization or an enterprise.
36766+
"""
36767+
type VerifiableDomain implements Node {
36768+
"""
36769+
Identifies the primary key from the database.
36770+
"""
36771+
databaseId: Int
36772+
36773+
"""
36774+
The DNS host name that should be used for verification.
36775+
"""
36776+
dnsHostName: URI
36777+
36778+
"""
36779+
The unicode encoded domain.
36780+
"""
36781+
domain: URI!
36782+
36783+
"""
36784+
Whether a TXT record for verification with the expected host name was found.
36785+
"""
36786+
hasFoundHostName: Boolean!
36787+
36788+
"""
36789+
Whether a TXT record for verification with the expected verification token was found.
36790+
"""
36791+
hasFoundVerificationToken: Boolean!
36792+
id: ID!
36793+
36794+
"""
36795+
Whether this domain is required to exist for an organization policy to be enforced.
36796+
"""
36797+
isRequiredForPolicyEnforcement: Boolean!
36798+
36799+
"""
36800+
Whether or not the domain is verified.
36801+
"""
36802+
isVerified: Boolean!
36803+
36804+
"""
36805+
The owner of the domain.
36806+
"""
36807+
owner: VerifiableDomainOwner!
36808+
36809+
"""
36810+
The punycode encoded domain.
36811+
"""
36812+
punycodeEncodedDomain: URI!
36813+
36814+
"""
36815+
The time that the current verification token will expire.
36816+
"""
36817+
tokenExpirationTime: DateTime
36818+
36819+
"""
36820+
The current verification token for the domain.
36821+
"""
36822+
verificationToken: String
36823+
}
36824+
36825+
"""
36826+
Types that can own a verifiable domain.
36827+
"""
36828+
union VerifiableDomainOwner = Enterprise | Organization
36829+
3671336830
"""
3671436831
A hovercard context with a message describing how the viewer is related.
3671536832
"""

0 commit comments

Comments
 (0)