Skip to content

Commit 8faed54

Browse files
authored
Merge branch 'main' into patch-1
2 parents 4e813e2 + bb41ce4 commit 8faed54

File tree

5,292 files changed

+169375
-24313
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

5,292 files changed

+169375
-24313
lines changed

.github/allowed-actions.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ module.exports = [
2121
'github/codeql-action/init@v1',
2222
'ianwalter/puppeteer@12728ddef82390d1ecd4732fb543f62177392fbb',
2323
'juliangruber/approve-pull-request-action@c530832d4d346c597332e20e03605aa94fa150a8',
24-
'juliangruber/find-pull-request-action@64d55773c959748ad30a4184f4dc102af1669f7b',
24+
'juliangruber/find-pull-request-action@2fc55e82a6d5d36fe1e7f1848f7e64fd02d99de9',
2525
'juliangruber/read-file-action@e0a316da496006ffd19142f0fd594a1783f3b512',
2626
'lee-dohm/close-matching-issues@22002609b2555fe18f52b8e2e7c07cbf5529e8a8',
2727
'pascalgn/automerge-action@c9bd182',

.github/workflows/repo-sync.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,12 +58,13 @@ jobs:
5858
github_token: ${{ secrets.OCTOMERGER_PAT_WITH_REPO_AND_WORKFLOW_SCOPE }}
5959

6060
- name: Find pull request
61-
uses: juliangruber/find-pull-request-action@64d55773c959748ad30a4184f4dc102af1669f7b
61+
uses: juliangruber/find-pull-request-action@2fc55e82a6d5d36fe1e7f1848f7e64fd02d99de9
6262
id: find-pull-request
6363
with:
6464
github-token: ${{ secrets.GITHUB_TOKEN }}
6565
branch: repo-sync
6666
base: main
67+
author: Octomerger
6768

6869
- name: Approve pull request
6970
if: ${{ steps.find-pull-request.outputs.number }}

.github/workflows/translations.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,11 +17,13 @@ jobs:
1717
echo 'The repo is currently frozen! Exiting this workflow.'
1818
exit 1 # prevents further steps from running
1919
- name: Find original Pull Request
20-
uses: juliangruber/find-pull-request-action@64d55773c959748ad30a4184f4dc102af1669f7b
20+
uses: juliangruber/find-pull-request-action@2fc55e82a6d5d36fe1e7f1848f7e64fd02d99de9
2121
id: pr
2222
with:
2323
github-token: ${{ secrets.GITHUB_TOKEN }}
2424
branch: translations
25+
base: main
26+
author: octoglot
2527
- if: ${{ steps.pr.outputs.number }}
2628
name: Check if already labeled
2729
uses: actions/github-script@626af12fe9a53dc2972b48385e7fe7dec79145c9

content/actions/reference/context-and-expression-syntax-for-github-actions.md

Lines changed: 32 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -186,27 +186,27 @@ jobs:
186186
steps:
187187
- name: Dump GitHub context
188188
env:
189-
GITHUB_CONTEXT: ${{ toJson(github) }}
189+
GITHUB_CONTEXT: ${{ toJSON(github) }}
190190
run: echo "$GITHUB_CONTEXT"
191191
- name: Dump job context
192192
env:
193-
JOB_CONTEXT: ${{ toJson(job) }}
193+
JOB_CONTEXT: ${{ toJSON(job) }}
194194
run: echo "$JOB_CONTEXT"
195195
- name: Dump steps context
196196
env:
197-
STEPS_CONTEXT: ${{ toJson(steps) }}
197+
STEPS_CONTEXT: ${{ toJSON(steps) }}
198198
run: echo "$STEPS_CONTEXT"
199199
- name: Dump runner context
200200
env:
201-
RUNNER_CONTEXT: ${{ toJson(runner) }}
201+
RUNNER_CONTEXT: ${{ toJSON(runner) }}
202202
run: echo "$RUNNER_CONTEXT"
203203
- name: Dump strategy context
204204
env:
205-
STRATEGY_CONTEXT: ${{ toJson(strategy) }}
205+
STRATEGY_CONTEXT: ${{ toJSON(strategy) }}
206206
run: echo "$STRATEGY_CONTEXT"
207207
- name: Dump matrix context
208208
env:
209-
MATRIX_CONTEXT: ${{ toJson(matrix) }}
209+
MATRIX_CONTEXT: ${{ toJSON(matrix) }}
210210
run: echo "$MATRIX_CONTEXT"
211211
```
212212
{% endraw %}
@@ -348,7 +348,7 @@ The value for `array` can be an array or a string. All values in `array` are con
348348

349349
`join(github.event.issue.labels.*.name, ', ')` may return 'bug, help wanted'
350350

351-
#### toJson
351+
#### toJSON
352352

353353
`toJSON(value)`
354354

@@ -358,13 +358,13 @@ Returns a pretty-print JSON representation of `value`. You can use this function
358358

359359
`toJSON(job)` might return `{ "status": "Success" }`
360360

361-
#### fromJson
361+
#### fromJSON
362362

363363
`fromJSON(value)`
364364

365-
Returns a JSON object for `value`. You can use this function to provide a JSON object as an evaluated expression.
365+
Returns a JSON object or JSON data type for `value`. You can use this function to provide a JSON object as an evaluated expression or to convert environment variables from a string.
366366

367-
##### Example
367+
##### Example returning a JSON object
368368

369369
This workflow sets a JSON matrix in one job, and passes it to the next job using an output and `fromJSON`.
370370

@@ -384,12 +384,33 @@ jobs:
384384
needs: job1
385385
runs-on: ubuntu-latest
386386
strategy:
387-
matrix: ${{fromJson(needs.job1.outputs.matrix)}}
387+
matrix: ${{fromJSON(needs.job1.outputs.matrix)}}
388388
steps:
389389
- run: build
390390
```
391391
{% endraw %}
392392

393+
##### Example returning a JSON data type
394+
395+
This workflow uses `fromJSON` to convert environment variables from a string to a Boolean or integer.
396+
397+
{% raw %}
398+
```yaml
399+
name: print
400+
on: push
401+
env:
402+
continue: true
403+
time: 3
404+
jobs:
405+
job1:
406+
runs-on: ubuntu-latest
407+
steps:
408+
- continue-on-error: ${{ fromJSON(env.continue) }}
409+
timeout-minutes: ${{ fromJSON(env.time) }}
410+
run: echo ...
411+
```
412+
{% endraw %}
413+
393414
#### hashFiles
394415

395416
`hashFiles(path)`

content/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@ You can set up {% data variables.product.prodname_code_scanning %} to check the
2020

2121
By default, {% data variables.product.prodname_code_scanning %} analyzes your code periodically on the default branch and during pull requests. For information about managing alerts on a pull request, see "[Triaging {% data variables.product.prodname_code_scanning %} alerts in pull requests](/github/finding-security-vulnerabilities-and-errors-in-your-code/triaging-code-scanning-alerts-in-pull-requests)."
2222

23+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
24+
2325
### About alerts details
2426

2527
Each alert highlights a problem with the code and the name of the tool that identified it. You can see the line of code that triggered the alert, as well as properties of the alert, such as the severity and the nature of the problem. Alerts also tell you when the issue was first introduced. For alerts identified by {% data variables.product.prodname_codeql %} analysis, you will also see information on how to fix the problem.

content/github/finding-security-vulnerabilities-and-errors-in-your-code/running-codeql-code-scanning-in-your-ci-system.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@ You can configure where the {% data variables.product.prodname_codeql_runner %}
9191

9292
To view the command-line reference for the runner, use the `-h` flag. For example, to list all commands run: `codeql-runner-OS -h`, or to list all the flags available for the `init` command run: `codeql-runner-OS init -h` (where `OS` varies according to the executable that you are using). For more information, see "[Configuring {% data variables.product.prodname_code_scanning %} in your CI system](/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-codeql-code-scanning-in-your-ci-system#codeql-runner-command-reference)."
9393

94+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
95+
9496
#### Basic example
9597

9698
This example runs {% data variables.product.prodname_codeql %} analysis on a Linux CI server for the `octo-org/example-repo` repository hosted on `{% data variables.command_line.git_url_example %}`. The process is very simple because the repository contains only languages that can be analyzed by {% data variables.product.prodname_codeql %} directly, without being built (that is, Go, JavaScript, Python, and TypeScript).

content/github/finding-security-vulnerabilities-and-errors-in-your-code/sarif-support-for-code-scanning.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ If you upload a SARIF file without fingerprint data using the `/code-scanning/sa
4040

4141
You can check a SARIF file is compatible with {% data variables.product.prodname_code_scanning %} by testing it against the {% data variables.product.prodname_dotcom %} ingestion rules. For more information, visit the [Microsoft SARIF validator](https://sarifweb.azurewebsites.net/).
4242

43+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
44+
4345
### Supported SARIF output file properties
4446

4547
If you use a code analysis engine other than {% data variables.product.prodname_codeql %}, you can review the supported SARIF properties to optimize how your analysis results will appear on {% data variables.product.prodname_dotcom %}.
@@ -82,14 +84,16 @@ Any valid SARIF 2.1.0 output file can be uploaded, however, {% data variables.pr
8284

8385
#### `result` object
8486

87+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
88+
8589
| Name | Description |
8690
|----|----|
8791
| `ruleId`| **Optional.** The unique identifier of the rule (`reportingDescriptor.id`). For more information, see the [`reportingDescriptor` object](#reportingdescriptor-object). {% data variables.product.prodname_code_scanning_capc %} uses the rule identifier to filter results by rule on {% data variables.product.prodname_dotcom %}.
8892
| `ruleIndex`| **Optional.** The index of the associated rule (`reportingDescriptor` object) in the tool component `rules` array. For more information, see the [`run` object](#run-object).
8993
| `rule`| **Optional.** A reference used to locate the rule (reporting descriptor) for this result. For more information, see the [`reportingDescriptor` object](#reportingdescriptor-object).
9094
| `level`| **Optional.** The severity of the result. This level overrides the default severity defined by the rule. {% data variables.product.prodname_code_scanning_capc %} uses the level to filter results by severity on {% data variables.product.prodname_dotcom %}.
9195
| `message.text`| **Required.** A message that describes the result. {% data variables.product.prodname_code_scanning_capc %} displays the message text as the title of the result. Only the first sentence of the message will be displayed when visible space is limited.
92-
| `locations[]`| **Required.** The set of locations where the result was detected. Only one location should be included unless the problem can only be corrected by making a change at every specified location. **Note:** At least one location is required for {% data variables.product.prodname_code_scanning %} to display a result. {% data variables.product.prodname_code_scanning_capc %} will use this property to decide which file to annotate with the result. Only the first value of this array is used. All other values are ignored.
96+
| `locations[]`| **Required.** The set of locations where the result was detected up to a maximum of 10. Only one location should be included unless the problem can only be corrected by making a change at every specified location. **Note:** At least one location is required for {% data variables.product.prodname_code_scanning %} to display a result. {% data variables.product.prodname_code_scanning_capc %} will use this property to decide which file to annotate with the result. Only the first value of this array is used. All other values are ignored.
9397
| `partialFingerprints`| **Required.** A set of strings used to track the unique identity of the result. {% data variables.product.prodname_code_scanning_capc %} uses `partialFingerprints` to accurately identify which results are the same across commits and branches. {% data variables.product.prodname_code_scanning_capc %} will attempt to use `partialFingerprints` if they exist. If you are uploading third-party SARIF files with the `upload-action`, the action will create `partialFingerprints` for you when they are not included in the SARIF file. For more information, see "[Preventing duplicate alerts using fingerprints](#preventing-duplicate-alerts-using-fingerprints)." **Note:** {% data variables.product.prodname_code_scanning_capc %} only uses the `primaryLocationLineHash`.
9498
| `codeFlows[].threadFlows[].locations[]`| **Optional.** An array of `location` objects for a `threadFlow` object, which describes the progress of a program through a thread of execution. A `codeFlow` object describes a pattern of code execution used to detect a result. If code flows are provided, {% data variables.product.prodname_code_scanning %} will expand code flows on {% data variables.product.prodname_dotcom %} for the relevant result. For more information, see the [`location` object](#location-object).
9599
| `relatedLocations[]`| A set of locations relevant to this result. {% data variables.product.prodname_code_scanning_capc %} will link to related locations when they are embedded in the result message. For more information, see the [`location` object](#location-object).

content/github/finding-security-vulnerabilities-and-errors-in-your-code/uploading-a-sarif-file-to-github.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ The `upload-sarif` action can be configured to run when the `push` and `schedule
3939

4040
If your SARIF file doesn't include `partialFingerprints`, the `upload-sarif` action will calculate the `partialFingerprints` field for you and attempt to prevent duplicate alerts. {% data variables.product.prodname_dotcom %} can only create `partialFingerprints` when the repository contains both the SARIF file and the source code used in the static analysis. For more information about preventing duplicate alerts, see "[About SARIF support for code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/about-sarif-support-for-code-scanning#preventing-duplicate-alerts-using-fingerprints)."
4141

42+
{% data reusables.code-scanning.upload-sarif-alert-limit %}
43+
4244
#### Example workflow for SARIF files generated outside of a repository
4345

4446
You can create a new workflow that uploads SARIF files after you commit them to your repository. This is useful when the SARIF file is generated as an artifact outside of your repository.

content/github/getting-started-with-github/about-github-advanced-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ versions:
1010

1111
{% data variables.product.prodname_dotcom %} has many features that help you improve and maintain the quality of your code. Some of these are included in all plans, for example: dependency graph and {% data variables.product.prodname_dependabot_alerts %}. Other security features require a license for {% data variables.product.prodname_GH_advanced_security %} to run on repositories apart from public repositories on {% data variables.product.prodname_dotcom_the_website %}. (That is, private and internal repositories on {% data variables.product.prodname_dotcom_the_website %}, and all repositories on {% data variables.product.prodname_ghe_server %}.)
1212

13-
For an overview of all security features, see "[About securing your repository](/github/administering-a-repository/about-securing-your-repository#setting-up-your-repository-securely)."
13+
For an overview of all security features, see "[About securing your repository](/github/administering-a-repository/about-securing-your-repository#setting-up-your-repository-securely)." For information about permission requirements for actions related to security features, see "[Repository permission levels for an organization](/github/setting-up-and-managing-organizations-and-teams/repository-permission-levels-for-an-organization#permission-requirements-for-security-features)."
1414

1515
### About {% data variables.product.prodname_advanced_security %} features
1616

content/github/managing-security-vulnerabilities/about-alerts-for-vulnerable-dependencies.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@ For a list of the ecosystems that {% data variables.product.product_name %} can
4747

4848
You can also enable or disable {% data variables.product.prodname_dependabot_alerts %} for all repositories owned by your user account or organization. For more information, see "[Managing security and analysis settings for your user account](/github/setting-up-and-managing-your-github-user-account/managing-security-and-analysis-settings-for-your-user-account)" or "[Managing security and analysis settings for your organization](/github/setting-up-and-managing-organizations-and-teams/managing-security-and-analysis-settings-for-your-organization)."
4949

50+
For information about permission requirements for actions related to {% data variables.product.prodname_dependabot_alerts %}, see "[Repository permission levels for an organization](/github/setting-up-and-managing-organizations-and-teams/repository-permission-levels-for-an-organization#permission-requirements-for-security-features)."
51+
5052
{% data variables.product.product_name %} starts generating the dependency graph immediately and generates alerts for any vulnerable dependencies as soon as they are identified. The graph is usually populated within minutes but this may take longer for repositories with many dependencies. For more information, see "[Managing data use settings for your private repository](/github/understanding-how-github-uses-and-protects-your-data/managing-data-use-settings-for-your-private-repository)."
5153
{% endif %}
5254

0 commit comments

Comments
 (0)