Skip to content

Commit 66a701c

Browse files
jonjanegosubatoimchammer01
authored
Fix code scanning REST API links to use correct path (#59279)
Co-authored-by: Ben Ahmady <32935794+subatoi@users.noreply.github.com> Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
1 parent 6ba65ff commit 66a701c

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

content/code-security/concepts/code-scanning/about-code-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If {% data variables.product.prodname_code_scanning %} finds a potential vulnera
3636
{% endif %}
3737

3838
To monitor results from {% data variables.product.prodname_code_scanning %} across your repositories or your organization, you can use webhooks and the {% data variables.product.prodname_code_scanning %} API. For information about the webhooks for {% data variables.product.prodname_code_scanning %}, see
39-
[AUTOTITLE](/webhooks-and-events/webhooks/webhook-events-and-payloads#code_scanning_alert). For information about API endpoints, see [AUTOTITLE](/rest/code-scanning).
39+
[AUTOTITLE](/webhooks-and-events/webhooks/webhook-events-and-payloads#code_scanning_alert). For information about API endpoints, see [AUTOTITLE](/rest/code-scanning/code-scanning).
4040

4141
{% ifversion fpt or ghec %}
4242

content/code-security/concepts/security-at-scale/auditing-security-alerts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -70,21 +70,21 @@ You can use the API to list and interact with security alerts, for example, gett
7070

7171
You can list all {% data variables.product.prodname_dependabot %} alerts for a repository, organization, or enterprise, or use path parameters to list only alerts that meet a specific set of criteria. For example, you might only want to list {% data variables.product.prodname_dependabot %} alerts for Maven that were dismissed. Alternatively, you can get full details for an alert or update the alert.
7272

73-
For more information, see [{% data variables.product.prodname_dependabot %} alerts](/rest/dependabot/alerts#about-dependabot-alerts).
73+
For more information, see [AUTOTITLE](/rest/dependabot/alerts#about-dependabot-alerts).
7474

7575
### {% data variables.product.prodname_secret_scanning_caps %} alerts API
7676

7777
You can list all {% data variables.product.prodname_secret_scanning %} alerts for a repository, organization, or enterprise, or use path parameters to list only alerts that meet a specific set of criteria. Alternatively, you can get full details for an alert or update the alert.
7878

7979
To see which {% data variables.product.prodname_secret_scanning %} alerts were the result of a push protection bypass, filter the results for `"push_protection_bypassed": true`.
8080

81-
For more information, see [{% data variables.product.prodname_secret_scanning_caps %}](/rest/secret-scanning).
81+
For more information, see [AUTOTITLE](/rest/secret-scanning).
8282

8383
### {% data variables.product.prodname_code_scanning_caps %} alerts API
8484

8585
You can list all {% data variables.product.prodname_code_scanning %} alerts for a repository, organization, or enterprise, or use path parameters to list only alerts that meet a specific set of criteria. Alternatively, you can get full details for an alert or update the alert.
8686

87-
For more information, see [{% data variables.product.prodname_code_scanning_caps %}](/rest/code-scanning).
87+
For more information, see [AUTOTITLE](/rest/code-scanning/code-scanning).
8888

8989
## Further reading
9090

content/code-security/how-tos/scan-code-for-vulnerabilities/scan-from-the-command-line/advanced-setup-of-the-codeql-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,6 @@ When you have confirmed that a {% data variables.product.prodname_codeql %} data
112112
gh api /repos/<owner>/<repo>/code-scanning/codeql/databases/<language> -H 'Accept: application/zip' > path/to/local/database.zip
113113
```
114114

115-
For more information, see the documentation for the [Get {% data variables.product.prodname_codeql %} database endpoint](/rest/code-scanning?apiVersion=2022-11-28#get-a-codeql-database-for-a-repository).
115+
For more information, see the documentation for the [Get {% data variables.product.prodname_codeql %} database endpoint](/rest/code-scanning/code-scanning#get-a-codeql-database-for-a-repository).
116116

117117
Before running an analysis with the {% data variables.product.prodname_codeql_cli %}, you must unzip the databases.

content/code-security/how-tos/scan-code-for-vulnerabilities/scan-from-the-command-line/creating-database-bundle-for-troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Creating CodeQL CLI database bundles
3-
shortTitle: Createting CodeQL CLI database bundles
3+
shortTitle: Creating CodeQL CLI database bundles
44
intro: You can create a database bundle with {% data variables.product.prodname_codeql %} troubleshooting information.
55
allowTitleToDifferFromFilename: true
66
product: '{% data reusables.gated-features.codeql %}'

content/code-security/tutorials/customize-code-scanning/analyzing-your-code-with-codeql-queries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -252,7 +252,7 @@ codeql database analyze <cpp-database> codeql/cpp-queries:codeql-suites/cpp-code
252252
253253
This command downloads the `codeql/cpp-queries` {% data variables.product.prodname_codeql %} query pack, runs the analysis, and generates a file in the SARIF version 2.1.0 format that is supported by all versions of {% data variables.product.prodname_dotcom %}. This file can be uploaded to {% data variables.product.prodname_dotcom %} by executing `codeql github upload-results` or the code scanning API.
254254
For more information, see [AUTOTITLE](/code-security/codeql-cli/getting-started-with-the-codeql-cli/uploading-codeql-analysis-results-to-github)
255-
or [AUTOTITLE](/rest/code-scanning).
255+
or [AUTOTITLE](/rest/code-scanning/code-scanning).
256256
257257
{% data variables.product.prodname_codeql %} query suites are `.qls` files that use directives to select queries to run
258258
based on certain metadata properties. The standard {% data variables.product.prodname_codeql %} packs have metadata that specify
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
It's important to choose the appropriate reason from the drop-down menu as this may affect whether a query continues to be included in future analysis. Optionally, you can comment on a dismissal to record the context of an alert dismissal. The dismissal comment is added to the alert timeline and can be used as justification during auditing and reporting. You can retrieve or set a comment by using the code scanning REST API. The comment is contained in `dismissed_comment` for the `alerts/{alert_number}` endpoint. For more information, see [AUTOTITLE](/rest/code-scanning#update-a-code-scanning-alert).
1+
It's important to choose the appropriate reason from the drop-down menu as this may affect whether a query continues to be included in future analysis. Optionally, you can comment on a dismissal to record the context of an alert dismissal. The dismissal comment is added to the alert timeline and can be used as justification during auditing and reporting. You can retrieve or set a comment by using the code scanning REST API. The comment is contained in `dismissed_comment` for the `alerts/{alert_number}` endpoint. For more information, see [AUTOTITLE](/rest/code-scanning/code-scanning#update-a-code-scanning-alert).

0 commit comments

Comments
 (0)