Skip to content

Commit a2d86d7

Browse files
authored
Merge pull request #76 from github/repo-sync
repo sync
2 parents a96f15d + 14cd024 commit a2d86d7

21 files changed

+245
-136
lines changed
90.5 KB
Loading
214 KB
Loading
74.6 KB
Loading

content/actions/reference/workflow-syntax-for-github-actions.md

Lines changed: 49 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -948,7 +948,25 @@ jobs:
948948

949949
#### **`jobs.<job_id>.container.image`**
950950

951-
The Docker image to use as the container to run the action. The value can be the Docker Hub image name or a public docker registry name.
951+
The Docker image to use as the container to run the action. The value can be the Docker Hub image name or a {% if currentVersion != "free-pro-team@latest" and currentVersion ver_lt "enterprise-server@2.23" %}public{% endif %} registry name.
952+
953+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
954+
#### **`jobs.<job_id>.container.credentials`**
955+
956+
{% data reusables.actions.registry-credentials %}
957+
958+
##### Example
959+
960+
{% raw %}
961+
```yaml
962+
container:
963+
image: ghcr.io/owner/image
964+
credentials:
965+
username: ${{ github.actor }}
966+
password: ${{ secrets.ghcr_token }}
967+
```
968+
{% endraw %}
969+
{% endif %}
952970

953971
#### **`jobs.<job_id>.container.env`**
954972

@@ -1011,19 +1029,43 @@ services:
10111029
- 6379/tcp
10121030
```
10131031

1014-
#### **`jobs.<job_id>.services.image`**
1032+
#### **`jobs.<job_id>.services.<service_id>.image`**
1033+
1034+
The Docker image to use as the service container to run the action. The value can be the Docker Hub image name or a {% if currentVersion != "free-pro-team@latest" and currentVersion ver_lt "enterprise-server@2.23" %}public{% endif %} registry name.
10151035

1016-
The Docker image to use as the service container to run the action. The value can be the Docker base image name or a public docker Hub or registry.
1036+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
1037+
#### **`jobs.<job_id>.services.<service_id>.credentials`**
1038+
1039+
{% data reusables.actions.registry-credentials %}
1040+
1041+
##### Example
1042+
1043+
{% raw %}
1044+
```yaml
1045+
services:
1046+
myservice1:
1047+
image: ghcr.io/owner/myservice1
1048+
credentials:
1049+
username: ${{ github.actor }}
1050+
password: ${{ secrets.ghcr_token }}
1051+
myservice2:
1052+
image: dockerhub_org/myservice2
1053+
credentials:
1054+
username: ${{ secrets.DOCKER_USER }}
1055+
password: ${{ secrets.DOCKER_PASSWORD }}
1056+
```
1057+
{% endraw %}
1058+
{% endif %}
10171059

1018-
#### **`jobs.<job_id>.services.env`**
1060+
#### **`jobs.<job_id>.services.<service_id>.env`**
10191061

10201062
Sets a `map` of environment variables in the service container.
10211063

1022-
#### **`jobs.<job_id>.services.ports`**
1064+
#### **`jobs.<job_id>.services.<service_id>.ports`**
10231065

10241066
Sets an `array` of ports to expose on the service container.
10251067

1026-
#### **`jobs.<job_id>.services.volumes`**
1068+
#### **`jobs.<job_id>.services.<service_id>.volumes`**
10271069

10281070
Sets an `array` of volumes for the service container to use. You can use volumes to share data between services or other steps in a job. You can specify named Docker volumes, anonymous Docker volumes, or bind mounts on the host.
10291071

@@ -1042,7 +1084,7 @@ volumes:
10421084
- /source/directory:/destination/directory
10431085
```
10441086

1045-
#### **`jobs.<job_id>.services.options`**
1087+
#### **`jobs.<job_id>.services.<service_id>.options`**
10461088

10471089
Additional Docker container resource options. For a list of options, see "[`docker create` options](https://docs.docker.com/engine/reference/commandline/create/#options)."
10481090

content/github/finding-security-vulnerabilities-and-errors-in-your-code/about-code-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ versions:
1818

1919
You can use {{ site.data.variables.product.prodname_code_scanning }} to find, triage, and prioritize fixes for existing problems in your code. {{ site.data.variables.product.prodname_code_scanning_capc }} also prevents developers from introducing new problems. You can schedule scans for specific days and times, or trigger scans when a specific event occurs in the repository, such as a push.
2020

21-
If {{ site.data.variables.product.prodname_code_scanning }} finds a potential vulnerability or error in your code, {{ site.data.variables.product.prodname_dotcom }} displays an alert in the repository. After you fix the code that triggered the alert, {{ site.data.variables.product.prodname_dotcom }} closes the alert. For more information, see "[Managing alerts from {{ site.data.variables.product.prodname_code_scanning }}](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-alerts-from-code-scanning)."
21+
If {{ site.data.variables.product.prodname_code_scanning }} finds a potential vulnerability or error in your code, {{ site.data.variables.product.prodname_dotcom }} displays an alert in the repository. After you fix the code that triggered the alert, {{ site.data.variables.product.prodname_dotcom }} closes the alert. For more information, see "[Managing {{ site.data.variables.product.prodname_code_scanning }} alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository)."
2222

2323
To monitor results from {{ site.data.variables.product.prodname_code_scanning }} across your repositories or your organization, you can use the {{ site.data.variables.product.prodname_code_scanning }} API.
2424
For more information about API endpoints, see "[{{ site.data.variables.product.prodname_code_scanning_capc }}](/v3/code-scanning)."

content/github/finding-security-vulnerabilities-and-errors-in-your-code/about-integration-with-code-scanning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ versions:
1111
{{ site.data.reusables.code-scanning.beta }}
1212
{{ site.data.reusables.code-scanning.enterprise-enable-code-scanning }}
1313

14-
As an alternative to running {{ site.data.variables.product.prodname_code_scanning }} within {{ site.data.variables.product.prodname_dotcom }}, you can perform analysis elsewhere and then upload the results. Alerts for {{ site.data.variables.product.prodname_code_scanning }} that you run externally are displayed in the same way as those for {{ site.data.variables.product.prodname_code_scanning }} that you run within {{ site.data.variables.product.prodname_dotcom }}. For more information, see "[Managing alerts from code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-alerts-from-code-scanning)."
14+
As an alternative to running {{ site.data.variables.product.prodname_code_scanning }} within {{ site.data.variables.product.prodname_dotcom }}, you can perform analysis elsewhere and then upload the results. Alerts for {{ site.data.variables.product.prodname_code_scanning }} that you run externally are displayed in the same way as those for {{ site.data.variables.product.prodname_code_scanning }} that you run within {{ site.data.variables.product.prodname_dotcom }}. For more information, see "[Managing {{ site.data.variables.product.prodname_code_scanning }} alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository)."
1515

1616
You can use your continuous integration or continuous delivery/deployment (CI/CD) system to run {{ site.data.variables.product.prodname_dotcom }}'s {{ site.data.variables.product.prodname_codeql }} analysis and upload the results to {{ site.data.variables.product.prodname_dotcom }}. This is an alternative to using {{ site.data.variables.product.prodname_actions }} to run {{ site.data.variables.product.prodname_codeql }} analysis. For more information, see "[Running code scanning in your CI system](/github/finding-security-vulnerabilities-and-errors-in-your-code/running-code-scanning-in-your-ci-system)."
1717

content/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning-in-your-ci-system.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ If the `autobuild` command can't build your code, you can run the build steps yo
9494

9595
By default, the {{ site.data.variables.product.prodname_codeql_runner }} uploads results from {{ site.data.variables.product.prodname_code_scanning }} when you run the `analyze` command. You can also upload SARIF files separately, by using the `upload` command.
9696

97-
Once you've uploaded the data, {{ site.data.variables.product.prodname_dotcom }} displays the alerts in your repository. For more information, see "[Managing alerts from code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-alerts-from-code-scanning#viewing-an-alert)."
97+
Once you've uploaded the data, {{ site.data.variables.product.prodname_dotcom }} displays the alerts in your repository. For more information, see "[Managing {{ site.data.variables.product.prodname_code_scanning }} alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository#viewing-an-alert)."
9898

9999
### {{ site.data.variables.product.prodname_codeql_runner }} command reference
100100

content/github/finding-security-vulnerabilities-and-errors-in-your-code/enabling-code-scanning-for-a-repository.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,5 +45,5 @@ After you commit the workflow file or create a pull request, {{ site.data.variab
4545
After you enable {{ site.data.variables.product.prodname_code_scanning }}, you can monitor analysis, view results, and further customize how you scan your code.
4646

4747
- You can view the run status of {{ site.data.variables.product.prodname_code_scanning }} and get notifications for completed runs. For more information, see "[Managing a workflow run](/actions/configuring-and-managing-workflows/managing-a-workflow-run)" and "[Configuring notifications](/github/managing-subscriptions-and-notifications-on-github/configuring-notifications#github-actions-notification-options)."
48-
- After a scan completes, you can view alerts from a completed scan. For more information, see "[Managing alerts from {{ site.data.variables.product.prodname_code_scanning }}](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-alerts-from-code-scanning)."
48+
- After a scan completes, you can view alerts from a completed scan. For more information, see "[Managing {{ site.data.variables.product.prodname_code_scanning }} alerts for your repository](/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-code-scanning-alerts-for-your-repository)."
4949
- You can customize how {{ site.data.variables.product.prodname_code_scanning }} scans the code in your repository. For more information, see "[Configuring code scanning](/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning)."

content/github/finding-security-vulnerabilities-and-errors-in-your-code/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,9 @@ versions:
1111

1212
{% topic_link_in_list /automatically-scanning-your-code-for-vulnerabilities-and-errors %}
1313
{% link_in_list /about-code-scanning %}
14+
{% link_in_list /triaging-code-scanning-alerts-in-pull-requests %}
1415
{% link_in_list /enabling-code-scanning-for-a-repository %}
15-
{% link_in_list /managing-alerts-from-code-scanning %}
16+
{% link_in_list /managing-code-scanning-alerts-for-your-repository %}
1617
{% link_in_list /configuring-code-scanning %}
1718
{% link_in_list /configuring-the-codeql-workflow-for-compiled-languages %}
1819
{% link_in_list /troubleshooting-the-codeql-workflow %}

content/github/finding-security-vulnerabilities-and-errors-in-your-code/managing-alerts-from-code-scanning.md

Lines changed: 0 additions & 60 deletions
This file was deleted.

0 commit comments

Comments
 (0)