-
Notifications
You must be signed in to change notification settings - Fork 61.9k
Add new troubleshooting codeql #17116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add new troubleshooting codeql #17116
Conversation
Automatically generated comment ℹ️This comment is automatically generated and will be overwritten every time changes are committed to this branch. The table contains an overview of files in the Content directory changesYou may find it useful to copy this table into the pull request summary. There you can edit it to share links to important articles or changes and to give a high-level overview of how the changes in your pull request support the overall goals of the pull request.
|
@cmwilson21 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally looks great - thanks 💖
Reviewing your PR made me realize an oversight in my original suggestion here, but once that's resolve, this should be ready to merge 👍🏻
|
||
For languages like Go, JavaScript, Python, and TypeScript, that {% data variables.product.prodname_codeql %} analyzes without compiling the source code, you can specify additional configuration options to limit the amount of code to analyze. For more information, see "[Specifying directories to scan](/code-security/secure-coding/configuring-code-scanning#specifying-directories-to-scan)." | ||
|
||
If you split your analysis into multiple workflows as described above, we still recommend that you have at least one workflow which runs on a `schedule` which analyzes all of the code in your repository. Because {% data variables.product.prodname_codeql %} analyzes data flows between components, some complex security behaviors may only be detected on a complete build. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've only just noticed that this last paragraph refers to the original first paragraph (the one that's not included in this new reusable). 🙈
I think it probably makes sense to move line 5 out of the reusable and back into its original location, after the reusable is called.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Got it! Pushed the new changes just now :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks Courtney, that looks great 💖
🚀
Thanks very much for contributing! Your pull request has been merged 🎉 You should see your changes appear on the site in approximately 24 hours. If you're looking for your next contribution, check out our help wanted issues ⚡ |
Why:
Closes 15967
What's being changed:
Changed the second, third, and fourth paragraphs in "Reduce the amount of code being analyzed in a single workflow" section to a reusable titled - "alerts-found-in-generated-code" and created a new section with that same name. The new section was placed after "Lines of code scanned are lower than expected" and before the section "Extraction errors in the database". I'm happy to move it to a different spot if it makes more sense somewhere else.
Check off the following:
Writer impact (This section is for GitHub staff members only):