You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/admin/configuration/configuring-your-enterprise/site-admin-dashboard.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -193,7 +193,7 @@ You can see the number of active committers that are currently using seats for {
193
193
194
194
Under "Current active committer count", you can see the number of active committers for repositories with {% data variables.product.prodname_GH_advanced_security %} enabled. This is the number of licensed seats that are currently being used.
195
195
196
-
Under "Maximum committers across across entire instance", you can see the number of active committers across all the repositories in your enterprise. This is the number of seats that would be used if you enabled {% data variables.product.prodname_GH_advanced_security %} for every repository in your enterprise.
196
+
Under "Maximum committers across entire instance", you can see the number of active committers across all the repositories in your enterprise. This is the number of seats that would be used if you enabled {% data variables.product.prodname_GH_advanced_security %} for every repository in your enterprise.
197
197
198
198
Under "Calculate Additional Advanced Committers", you can calculate how many more additional seats will be used if you enable {% data variables.product.prodname_GH_advanced_security %} for specific organizations and repositories. Under "Organizations and Repositories", enter or paste a list of organizations and repositories, with one organization or repository per line.
Copy file name to clipboardExpand all lines: content/admin/overview/creating-an-enterprise-account.md
+5Lines changed: 5 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -22,6 +22,11 @@ An enterprise account is included in {% data variables.product.prodname_ghe_clou
22
22
23
23
When you create an enterprise account, your existing organization will automatically be owned by the enterprise account. All current owners of your organization will become owners of the enterprise account. All current billing managers of the organization will become billing managers of the new enterprise account. The current billing details of the organization, including the organization's billing email address, will become billing details of the new enterprise account.
24
24
25
+
If the organization is connected to {% data variables.product.prodname_ghe_server %} or {% data variables.product.prodname_ghe_managed %} via {% data variables.product.prodname_github_connect %}, upgrading the organization to an enterprise account **will not** update the connection. If you want to connect to the new enterprise account, you must disable and re-enable {% data variables.product.prodname_github_connect %}.
26
+
27
+
- "[Managing {% data variables.product.prodname_github_connect %}](/enterprise-server@latest/admin/configuration/configuring-github-connect/managing-github-connect)" in the {% data variables.product.prodname_ghe_server %} documentation
28
+
- "[Managing {% data variables.product.prodname_github_connect %}](/github-ae@latest/admin/configuration/configuring-github-connect/managing-github-connect)" in the {% data variables.product.prodname_ghe_managed %} documentation
29
+
25
30
## Creating an enterprise account on {% data variables.product.prodname_dotcom %}
26
31
27
32
To create an enterprise account on {% data variables.product.prodname_dotcom %}, your organization must be using {% data variables.product.prodname_ghe_cloud %} and paying by invoice.
Copy file name to clipboardExpand all lines: content/code-security/code-scanning/using-codeql-code-scanning-with-your-existing-ci-system/configuring-codeql-cli-in-your-ci-system.md
+38-31Lines changed: 38 additions & 31 deletions
Original file line number
Diff line number
Diff line change
@@ -61,15 +61,15 @@ You can display the command-line help for any command using the <nobr>`--help`</
61
61
- For a pull request, check out either the head commit of the pull request, or check out a {% data variables.product.prodname_dotcom %}-generated merge commit of the pull request.
62
62
2. Set up the environment for the codebase, making sure that any dependencies are available. For more information, see [Creating databases for non-compiled languages](https://codeql.github.com/docs/codeql-cli/creating-codeql-databases/#creating-databases-for-non-compiled-languages) and [Creating databases for compiled languages](https://codeql.github.com/docs/codeql-cli/creating-codeql-databases/#creating-databases-for-compiled-languages) in the documentation for the {% data variables.product.prodname_codeql_cli %}.
63
63
3. Find the build command, if any, for the codebase. Typically this is available in a configuration file in the CI system.
64
-
4. Run `codeql database create` from the checkout root of your repository and build the codebase.
64
+
4. Run `codeql database create` from the checkout root of your repository and build the codebase.
65
65
{% ifversion fpt or ghes > 3.1 or ghae or ghec %}
66
66
```shell
67
67
# Single supported language - create one CodeQL databsae
> Finalizing database at /codeql-dbs/example-repo.
111
111
> Successfully created database at /codeql-dbs/example-repo.
112
112
```
@@ -146,16 +146,11 @@ $
146
146
147
147
## Analyzing a {% data variables.product.prodname_codeql %} database
148
148
149
-
1. Create a {% data variables.product.prodname_codeql %} database (see above).{% if codeql-packs %}
150
-
2. Optional, run `codeql pack download` to download any {% data variables.product.prodname_codeql %} packs (beta) that you want to run during analysis. For more information, see "[Downloading and using {% data variables.product.prodname_codeql %} query packs](#downloading-and-using-codeql-query-packs)" below.
151
-
```shell
152
-
codeql pack download <packs>
153
-
```
154
-
{% endif %}
155
-
3. Run `codeql database analyze` on the database and specify which {% if codeql-packs %}packs and/or {% endif %}queries to use.
149
+
1. Create a {% data variables.product.prodname_codeql %} database (see above).
150
+
2. Run `codeql database analyze` on the database and specify which {% if codeql-packs %}packs and/or {% endif %}queries to use.
|<nobr>`--output`</nobr>| {% octicon "check-circle-fill" aria-label="Required" %} | Specify where to save the SARIF results file.{% ifversion fpt or ghes > 3.1 or ghae or ghec %}
180
175
|<nobr>`--sarif-category`<nobr>| {% octicon "question" aria-label="Required with multiple results sets" %} | Optional forsingle database analysis. Required to define the language when you analyze multiple databases for a single commitin a repository. Specify a category to include in the SARIF results file for this analysis. A category is used to distinguish multiple analyses for the same tool and commit, but performed on different languages or different parts of the code.|{% endif %}{% ifversion fpt or ghes > 3.3 or ghae or ghec %}
181
176
|<nobr>`--sarif-add-query-help`</nobr>|| Optional. Use if you want to include any available markdown-rendered query helpforcustom queries usedin your analysis. Any query helpforcustom queries includedin the SARIF output will be displayed in the code scanning UI if the relevant query generates an alert. For more information, see [Analyzing databases with the {% data variables.product.prodname_codeql_cli %}](https://codeql.github.com/docs/codeql-cli/analyzing-databases-with-the-codeql-cli/#including-query-help-for-custom-codeql-queries-in-sarif-files) in the documentation for the {% data variables.product.prodname_codeql_cli %}.{% endif %}{% if codeql-packs %}
182
-
|`<packs>`|| Optional. Use if you have downloaded CodeQL query packs and want to run the default queries or query suites specified in the packs. For more information, see "[Downloading and using {% data variables.product.prodname_codeql %} packs](#downloading-and-using-codeql-query-packs)."{% endif %}
177
+
|`<packs>`|| Optional. Use if you want to include CodeQL query packs in your analysis. For more information, see "[Downloading and using {% data variables.product.prodname_codeql %} packs](#downloading-and-using-codeql-query-packs)."
178
+
|<nobr>`--download`</nobr>|| Optional. Use if some of your CodeQL query packs are not yet on disk and need to be downloaded before running queries.{% endif %}
183
179
|<nobr>`--threads`</nobr>|| Optional. Use if you want to use more than one thread to run queries. The default value is `1`. You can specify more threads to speed up query execution. To set the number of threads to the number of logical processors, specify `0`.
184
180
|<nobr>`--verbose`</nobr>|| Optional. Use to get more detailed information about the analysis process{% ifversion fpt or ghes > 3.1 or ghae or ghec %} and diagnostic data from the database creation process{% endif %}.
185
181
@@ -192,13 +188,12 @@ This example analyzes a {% data variables.product.prodname_codeql %} database st
javascript-code-scanning.qls {% ifversion fpt or ghes > 3.1 or ghae or ghec %}--sarif-category=javascript{% endif %}
191
+
javascript-code-scanning.qls {% ifversion fpt or ghes > 3.1 or ghae or ghec %}--sarif-category=javascript\{% endif %}
196
192
--format={% ifversion fpt or ghae or ghec %}sarif-latest{% else %}sarifv2.1.0{% endif %} --output=/temp/example-repo-js.sarif
197
193
198
194
> Running queries.
199
-
> Compiling query plan for /codeql-home/codeql/qlpacks/
200
-
codeql-javascript/AngularJS/DisablingSce.ql.
201
-
...
195
+
> Compiling query plan for /codeql-home/codeql/qlpacks/codeql-javascript/AngularJS/DisablingSce.ql.
196
+
...
202
197
> Shutting down query evaluator.
203
198
> Interpreting results.
204
199
```
@@ -251,38 +246,50 @@ There is no output from this command unless the upload was unsuccessful. The com
251
246
252
247
The {% data variables.product.prodname_codeql_cli %} bundle includes queries that are maintained by {% data variables.product.company_short %} experts, security researchers, and community contributors. If you want to run queries developed by other organizations, {% data variables.product.prodname_codeql %} query packs provide an efficient and reliable way to download and run queries. For more information, see "[About code scanning with CodeQL](/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql#about-codeql-queries)."
253
248
254
-
Before you can use a {% data variables.product.prodname_codeql %} pack to analyze a database, you must download any packages you require from the {% data variables.product.company_short %} {% data variables.product.prodname_container_registry %} by running `codeql pack download` and specifying the packages you want to download. If a package is not publicly available, you will need to use a {% data variables.product.prodname_github_app %} or personal access token to authenticate. For more information and an example, see "[Uploading results to {% data variables.product.product_name %}](#uploading-results-to-github)" above.
Before you can use a {% data variables.product.prodname_codeql %} pack to analyze a database, you must download any packages you require from the {% data variables.product.company_short %} {% data variables.product.prodname_container_registry %}. This can be done either by using the `--download` flag as part of the `codeql database analyze` command. If a package is not publicly available, you will need to use a {% data variables.product.prodname_github_app %} or personal access token to authenticate. For more information and an example, see "[Uploading results to {% data variables.product.product_name %}](#uploading-results-to-github)" above.
259
250
260
251
| Option | Required | Usage |
261
252
|--------|:--------:|-----|
262
-
|<nobr>`<scope/name@version>`</nobr>| {% octicon "check-circle-fill" aria-label="Required" %} | Specify the scope and name of one or more CodeQL query packs to download using a comma-separated list. Optionally, include the version to download and unzip. By default the latest version of this pack is downloaded. |
253
+
|<nobr>`<scope/name@version:path>`</nobr>| {% octicon "check-circle-fill" aria-label="Required" %} | Specify the scope and name of one or more CodeQL query packs to download using a comma-separated list. Optionally, include the version to download and unzip. By default the latest version of this pack is downloaded. Optionally, include a path to a query, directory, or query suite to run. If no path is included, then run the default queries of this pack. |
263
254
|<nobr>`--github-auth-stdin`</nobr>|| Optional. Pass the {% data variables.product.prodname_github_app %} or personal access token created for authentication with {% data variables.product.company_short %}'s REST API to the CLI via standard input. This is not needed if the command has access to a `GITHUB_TOKEN` environment variable set with this token.
264
255
265
256
### Basic example
266
257
267
-
This example runs two commands to download the latest version of the `octo-org/security-queries` pack and then analyze the database `/codeql-dbs/example-repo`.
258
+
This example runs the `codeql database analyze` command with the `--download` option to:
259
+
260
+
1. Download the latest version of the `octo-org/security-queries` pack.
261
+
2. Download a version of the `octo-org/optional-security-queries` pack that is *compatible* with version 1.0.1 (in this case, it is version 1.0.2). For more information on semver compatibility, see [npm's semantic version range documentation](https://github.com/npm/node-semver#ranges).
262
+
3. Run all the default queries in`octo-org/security-queries`.
263
+
4. Run only the query `queries/csrf.ql` from `octo-org/optional-security-queries`
> Compiling query plan for /Users/mona/.codeql/packages/octo-org/security-queries/1.0.0/potential-sql-injection.ql.
280
-
> [1/1] Found in cache: /Users/mona/.codeql/packages/octo-org/security-queries/1.0.0/potential-sql-injection.ql.
276
+
> [1/2] Found in cache: /Users/mona/.codeql/packages/octo-org/security-queries/1.0.0/potential-sql-injection.ql.
281
277
> Starting evaluation of octo-org/security-queries/query1.ql.
282
-
> [1/1 eval 394ms] Evaluation done; writing results to docto-org/security-queries/query1.bqrs.
278
+
> Compiling query plan for /Users/mona/.codeql/packages/octo-org/optional-security-queries/1.0.2/queries/csrf.ql.
279
+
> [2/2] Found in cache: /Users/mona/.codeql/packages/octo-org/optional-security-queries/1.0.2/queries/csrf.ql.
280
+
> Starting evaluation of octo-org/optional-security-queries/queries/csrf.ql.
281
+
> [2/2 eval 694ms] Evaluation done; writing results to octo-org/security-queries/query1.bqrs.
283
282
> Shutting down query evaluator.
284
283
> Interpreting results.
285
284
```
285
+
286
+
### Direct download of {% data variables.product.prodname_codeql %} packs
287
+
288
+
If you want to download a {% data variables.product.prodname_codeql %} pack without running it immediately, then you can use the `codeql pack download` command. This is useful if you want to avoid accessing the internet when running {% data variables.product.prodname_codeql %} queries. When you run the {% data variables.product.prodname_codeql %} analysis, you can specify packs, versions, and paths in the same way as in the previous example:
0 commit comments