Skip to content

Commit 4bb5be2

Browse files
committed
review-2
1 parent 0b69b7c commit 4bb5be2

File tree

9 files changed

+12
-12
lines changed

9 files changed

+12
-12
lines changed

learn-pr/github/codebase-representation-codeql/1-introduction.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: Introduction
66
title: Introduction
77
description: Learn how to use CodeQL to identify security vulnerabilities in your codebase.
8-
ms.date: 05/01/2024
8+
ms.date: 07/01/2025
99
author: a-a-ron
1010
ms.author: aastewar
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/2-how-prepare-database-codeql.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: Prepare a database for CodeQL
66
title: Prepare a database for CodeQL
77
description: Learn how to create a CodeQL database.
8-
ms.date: 05/01/2024
8+
ms.date: 07/01/2025
99
author: a-a-ron
1010
ms.author: aastewar
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/3-run-codeql-database.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: Run CodeQL in a database
66
title: Run CodeQL in a database
77
description: Learn how to analyze your database by using CodeQL queries.
8-
ms.date: 05/01/2024
8+
ms.date: 07/01/2025
99
author: a-a-ron
1010
ms.author: aastewar
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/4-understand-results.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: Understand CodeQL results
66
title: Understand CodeQL results
77
description: View your CodeQL results and determine if there are security vulnerabilities to address.
8-
ms.date: 05/01/2024
8+
ms.date: 07/01/2025
99
author: a-a-ron
1010
ms.author: aastewar
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/5-troubleshoot-your-results.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: Troubleshoot CodeQL results
66
title: Troubleshoot CodeQL results
77
description: Learn about common tips for troubleshooting your CodeQL queries.
8-
ms.date: 05/01/2024
8+
ms.date: 07/01/2025
99
author: a-a-ron
1010
ms.author: aastewar
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/6-knowledge-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: knowledge_check
66
title: Module assessment
77
description: Check your knowledge about CodeQL.
8-
ms.date: 04/08/2024
8+
ms.date: 07/01/2025
99
author: rmcmurray
1010
ms.author: robmcm
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/7-summary.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
unitType: Summary
66
title: Summary
77
description: Review what you learned in this module.
8-
ms.date: 05/01/2024
8+
ms.date: 07/01/2025
99
author: a-a-ron
1010
ms.author: aastewar
1111
ms.topic: unit

learn-pr/github/codebase-representation-codeql/includes/5-troubleshoot-your-results.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Here are important points to keep in mind while you're working with CodeQL and t
1717

1818
- CodeQL predicates and classes are evaluated to database tables. Large predicates generate large tables with many rows, so they're expensive to compute.
1919
- The QL language is implemented through standard database operations and relational algebra, such as join, projection, and union.
20-
- Queries are evaluated *bottom up*, which means that a predicate is not evaluated until all of the predicates that it depends on are evaluated.
20+
- Queries are evaluated *bottom up*, which means that a predicate isn't evaluated until all of the predicates that it depends on are evaluated.
2121

2222
### Debug artifacts
2323

@@ -41,7 +41,7 @@ If a workflow run for code scanning fails because of a server error, a transient
4141

4242
### Error: "Out of disk" or "Out of memory"
4343

44-
CodeQL might run out of disk or memory on the runner for very large projects. If it's a hosted GitHub Actions runner, contact GitHub support to investigate the problem. If it's a self-hosted runner, you might need to make adjustments to the server's specifications. For more information, see the [CodeQL documentation about recommended hardware for running CodeQL](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/recommended-hardware-resources-for-running-codeql).
44+
CodeQL might run out of disk or memory on the runner for projects that are too large. If it's a hosted GitHub Actions runner, contact GitHub support to investigate the problem. If it's a self-hosted runner, you might need to make adjustments to the server's specifications. For more information, see the [CodeQL documentation about recommended hardware for running CodeQL](https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/recommended-hardware-resources-for-running-codeql).
4545

4646
### Error: 403 "Resource not accessible by integration" when using Dependabot
4747

@@ -64,7 +64,7 @@ on:
6464

6565
### Error: "SARIF Upload Rejected Because of Default Setup"
6666

67-
You get an error if a process tries to upload a SARIF file that contains results of CodeQL analysis to a repository where CodeQL default setup is enabled. This issue includes uploads through the REST API and the CodeQL CLI. SARIF uploads are blocked when CodeQL default setup is enabled, to reduce the potential for user confusion when multiple systems generate similar code-scanning alerts.
67+
SARIF uploads are blocked when the CodeQL default setup is enabled. This error occurs when a process tries to upload a SARIF file containing CodeQL analysis results to a repository with default setup enabled. The error also occurs if the upload is done through the REST API and the CodeQL CLI. This block is in place to reduce the potential for user confusion when multiple systems generate similar code-scanning alerts.
6868

6969
This error occurs only for SARIF files that contain results that you create by using CodeQL. To fix this error, disable CodeQL in the repository and then retry uploading the SARIF file.
7070

learn-pr/github/codebase-representation-codeql/index.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,15 +3,15 @@ uid: learn.codebase-representation-codeql
33
metadata:
44
title: "Identify security vulnerabilities in your codebase by using CodeQL"
55
description: "Learn how to use CodeQL to analyze the code in your GitHub repository and identify security vulnerabilities."
6-
ms.date: 05/01/2024
6+
ms.date: 07/01/2025
77
author: a-a-ron
88
ms.author: aastewar
99
ms.topic: module
1010
ms.service: github
1111
title: Identify security vulnerabilities in your codebase by using CodeQL
1212
summary: "In this module, you learn about CodeQL and how you can use it to analyze the code in your GitHub repository and identify security vulnerabilities."
1313
abstract: |
14-
By the end of this module, you'll be able to:
14+
By the end of this module, you're able to:
1515
- Create a database by using CodeQL to extract a single relational representation of each source file in the codebase.
1616
- Run CodeQL in a database to find problems in your source code and find potential security vulnerabilities.
1717
- Understand CodeQL scan results by using GitHub-created queries or your own custom queries.

0 commit comments

Comments
 (0)