Skip to main content

53 Search results for "f"

Get started / Using Git /

About Git subtree merges

into it. $ git read-tree --prefix=spoon-knife/ -u spoon-knife/main > fatal: refusing to merge unrelated histories Commit the changes to keep them safe

GitHub Actions / Use cases and examples / Build and test /

Building and testing Ruby

branches: [ main ] jobs: test: runs-on: ${{ matrix.os }}-latest strategy: fail-fast: false matrix: os: [ubuntu, macos] ruby: [2.5, 2.6, 2.7, head, debug, jruby

Secure coding / CodeQL CLI / CodeQL CLI manual /

pack upgrade

--format=<fmt> Select output format, either text (default) or json. -f, --[no-]force Allow overwriting already existing packs. --[no-]allow-prerelease

Secure coding / CodeQL CLI / CodeQL CLI manual /

pack ci

specified in the qlpack.yml file, or if no lock file is present, this command fails. This command is similar to codeql pack install, except it's meant to be

Secure coding / CodeQL CLI / CodeQL CLI manual /

pack download

Without this flag, pre-release packs will be ignored. Available since v2.11.3. -f, --[no-]force Allow overwriting already existing packs. Options for finding

Secure coding / CodeQL CLI / CodeQL CLI manual /

github upload-results

will attempt to autodetect this from the checkout path if it is omitted. -f, --ref=<ref> Name of the ref that was analyzed. If this ref is a pull

Secure coding / CodeQL CLI / CodeQL CLI manual /

pack install

valid with respect to the dependencies specified in the qlpack.yml file, or fail the lock file if it does not exist. This mode has been superseded by the

Secure coding / Code scanning / Integrate with code scanning /

Uploading a SARIF file to GitHub

internal repositories, code scanning is available when GitHub Code Security features are enabled for the repository. If you see the error Advanced Security

GitHub Actions / Security / Security harden deployments /

Configuring OpenID Connect in cloud providers

first need to configure your cloud provider to trust GitHub's OIDC as a federated identity, and must then update your workflows to authenticate using tokens

GitHub Actions / Self-hosted runners / Manage self-hosted runners /

Customizing the containers used by jobs

"targetVolumePath": "/volume_mount", "readOnly": false } ], "systemMountVolumes": [ { "sourceVolumePath": &