53 Search results for "f"
Get started / Using Git /
About Git subtree merges
into it.
$ git read-tree --prefix=spoon-knife/ -u spoon-knife/main
> fatal: refusing to merge unrelated histories
Commit the changes to keep them safe
GitHub Actions / Use cases and examples / Build and test /
Building and testing Ruby
branches: [ main ]
jobs:
test:
runs-on: ${{ matrix.os }}-latest
strategy:
fail-fast: false
matrix:
os: [ubuntu, macos]
ruby: [2.5, 2.6, 2.7, head, debug, jruby
Secure coding / CodeQL CLI / CodeQL CLI manual /
pack upgrade
--format=<fmt>
Select output format, either text (default) or json.
-f, --[no-]force
Allow overwriting already existing packs.
--[no-]allow-prerelease
Secure coding / CodeQL CLI / CodeQL CLI manual /
pack ci
specified in the qlpack.yml file, or if no lock file is present, this
command fails.
This command is similar to codeql pack install, except it's meant to
be
Secure coding / CodeQL CLI / CodeQL CLI manual /
pack download
Without this flag, pre-release packs will
be ignored.
Available since v2.11.3.
-f, --[no-]force
Allow overwriting already existing packs.
Options for finding
Secure coding / CodeQL CLI / CodeQL CLI manual /
github upload-results
will attempt to autodetect this from the
checkout path if it is omitted.
-f, --ref=<ref>
Name of the ref that was analyzed. If this ref is a pull
Secure coding / CodeQL CLI / CodeQL CLI manual /
pack install
valid
with respect to the dependencies specified in the qlpack.yml file, or
fail the lock file if it does not exist. This mode has been superseded
by the
Secure coding / Code scanning / Integrate with code scanning /
Uploading a SARIF file to GitHub
internal repositories, code scanning is available when GitHub Code Security features are enabled for the repository. If you see the error Advanced Security
GitHub Actions / Security / Security harden deployments /
Configuring OpenID Connect in cloud providers
first need to configure your cloud provider to trust GitHub's OIDC as a federated identity, and must then update your workflows to authenticate using tokens
GitHub Actions / Self-hosted runners / Manage self-hosted runners /
Customizing the containers used by jobs
"targetVolumePath": "/volume_mount",
"readOnly": false
}
],
"systemMountVolumes": [
{
"sourceVolumePath": &