-
Notifications
You must be signed in to change notification settings - Fork 8.8k
Reuel albert dev patch 1 #19206
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reuel albert dev patch 1 #19206
Conversation
runs-on: windows-latest | ||
|
||
steps: | ||
- uses: actions/checkout@v4 | ||
- uses: actions/setup-dotnet@v4 | ||
with: | ||
dotnet-version: | | ||
5.0.x | ||
6.0.x | ||
- name: Run Microsoft Security DevOps | ||
uses: microsoft/[email protected] | ||
id: msdo | ||
- name: Upload results to Security tab | ||
uses: github/codeql-action/upload-sarif@v3 | ||
with: | ||
sarif_file: ${{ steps.msdo.outputs.sarifFile }} |
Check warning
Code scanning / CodeQL
Workflow does not contain permissions Medium
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
5 similar comments
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
- language: actions | ||
build-mode: none | ||
- language: c-cpp | ||
build-mode: autobuild |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
build-mode: none | ||
- language: python | ||
build-mode: none | ||
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'rust', 'swift' |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
build-mode: none | ||
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'rust', 'swift' | ||
# Use `c-cpp` to analyze code written in C, C++ or both | ||
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
# | ||
# Microsoft Security DevOps (MSDO) is a command line application which integrates static analysis tools into the development cycle. |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
# documentation. | ||
# | ||
# Microsoft Security DevOps (MSDO) is a command line application which integrates static analysis tools into the development cycle. | ||
# MSDO installs, configures and runs the latest versions of static analysis tools |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
- cron: '45 10 * * 0' | ||
|
||
jobs: | ||
MSDO: |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
|
||
steps: | ||
- uses: actions/checkout@v4 | ||
- uses: actions/setup-dotnet@v4 |
Check warning
Code scanning / check-spelling
Candidate Pattern Warning
6.0.x | ||
- name: Run Microsoft Security DevOps | ||
uses: microsoft/[email protected] | ||
id: msdo |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
- name: Upload results to Security tab | ||
uses: github/codeql-action/upload-sarif@v3 | ||
with: | ||
sarif_file: ${{ steps.msdo.outputs.sarifFile }} |
Check failure
Code scanning / check-spelling
Unrecognized Spelling Error
@check-spelling-bot Report🔴 Please reviewSee the 📂 files view, the 📜action log, or 📝 job summary for details.Unrecognized words (3)autobuild These words are not needed and should be removedfoob fuzzyfinder lstrcmpi oobTo accept these unrecognized words as correct and remove the previously acknowledged and now absent words, you could run the following commands... in a clone of the [email protected]:ReuelAlbert-Dev/terminal.git repository curl -s -S -L 'https://raw.githubusercontent.com/check-spelling/check-spelling/v0.0.25/apply.pl' |
perl - 'https://github.com/microsoft/terminal/actions/runs/16700831066/attempts/1' &&
git commit -m 'Update check-spelling metadata' Pattern suggestions ✂️ (1)You could add these patterns to
Alternatively, if a pattern suggestion doesn't make sense for this project, add a Notices ℹ️ (1)See the 📂 files view, the 📜action log, or 📝 job summary for details.
See ℹ️ Event descriptions for more information. ✏️ Contributor please read thisBy default the command suggestion will generate a file named based on your commit. That's generally ok as long as you add the file to your commit. Someone can reorganize it later. If the listed items are:
See the 🔬 You can test your commits without appending to a PR by creating a new branch with that extra change and pushing it to your fork. The check-spelling action will run in response to your push -- it doesn't require an open pull request. By using such a branch, you can limit the number of typos your peers see you make. 😉 If the flagged items are 🤯 false positivesIf items relate to a ...
|
Summary of the Pull Request
References and Relevant Issues
Detailed Description of the Pull Request / Additional comments
Validation Steps Performed
PR Checklist