diff --git a/.all-contributorsrc b/.all-contributorsrc
index fce1e30b62dc..7beffebfe1ab 100644
--- a/.all-contributorsrc
+++ b/.all-contributorsrc
@@ -367,8 +367,17 @@
"contributions": [
"content"
]
- }
- ],
+ },
+ {
+ "login": "Protectator",
+ "name": "Kewin Dousse",
+ "avatar_url": "https://avatars3.githubusercontent.com/u/1529017?v=4",
+ "profile": "https://www.kewindousse.ch",
+ "contributions": [
+ "content"
+ ]
+ },
+ {
"contributorsPerLine": 7,
"projectName": "docs",
"projectOwner": "github",
diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS
index eb71a6edef7a..3eb7f05d4013 100644
--- a/.github/CODEOWNERS
+++ b/.github/CODEOWNERS
@@ -3,16 +3,21 @@
# https://help.github.com/articles/about-codeowners
# https://git-scm.com/docs/gitignore
-/translations/ @github/docs-localization @github-actions
+# Engineering
*.js @github/docs-engineering
/.github/ @github/docs-engineering
/script/ @github/docs-engineering
app.json @github/docs-engineering
-crowdin.yml @github/docs-engineering
Dockerfile @github/docs-engineering
package-lock.json @github/docs-engineering
package.json @github/docs-engineering
+# Localization
+/.github/workflows/crowdin.yml @github/docs-localization
+/crowdin*.yml @github/docs-engineering @github/docs-localization
+/translations/ @github/docs-engineering @github/docs-localization @github-actions
+
+# Site Policy
/content/github/site-policy/ @github/site-policy-admins
# Make sure that Octokit maintainers get notified about changes
diff --git a/.github/workflows/crowdin.yml b/.github/workflows/crowdin.yml
index 48100cbbe1d0..89b4f42689e6 100644
--- a/.github/workflows/crowdin.yml
+++ b/.github/workflows/crowdin.yml
@@ -3,6 +3,7 @@
name: Crowdin Sync
on:
+ workflow_dispatch:
push:
branches:
- main
@@ -10,6 +11,7 @@ on:
jobs:
sync_with_crowdin:
name: Sync with Crowdin
+ if: github.repository == 'github/docs-internal'
runs-on: ubuntu-latest
steps:
- name: Checkout
@@ -18,7 +20,7 @@ jobs:
- name: Sync
uses: crowdin/github-action@1.0.10
with:
- upload_translations: true
+ upload_translations: false
download_translations: true
create_pull_request: true
@@ -47,4 +49,4 @@ jobs:
# This token was created by logging into Crowdin with the octoglot user
CROWDIN_PERSONAL_TOKEN: ${{ secrets.CROWDIN_PERSONAL_TOKEN }}
-
\ No newline at end of file
+
diff --git a/.github/workflows/merged-notification.yml b/.github/workflows/merged-notification.yml
index 2251541a639e..8e821a002009 100644
--- a/.github/workflows/merged-notification.yml
+++ b/.github/workflows/merged-notification.yml
@@ -1,5 +1,5 @@
on:
- pull_request:
+ pull_request_target:
types: ['closed']
jobs:
diff --git a/README.md b/README.md
index 62b090fdfa38..d0eb8248f461 100644
--- a/README.md
+++ b/README.md
@@ -127,6 +127,7 @@ Thanks goes to these wonderful people ([emoji key](https://allcontributors.org/d
Chiedo John 💻 |
Paul Schifferer 🖋 |
+ Kewin Dousse 🖋 |
diff --git a/content/github/collaborating-with-issues-and-pull-requests/about-comparing-branches-in-pull-requests.md b/content/github/collaborating-with-issues-and-pull-requests/about-comparing-branches-in-pull-requests.md
index bf7cded43c3c..c66689d29b11 100644
--- a/content/github/collaborating-with-issues-and-pull-requests/about-comparing-branches-in-pull-requests.md
+++ b/content/github/collaborating-with-issues-and-pull-requests/about-comparing-branches-in-pull-requests.md
@@ -54,7 +54,7 @@ A two-dot diff compares two Git committish references, such as SHAs or OIDs (Obj
If you want to simulate a two-dot diff in a pull request and see a comparison between the most recent versions of each branch, you can merge the base branch into your topic branch, which updates the last common ancestor between your branches.
-For more information about Git commands to compare changes, see "[Git diff options ](https://git-scm.com/docs/git-diff#git-diff-emgitdiffemltoptionsgtltcommitgtltcommitgt--ltpathgt82308203)" from the _Pro Git_ book site.
+For more information about Git commands to compare changes, see "[Git diff options](https://git-scm.com/docs/git-diff#git-diff-emgitdiffemltoptionsgtltcommitgtltcommitgt--ltpathgt82308203)" from the _Pro Git_ book site.
### Reasons diffs will not display
- You've exceeded the total limit of files or certain file types. For more information, see "[Limits for viewing content and diffs in a repository](/articles/limits-for-viewing-content-and-diffs-in-a-repository/#diff-limits)."
diff --git a/content/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning.md b/content/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning.md
index 7906c341ae70..af2300e7a3c5 100644
--- a/content/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning.md
+++ b/content/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning.md
@@ -130,6 +130,52 @@ If your workflow does not contain a matrix called `language`, then {% data varia
with:
languages: cpp, csharp, python
```
+{% if currentVersion == "free-pro-team@latest" %}
+### Analyzing Python dependencies
+
+For GitHub-hosted runners that use Linux only, the {% data variables.product.prodname_codeql_workflow %} will try to auto-install Python dependencies to give more results for the CodeQL analysis. You can control this behavior by specifying the `setup-python-dependencies` parameter for the action called by the "Initialize CodeQL" step. By default, this parameter is set to `true`:
+
+- If the repository contains code written in Python, the "Initialize CodeQL" step installs the necessary dependencies on the GitHub-hosted runner. If the auto-install succeeds, the action also sets the environment variable `CODEQL_PYTHON` to the Python executable file that includes the dependencies.
+
+- If the repository doesn't have any Python dependencies, or the dependencies are specified in an unexpected way, you'll get a warning and the action will continue with the remaining jobs. The action can run successfully even when there are problems interpreting dependencies, but the results may be incomplete.
+
+Alternatively, you can install Python dependencies manually on any operating system. You will need to add `setup-python-dependencies` and set it to `false`, as well as set `CODEQL_PYTHON` to the Python executable that includes the dependencies, as shown in this workflow extract:
+
+```yaml
+jobs:
+ CodeQL-Build:
+
+ runs-on: ubuntu-latest
+
+ steps:
+ - name: Checkout repository
+ uses: actions/checkout@v2
+ with:
+ fetch-depth: 2
+ - name: Set up Python
+ uses: actions/setup-python@v2
+ with:
+ python-version: '3.x'
+ - name: Install dependencies
+ run: |
+ python -m pip install --upgrade pip
+ if [ -f requirements.txt ];
+ then pip install -r requirements.txt;
+ fi
+ # Set the `CODEQL-PYTHON` environment variable to the Python executable
+ # that includes the dependencies
+ echo "::set-env name=CODEQL_PYTHON::$(which python)"
+ - run: git checkout HEAD^2
+ if: ${{ github.event_name == 'pull_request' }}
+ - name: Initialize CodeQL
+ uses: github/codeql-action/init@v1
+ with:
+ languages: python
+ # Override the default behavior so that the action doesn't attempt
+ # to auto-install Python dependencies
+ setup-python-dependencies: false
+```
+{% endif %}
### Running additional queries
diff --git a/content/github/finding-security-vulnerabilities-and-errors-in-your-code/troubleshooting-the-codeql-workflow.md b/content/github/finding-security-vulnerabilities-and-errors-in-your-code/troubleshooting-the-codeql-workflow.md
index baadd06ebb14..f42dbb3db617 100644
--- a/content/github/finding-security-vulnerabilities-and-errors-in-your-code/troubleshooting-the-codeql-workflow.md
+++ b/content/github/finding-security-vulnerabilities-and-errors-in-your-code/troubleshooting-the-codeql-workflow.md
@@ -114,3 +114,12 @@ If you split your analysis into multiple workflows as described above, we still
#### Run only during a `schedule` event
If your analysis is still too slow to be run during `push` or `pull_request` events, then you may want to only trigger analysis on the `schedule` event. For more information, see "[Events](/actions/learn-github-actions/introduction-to-github-actions#events)."
+
+{% if currentVersion == "free-pro-team@latest" %}
+### Results differ between analysis platforms
+
+If you are analyzing code written in Python, you may see different results depending on whether you run the {% data variables.product.prodname_codeql_workflow %} on Linux, macOS, or Windows.
+
+On GitHub-hosted runners that use Linux, the {% data variables.product.prodname_codeql_workflow %} tries to install and analyze Python dependencies, which could lead to more results. To disable the auto-install, add `setup-python-dependencies: false` to the "Initialize CodeQL" step of the workflow. For more information about configuring the analysis of Python dependencies, see "[Analyzing Python dependencies](/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#analyzing-python-dependencies)."
+
+{% endif %}
\ No newline at end of file