Skip to content

[Dynamic Instrumentation] Fix line exploration tests #12452

[Dynamic Instrumentation] Fix line exploration tests

[Dynamic Instrumentation] Fix line exploration tests #12452

Workflow file for this run

name: "CodeQL"
on:
push:
branches: [ master, hotfix/**/* ]
pull_request:
branches: [ master, hotfix/**/* ]
env:
DD_ENV: ci
DD_SERVICE: dd-trace-dotnet
jobs:
profiler:
name: Analyze Profiler
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@v2
- uses: actions/setup-dotnet@v1
with:
dotnet-version: '8.0.100'
- name: Download datadog-ci
run: |
npm install -g @datadog/datadog-ci
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: csharp, cpp
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main
# Learn more about CodeQL language support at https://git.io/codeql-language-support
- name: Install Clang-16
run: |
wget https://apt.llvm.org/llvm.sh
chmod +x ./llvm.sh
sudo ./llvm.sh 16
sudo ln -s -f `which clang-16` `which clang`
sudo ln -s -f `which clang++-16` `which clang++`
- name: Build dd-trace-dotnet
run: |
./tracer/build.sh BuildProfilerHome BuildNativeLoader
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
- name: filter-sarif cpp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/cpp.sarif
output: ../results/cpp.sarif
- name: filter-sarif csharp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/csharp.sarif
output: ../results/csharp.sarif
# - name: Upload sarif file
# run: |
# datadog-ci sarif upload ../results/cpp.sarif --service dd-trace-dotnet
# datadog-ci sarif upload ../results/csharp.sarif --service dd-trace-dotnet
# env:
# DD_API_KEY: '${{ secrets.DD_STAGING_API_KEY }}'
tracer:
name: Analyze Tracer
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@v2
- uses: actions/setup-dotnet@v1
with:
dotnet-version: '8.0.100'
- name: Download datadog-ci
run: |
npm install -g @datadog/datadog-ci
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: csharp, cpp
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main
# Learn more about CodeQL language support at https://git.io/codeql-language-support
- name: Install Clang-16
run: |
wget https://apt.llvm.org/llvm.sh
chmod +x ./llvm.sh
sudo ./llvm.sh 16
sudo ln -s -f `which clang-16` `which clang`
sudo ln -s -f `which clang++-16` `which clang++`
- name: Build dd-trace-dotnet
run: |
./tracer/build.sh BuildTracerHome
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
- name: filter-sarif cpp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/cpp.sarif
output: ../results/cpp.sarif
- name: filter-sarif csharp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/csharp.sarif
output: ../results/csharp.sarif
# - name: Upload sarif file
# run: |
# datadog-ci sarif upload ../results/cpp.sarif --service dd-trace-dotnet
# datadog-ci sarif upload ../results/csharp.sarif --service dd-trace-dotnet
# env:
# DD_API_KEY: '${{ secrets.DD_STAGING_API_KEY }}'