Skip to content

Fix AWS SQS test snapshots #6080

Fix AWS SQS test snapshots

Fix AWS SQS test snapshots #6080

Workflow file for this run

name: "CodeQL"
on:
push:
branches: [ master, hotfix/**/* ]
pull_request:
branches: [ master, hotfix/**/* ]
env:
DD_ENV: ci
DD_SERVICE: dd-trace-dotnet
jobs:
profiler:
name: Analyze Profiler
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@v2
- uses: actions/setup-dotnet@v1
with:
dotnet-version: '8.0.100'
- name: Download datadog-ci
run: |
npm install -g @datadog/datadog-ci
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: csharp, cpp
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main
# Learn more about CodeQL language support at https://git.io/codeql-language-support
- name: Build dd-trace-dotnet
run: |
./tracer/build.sh BuildProfilerHome BuildNativeLoader
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
- name: filter-sarif cpp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/cpp.sarif
output: ../results/cpp.sarif
- name: filter-sarif csharp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/csharp.sarif
output: ../results/csharp.sarif
- name: Upload sarif file
run: |
datadog-ci sarif upload ../results/cpp.sarif --service dd-trace-dotnet
datadog-ci sarif upload ../results/csharp.sarif --service dd-trace-dotnet
env:
DD_API_KEY: '${{ secrets.DD_STAGING_API_KEY }}'
tracer:
name: Analyze Tracer
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@v2
- uses: actions/setup-dotnet@v1
with:
dotnet-version: '8.0.100'
- name: Download datadog-ci
run: |
npm install -g @datadog/datadog-ci
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: csharp, cpp
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# queries: ./path/to/local/query, your-org/your-repo/queries@main
# Learn more about CodeQL language support at https://git.io/codeql-language-support
- name: Build dd-trace-dotnet
run: |
./tracer/build.sh BuildTracerHome
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
- name: filter-sarif cpp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/cpp.sarif
output: ../results/cpp.sarif
- name: filter-sarif csharp
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/src/Demos/**
-**/test/test-applications/**
-**/test/samples/**
-**/Web.config
-**/obj/**
input: ../results/csharp.sarif
output: ../results/csharp.sarif
- name: Upload sarif file
run: |
datadog-ci sarif upload ../results/cpp.sarif --service dd-trace-dotnet
datadog-ci sarif upload ../results/csharp.sarif --service dd-trace-dotnet
env:
DD_API_KEY: '${{ secrets.DD_STAGING_API_KEY }}'