Skip to content

Issue #1792: Use the new pr_fsio_realpath() function implemented in… #440

Issue #1792: Use the new pr_fsio_realpath() function implemented in…

Issue #1792: Use the new pr_fsio_realpath() function implemented in… #440

Workflow file for this run

name: CodeQL
on:
push:
branches:
- master
paths-ignore:
- NEWS
- RELEASE_NOTES
- '**/*.html'
- '**/*.md'
pull_request:
branches:
- master
paths-ignore:
- NEWS
- RELEASE_NOTES
- '**/*.html'
- '**/*.md'
schedule:
- cron: "34 15 * * 4"
jobs:
analyze:
name: CodeQL Analysis
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language:
- cpp
steps:
- name: Checkout source code
uses: actions/checkout@v3
- name: Install Packages
run: |
sudo apt-get update
sudo apt-get install --yes gettext libattr1-dev libcap-dev libgeoip-dev libhiredis-dev libldap2-dev libmemcached-dev libmysqlclient-dev libpam-dev libpcre3-dev libpq-dev libsasl2-dev libsqlite3-dev libssl-dev libsodium-dev libwrap0-dev ncurses-dev unixodbc-dev zlib1g-dev
- name: Configure
run: ./configure LIBS="-lodbc" --enable-ctrls --enable-facl --enable-memcache --enable-nls --enable-pcre --enable-redis --with-modules=mod_sql:mod_sql_mysql:mod_sql_odbc:mod_sql_postgres:mod_sql_sqlite:mod_sql_passwd:mod_sftp:mod_sftp_sql:mod_sftp_pam:mod_tls:mod_tls_fscache:mod_tls_shmcache:mod_tls_memcache:mod_tls_redis:mod_ban:mod_copy:mod_ctrls_admin:mod_deflate:mod_dnsbl:mod_dynmasq:mod_exec:mod_facl:mod_geoip:mod_ifversion:mod_ldap:mod_load:mod_log_forensic:mod_qos:mod_quotatab:mod_quotatab_file:mod_quotatab_ldap:mod_quotatab_radius:mod_quotatab_sql:mod_radius:mod_readme:mod_rewrite:mod_shaper:mod_site_misc:mod_snmp:mod_wrap:mod_wrap2:mod_wrap2_file:mod_wrap2_redis:mod_wrap2_sql:mod_digest:mod_auth_otp:mod_statcache:mod_unique_id:mod_ifsession
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
config-file: ./.codeql.yml
queries: +security-and-quality
- name: Autobuild
uses: github/codeql-action/autobuild@v2
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{ matrix.language }}"
upload: false
output: sarif-results
- name: Filter CodeQL SARIF
uses: advanced-security/filter-sarif@v1
with:
# filter out "3rd party" files
patterns: |
-**/lib/ccan-*.c
-**/lib/getopt*
-**/lib/glibc-*.c
-**/lib/hanson-*.c
-**/lib/libltdl/
-**/lib/openbsd-*.c
-**/lib/pr_fnmatch*.c
input: "sarif-results/${{ matrix.language }}.sarif"
output: "sarif-results/${{ matrix.language }}.sarif"
- name: Upload CodeQL SARIF
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: "sarif-results/${{ matrix.language }}.sarif"