Skip to content

feat: ✨ add stacktrace and system infomation collector #704

feat: ✨ add stacktrace and system infomation collector

feat: ✨ add stacktrace and system infomation collector #704

Workflow file for this run

name: "CodeQL"
on:
push:
paths:
- "src/**"
- "ui/**"
- "3rdpart/**"
- "CMakeLists.txt"
- "CMakePresets.json"
- "vcpkg*"
- ".github/workflows/codeql.yml"
branches:
- main
- dev
pull_request:
paths:
- "src/**"
- "ui/**"
- "3rdpart/**"
- "CMakeLists.txt"
- "CMakePresets.json"
- "vcpkg*"
- ".github/workflows/codeql.yml"
schedule:
- cron: '38 9 * * 6'
jobs:
analyze:
name: Analyze (${{ matrix.language }})
# Runner size impacts CodeQL analysis time. To learn more, please see:
# - https://gh.io/recommended-hardware-resources-for-running-codeql
# - https://gh.io/supported-runners-and-hardware-resources
# - https://gh.io/using-larger-runners (GitHub.com only)
# Consider using larger runners or machines with greater resources for possible analysis time improvements.
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-24.04' }}
timeout-minutes: ${{ (matrix.language == 'swift' && 120) || 360 }}
permissions:
# required for all workflows
security-events: write
# required to fetch internal or private CodeQL packs
packages: read
# only required for workflows in private repositories
actions: read
contents: read
strategy:
fail-fast: false
matrix:
include:
- language: c-cpp
build-mode: 'manual'
# CodeQL supports the following values keywords for 'language': 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
# Use `c-cpp` to analyze code written in C, C++ or both
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
steps:
- name: Checkout repository
uses: actions/checkout@v4
with:
submodules: recursive
- name: Set up GCC
uses: egor-tensin/setup-gcc@v1
with:
version: 14
platform: x64
- name: Setup libraries for building Slint
run: |
sudo apt-get update
sudo apt-get install -y libfontconfig-dev libfreetype-dev
- name: Install Qt
uses: jurplel/install-qt-action@v4
with:
version: 6.6.3
arch: gcc_64
cache-key-prefix: ${{ runner.os }}-qt
- name: Setup Rust toolchain
uses: moonrepo/setup-rust@v1
with:
channel: stable
cache: false
env:
GITHUB_TOKEN: ${{ github.token }}
- name: Cache corrosion
uses: actions/cache@v4
with:
path: |
${{ github.workspace }}/build/_deps
${{ github.workspace }}/build/*/cargo/build
!${{ github.workspace }}/build/*/cargo/build/**/incremental
${{ github.workspace }}/build/corrosion/**/target
!${{ github.workspace }}/build/corrosion/**/target/**/incremental
key: corrosion-linux-x64-${{ github.run_id }}
restore-keys: corrosion-linux-x64-
- name: Setup CMake
uses: lukka/get-cmake@latest
- name: Setup vcpkg
uses: lukka/run-vcpkg@v11
with:
vcpkgConfigurationJsonGlob: 'vcpkg-configuration.json'
vcpkgJsonGlob: 'vcpkg.json'
- name: Initialize CodeQL
uses: github/codeql-action/init@v3
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
- if: matrix.build-mode == 'manual'
name: Build with CMake
shell: pwsh
run: |
$additionalConfigureArgs = @()
$additionalConfigureArgs += "-DVCPKG_HOST_TRIPLET:STRING=x64-linux-release"
$additionalConfigureArgs += "-DVCPKG_TARGET_TRIPLET:STRING=x64-linux-release"
$additionalConfigureArgs += "-DSPEED_UP_DEBUG_BUILD=ON"
cmake --preset native @additionalConfigureArgs
cmake --build --preset native
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3
with:
category: "/language:${{matrix.language}}"
output: sarif-results
upload: failure-only
- name: Filter CodeQL Analysis Results
uses: advanced-security/filter-sarif@v1
with:
patterns: |
-**/*
+src/**/*
input: sarif-results/cpp.sarif
output: sarif-results/cpp.sarif
- name: Upload CodeQL Analysis Results
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: sarif-results/cpp.sarif
- name: Send message to feishu
if: ${{ failure() }}
uses: foxundermoon/feishu-action@v2
with:
url: ${{ secrets.WEBHOOK_URL }}
msg_type: post
content: |
post:
zh_cn:
title: sast-evento repo CodeQL analysis
content:
- - tag: text
text: "repository: ${{ github.repository }}"
- - tag: text
text: "committer: ${{ github.actor }}"
- - tag: text
text: 'compare: '
- tag: a
text: "${{ github.event.compare }}"
href: ${{ github.event.compare }}
- - tag: text
text: "job status: ${{ job.status }}"