New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow setting tags for sarif uploads #129
Comments
|
Hi @pmatos Can you provide more details on this scenario? I'm not sure I get what you're hoping to accomplish. Thanks! |
Sure - apologies if I was too terse. I am discussing We run the LLVM static analyzer |
|
Also, I recall that this is relevant not only for different compilation modes but also different architectures. So, in arm32 you might get one set of vulnerabilities and in arm64 another set. The same tool |
This should replace the toolname in sarif files to workaround the lack of tags when uploading them. See here for a request to add that: github/codeql-action#129
|
I have added a workaround - which hope it works - to trick the system into splitting the vulnerabilities. Instead of splitting by tag (which is what makes sense) I split by toolname. That's what racket/racket@e62b3b8 is about. |
|
@pmatos Thanks for clarifying (and sorry for the delay). It sounds like this is the same pattern we're using the |
) This should replace the toolname in sarif files to workaround the lack of tags when uploading them. See here for a request to add that: github/codeql-action#129
|
Sorry - I know this is an old convo :) but the closest thing to what seems like a general case - "one tool, many artifacts" - sarif problem :) Is using |
|
@turbo or @AlonaHlobina could you have a look at this? |
|
It sounds like what you want is to you want is to specify a custom category for each configuration. This will allow you to run multiple analyses over the same code when it is built for different platforms and using different configurations. |


It would be useful at time of upload to be able to either tag sarif upload of override the tool name.
Software artifacts that can be build differently from the same sources (for example cross-builds) could use a way to differentiate between vulnerabilities in different artifacts.
The text was updated successfully, but these errors were encountered: