mirror of
https://github.com/github/codeql-action.git
synced 2025-12-06 07:48:17 +08:00
Using the feature flag mechanism for checking if uploads are enabled was too clunky. I'm moving the change to checking versions directly.
234 lines
11 KiB
JavaScript
Generated
234 lines
11 KiB
JavaScript
Generated
"use strict";
|
|
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
|
|
if (k2 === undefined) k2 = k;
|
|
var desc = Object.getOwnPropertyDescriptor(m, k);
|
|
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
|
|
desc = { enumerable: true, get: function() { return m[k]; } };
|
|
}
|
|
Object.defineProperty(o, k2, desc);
|
|
}) : (function(o, m, k, k2) {
|
|
if (k2 === undefined) k2 = k;
|
|
o[k2] = m[k];
|
|
}));
|
|
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
|
|
Object.defineProperty(o, "default", { enumerable: true, value: v });
|
|
}) : function(o, v) {
|
|
o["default"] = v;
|
|
});
|
|
var __importStar = (this && this.__importStar) || (function () {
|
|
var ownKeys = function(o) {
|
|
ownKeys = Object.getOwnPropertyNames || function (o) {
|
|
var ar = [];
|
|
for (var k in o) if (Object.prototype.hasOwnProperty.call(o, k)) ar[ar.length] = k;
|
|
return ar;
|
|
};
|
|
return ownKeys(o);
|
|
};
|
|
return function (mod) {
|
|
if (mod && mod.__esModule) return mod;
|
|
var result = {};
|
|
if (mod != null) for (var k = ownKeys(mod), i = 0; i < k.length; i++) if (k[i] !== "default") __createBinding(result, mod, k[i]);
|
|
__setModuleDefault(result, mod);
|
|
return result;
|
|
};
|
|
})();
|
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
exports.tryUploadSarifIfRunFailed = tryUploadSarifIfRunFailed;
|
|
exports.run = run;
|
|
exports.getFinalJobStatus = getFinalJobStatus;
|
|
const fs = __importStar(require("fs"));
|
|
const core = __importStar(require("@actions/core"));
|
|
const github = __importStar(require("@actions/github"));
|
|
const actionsUtil = __importStar(require("./actions-util"));
|
|
const api_client_1 = require("./api-client");
|
|
const codeql_1 = require("./codeql");
|
|
const environment_1 = require("./environment");
|
|
const feature_flags_1 = require("./feature-flags");
|
|
const repository_1 = require("./repository");
|
|
const status_report_1 = require("./status-report");
|
|
const uploadLib = __importStar(require("./upload-lib"));
|
|
const util_1 = require("./util");
|
|
const workflow_1 = require("./workflow");
|
|
function createFailedUploadFailedSarifResult(error) {
|
|
const wrappedError = (0, util_1.wrapError)(error);
|
|
return {
|
|
upload_failed_run_error: wrappedError.message,
|
|
upload_failed_run_stack_trace: wrappedError.stack,
|
|
};
|
|
}
|
|
/**
|
|
* Upload a failed SARIF file if we can verify that SARIF upload is enabled and determine the SARIF
|
|
* category for the workflow.
|
|
*/
|
|
async function maybeUploadFailedSarif(config, repositoryNwo, features, logger) {
|
|
if (!config.codeQLCmd) {
|
|
return { upload_failed_run_skipped_because: "CodeQL command not found" };
|
|
}
|
|
const workflow = await (0, workflow_1.getWorkflow)(logger);
|
|
const jobName = (0, util_1.getRequiredEnvParam)("GITHUB_JOB");
|
|
const matrix = (0, util_1.parseMatrixInput)(actionsUtil.getRequiredInput("matrix"));
|
|
const shouldUpload = (0, workflow_1.getUploadInputOrThrow)(workflow, jobName, matrix);
|
|
if (!["always", "failure-only"].includes(actionsUtil.getUploadValue(shouldUpload)) ||
|
|
(0, util_1.isInTestMode)()) {
|
|
return { upload_failed_run_skipped_because: "SARIF upload is disabled" };
|
|
}
|
|
const category = (0, workflow_1.getCategoryInputOrThrow)(workflow, jobName, matrix);
|
|
const checkoutPath = (0, workflow_1.getCheckoutPathInputOrThrow)(workflow, jobName, matrix);
|
|
const databasePath = config.dbLocation;
|
|
const codeql = await (0, codeql_1.getCodeQL)(config.codeQLCmd);
|
|
const sarifFile = "../codeql-failed-run.sarif";
|
|
// If there is no database or the feature flag is off, we run 'export diagnostics'
|
|
if (databasePath === undefined ||
|
|
!(await features.getValue(feature_flags_1.Feature.ExportDiagnosticsEnabled, codeql))) {
|
|
await codeql.diagnosticsExport(sarifFile, category, config);
|
|
}
|
|
else {
|
|
// We call 'database export-diagnostics' to find any per-database diagnostics.
|
|
await codeql.databaseExportDiagnostics(databasePath, sarifFile, category);
|
|
}
|
|
logger.info(`Uploading failed SARIF file ${sarifFile}`);
|
|
const uploadResult = await uploadLib.uploadFiles(sarifFile, checkoutPath, category, features, logger);
|
|
await uploadLib.waitForProcessing(repositoryNwo, uploadResult.sarifID, logger, { isUnsuccessfulExecution: true });
|
|
return uploadResult
|
|
? { ...uploadResult.statusReport, sarifID: uploadResult.sarifID }
|
|
: {};
|
|
}
|
|
async function tryUploadSarifIfRunFailed(config, repositoryNwo, features, logger) {
|
|
if (process.env[environment_1.EnvVar.ANALYZE_DID_COMPLETE_SUCCESSFULLY] !== "true") {
|
|
// If analyze didn't complete successfully and the job status hasn't
|
|
// already been set to Failure/ConfigurationError previously, this
|
|
// means that something along the way failed in a step that is not
|
|
// owned by the Action, for example a manual build step. We
|
|
// consider this a configuration error.
|
|
core.exportVariable(environment_1.EnvVar.JOB_STATUS, process.env[environment_1.EnvVar.JOB_STATUS] ?? status_report_1.JobStatus.ConfigErrorStatus);
|
|
try {
|
|
return await maybeUploadFailedSarif(config, repositoryNwo, features, logger);
|
|
}
|
|
catch (e) {
|
|
logger.debug(`Failed to upload a SARIF file for this failed CodeQL code scanning run. ${e}`);
|
|
return createFailedUploadFailedSarifResult(e);
|
|
}
|
|
}
|
|
else {
|
|
core.exportVariable(environment_1.EnvVar.JOB_STATUS, process.env[environment_1.EnvVar.JOB_STATUS] ?? status_report_1.JobStatus.SuccessStatus);
|
|
return {
|
|
upload_failed_run_skipped_because: "Analyze Action completed successfully",
|
|
};
|
|
}
|
|
}
|
|
async function run(uploadAllAvailableDebugArtifacts, printDebugLogs, config, repositoryNwo, features, logger) {
|
|
const uploadFailedSarifResult = await tryUploadSarifIfRunFailed(config, repositoryNwo, features, logger);
|
|
if (uploadFailedSarifResult.upload_failed_run_skipped_because) {
|
|
logger.debug("Won't upload a failed SARIF file for this CodeQL code scanning run because: " +
|
|
`${uploadFailedSarifResult.upload_failed_run_skipped_because}.`);
|
|
}
|
|
// Throw an error if in integration tests, we expected to upload a SARIF file for a failed run
|
|
// but we didn't upload anything.
|
|
if (process.env["CODEQL_ACTION_EXPECT_UPLOAD_FAILED_SARIF"] === "true" &&
|
|
!uploadFailedSarifResult.raw_upload_size_bytes) {
|
|
const error = JSON.stringify(uploadFailedSarifResult);
|
|
throw new Error("Expected to upload a failed SARIF file for this CodeQL code scanning run, " +
|
|
`but the result was instead ${error}.`);
|
|
}
|
|
if (process.env["CODEQL_ACTION_EXPECT_UPLOAD_FAILED_SARIF"] === "true") {
|
|
if (!github.context.payload.pull_request?.head.repo.fork) {
|
|
await removeUploadedSarif(uploadFailedSarifResult, logger);
|
|
}
|
|
else {
|
|
logger.info("Skipping deletion of failed SARIF because the workflow was triggered from a fork of " +
|
|
"codeql-action and doesn't have the appropriate permissions for deletion.");
|
|
}
|
|
}
|
|
// Upload appropriate Actions artifacts for debugging
|
|
if (config.debugMode) {
|
|
logger.info("Debug mode is on. Uploading available database bundles and logs as Actions debugging artifacts...");
|
|
const codeql = await (0, codeql_1.getCodeQL)(config.codeQLCmd);
|
|
const version = await codeql.getVersion();
|
|
await uploadAllAvailableDebugArtifacts(config, logger, version.version);
|
|
await printDebugLogs(config);
|
|
}
|
|
if (actionsUtil.isSelfHostedRunner()) {
|
|
try {
|
|
fs.rmSync(config.dbLocation, {
|
|
recursive: true,
|
|
force: true,
|
|
maxRetries: 3,
|
|
});
|
|
logger.info(`Cleaned up database cluster directory ${config.dbLocation}.`);
|
|
}
|
|
catch (e) {
|
|
logger.warning(`Failed to clean up database cluster directory ${config.dbLocation}. Details: ${e}`);
|
|
}
|
|
}
|
|
else {
|
|
logger.debug("Skipping cleanup of database cluster directory since we are running on a GitHub-hosted " +
|
|
"runner which will be automatically cleaned up.");
|
|
}
|
|
return uploadFailedSarifResult;
|
|
}
|
|
async function removeUploadedSarif(uploadFailedSarifResult, logger) {
|
|
const sarifID = uploadFailedSarifResult.sarifID;
|
|
if (sarifID) {
|
|
logger.startGroup("Deleting failed SARIF upload");
|
|
logger.info(`In test mode, therefore deleting the failed analysis to avoid impacting tool status for the Action repository. SARIF ID to delete: ${sarifID}.`);
|
|
const client = (0, api_client_1.getApiClient)();
|
|
try {
|
|
const repositoryNwo = (0, repository_1.parseRepositoryNwo)((0, util_1.getRequiredEnvParam)("GITHUB_REPOSITORY"));
|
|
// Wait to make sure the analysis is ready for download before requesting it.
|
|
await (0, util_1.delay)(5000);
|
|
// Get the analysis associated with the uploaded sarif
|
|
const analysisInfo = await client.request("GET /repos/:owner/:repo/code-scanning/analyses?sarif_id=:sarif_id", {
|
|
owner: repositoryNwo.owner,
|
|
repo: repositoryNwo.repo,
|
|
sarif_id: sarifID,
|
|
});
|
|
// Delete the analysis.
|
|
if (analysisInfo.data.length === 1) {
|
|
const analysis = analysisInfo.data[0];
|
|
logger.info(`Analysis ID to delete: ${analysis.id}.`);
|
|
try {
|
|
await client.request("DELETE /repos/:owner/:repo/code-scanning/analyses/:analysis_id?confirm_delete", {
|
|
owner: repositoryNwo.owner,
|
|
repo: repositoryNwo.repo,
|
|
analysis_id: analysis.id,
|
|
});
|
|
logger.info(`Analysis deleted.`);
|
|
}
|
|
catch (e) {
|
|
const origMessage = (0, util_1.getErrorMessage)(e);
|
|
const newMessage = origMessage.includes("No analysis found for analysis ID")
|
|
? `Analysis ${analysis.id} does not exist. It was likely already deleted.`
|
|
: origMessage;
|
|
throw new Error(newMessage);
|
|
}
|
|
}
|
|
else {
|
|
throw new Error(`Expected to find exactly one analysis with sarif_id ${sarifID}. Found ${analysisInfo.data.length}.`);
|
|
}
|
|
}
|
|
catch (e) {
|
|
throw new Error(`Failed to delete uploaded SARIF analysis. Reason: ${(0, util_1.getErrorMessage)(e)}`);
|
|
}
|
|
finally {
|
|
logger.endGroup();
|
|
}
|
|
}
|
|
else {
|
|
logger.warning("Could not delete the uploaded SARIF analysis because a SARIF ID wasn't provided by the API when uploading the SARIF file.");
|
|
}
|
|
}
|
|
/**
|
|
* Returns the final job status sent in the `init-post` Action, based on the
|
|
* current value of the JOB_STATUS environment variable. If the variable is
|
|
* unset, or if its value is not one of the JobStatus enum values, returns
|
|
* Unknown. Otherwise it returns the status set in the environment variable.
|
|
*/
|
|
function getFinalJobStatus() {
|
|
const jobStatusFromEnvironment = process.env[environment_1.EnvVar.JOB_STATUS];
|
|
if (!jobStatusFromEnvironment ||
|
|
!Object.values(status_report_1.JobStatus).includes(jobStatusFromEnvironment)) {
|
|
return status_report_1.JobStatus.UnknownStatus;
|
|
}
|
|
return jobStatusFromEnvironment;
|
|
}
|
|
//# sourceMappingURL=init-action-post-helper.js.map
|