mirror of
https://github.com/github/codeql-action.git
synced 2025-12-26 17:20:10 +08:00
4.4.2 introduces a breaking change that the variable in a catch clause is now `unknown` type. So, we need to cast the `e`, `err`, or `error` variables to type `Error`.
712 lines
23 KiB
TypeScript
712 lines
23 KiB
TypeScript
import * as fs from "fs";
|
|
import * as path from "path";
|
|
|
|
import * as core from "@actions/core";
|
|
import * as toolrunner from "@actions/exec/lib/toolrunner";
|
|
import * as safeWhich from "@chrisgavin/safe-which";
|
|
import * as yaml from "js-yaml";
|
|
|
|
import * as api from "./api-client";
|
|
import * as sharedEnv from "./shared-environment";
|
|
import { getRequiredEnvParam, GITHUB_DOTCOM_URL, isHTTPError } from "./util";
|
|
|
|
/**
|
|
* The utils in this module are meant to be run inside of the action only.
|
|
* Code paths from the runner should not enter this module.
|
|
*/
|
|
|
|
/**
|
|
* Wrapper around core.getInput for inputs that always have a value.
|
|
* Also see getOptionalInput.
|
|
*
|
|
* This allows us to get stronger type checking of required/optional inputs
|
|
* and make behaviour more consistent between actions and the runner.
|
|
*/
|
|
export function getRequiredInput(name: string): string {
|
|
return core.getInput(name, { required: true });
|
|
}
|
|
|
|
/**
|
|
* Wrapper around core.getInput that converts empty inputs to undefined.
|
|
* Also see getRequiredInput.
|
|
*
|
|
* This allows us to get stronger type checking of required/optional inputs
|
|
* and make behaviour more consistent between actions and the runner.
|
|
*/
|
|
export function getOptionalInput(name: string): string | undefined {
|
|
const value = core.getInput(name);
|
|
return value.length > 0 ? value : undefined;
|
|
}
|
|
|
|
export function getTemporaryDirectory(): string {
|
|
const value = process.env["CODEQL_ACTION_TEMP"];
|
|
return value !== undefined && value !== ""
|
|
? value
|
|
: getRequiredEnvParam("RUNNER_TEMP");
|
|
}
|
|
|
|
export function getToolCacheDirectory(): string {
|
|
const value = process.env["CODEQL_ACTION_TOOL_CACHE"];
|
|
return value !== undefined && value !== ""
|
|
? value
|
|
: getRequiredEnvParam("RUNNER_TOOL_CACHE");
|
|
}
|
|
|
|
/**
|
|
* Gets the SHA of the commit that is currently checked out.
|
|
*/
|
|
export const getCommitOid = async function (ref = "HEAD"): Promise<string> {
|
|
// Try to use git to get the current commit SHA. If that fails then
|
|
// log but otherwise silently fall back to using the SHA from the environment.
|
|
// The only time these two values will differ is during analysis of a PR when
|
|
// the workflow has changed the current commit to the head commit instead of
|
|
// the merge commit, which must mean that git is available.
|
|
// Even if this does go wrong, it's not a huge problem for the alerts to
|
|
// reported on the merge commit.
|
|
try {
|
|
let commitOid = "";
|
|
await new toolrunner.ToolRunner(
|
|
await safeWhich.safeWhich("git"),
|
|
["rev-parse", ref],
|
|
{
|
|
silent: true,
|
|
listeners: {
|
|
stdout: (data) => {
|
|
commitOid += data.toString();
|
|
},
|
|
stderr: (data) => {
|
|
process.stderr.write(data);
|
|
},
|
|
},
|
|
}
|
|
).exec();
|
|
return commitOid.trim();
|
|
} catch (e) {
|
|
core.info(
|
|
`Failed to call git to get current commit. Continuing with data from environment: ${e}`
|
|
);
|
|
return getRequiredEnvParam("GITHUB_SHA");
|
|
}
|
|
};
|
|
|
|
interface WorkflowJobStep {
|
|
run: any;
|
|
}
|
|
|
|
interface WorkflowJob {
|
|
steps?: WorkflowJobStep[];
|
|
}
|
|
|
|
interface WorkflowTrigger {
|
|
branches?: string[] | string;
|
|
paths?: string[];
|
|
}
|
|
|
|
// on: {} then push/pull_request are undefined
|
|
// on:
|
|
// push:
|
|
// pull_request:
|
|
// then push/pull_request are null
|
|
interface WorkflowTriggers {
|
|
push?: WorkflowTrigger | null;
|
|
pull_request?: WorkflowTrigger | null;
|
|
}
|
|
|
|
interface Workflow {
|
|
jobs?: { [key: string]: WorkflowJob };
|
|
on?: string | string[] | WorkflowTriggers;
|
|
}
|
|
|
|
function isObject(o: unknown): o is object {
|
|
return o !== null && typeof o === "object";
|
|
}
|
|
|
|
const GLOB_PATTERN = new RegExp("(\\*\\*?)");
|
|
|
|
function escapeRegExp(string) {
|
|
return string.replace(/[.*+?^${}()|[\]\\]/g, "\\$&"); // $& means the whole matched string
|
|
}
|
|
|
|
function patternToRegExp(value) {
|
|
return new RegExp(
|
|
`^${value
|
|
.toString()
|
|
.split(GLOB_PATTERN)
|
|
.reduce(function (arr, cur) {
|
|
if (cur === "**") {
|
|
arr.push(".*?");
|
|
} else if (cur === "*") {
|
|
arr.push("[^/]*?");
|
|
} else if (cur) {
|
|
arr.push(escapeRegExp(cur));
|
|
}
|
|
return arr;
|
|
}, [])
|
|
.join("")}$`
|
|
);
|
|
}
|
|
|
|
// this function should return true if patternA is a superset of patternB
|
|
// e.g: * is a superset of main-* but main-* is not a superset of *.
|
|
export function patternIsSuperset(patternA: string, patternB: string): boolean {
|
|
return patternToRegExp(patternA).test(patternB);
|
|
}
|
|
|
|
function branchesToArray(branches?: string | null | string[]): string[] | "**" {
|
|
if (typeof branches === "string") {
|
|
return [branches];
|
|
}
|
|
if (Array.isArray(branches)) {
|
|
if (branches.length === 0) {
|
|
return "**";
|
|
}
|
|
return branches;
|
|
}
|
|
return "**";
|
|
}
|
|
export interface CodedError {
|
|
message: string;
|
|
code: string;
|
|
}
|
|
|
|
function toCodedErrors<T>(errors: T): Record<keyof T, CodedError> {
|
|
return Object.entries(errors).reduce((acc, [key, value]) => {
|
|
acc[key] = { message: value, code: key };
|
|
return acc;
|
|
}, {} as Record<keyof T, CodedError>);
|
|
}
|
|
|
|
// code to send back via status report
|
|
// message to add as a warning annotation to the run
|
|
export const WorkflowErrors = toCodedErrors({
|
|
MismatchedBranches: `Please make sure that every branch in on.pull_request is also in on.push so that Code Scanning can compare pull requests against the state of the base branch.`,
|
|
MissingPushHook: `Please specify an on.push hook so that Code Scanning can compare pull requests against the state of the base branch.`,
|
|
PathsSpecified: `Using on.push.paths can prevent Code Scanning annotating new alerts in your pull requests.`,
|
|
PathsIgnoreSpecified: `Using on.push.paths-ignore can prevent Code Scanning annotating new alerts in your pull requests.`,
|
|
CheckoutWrongHead: `git checkout HEAD^2 is no longer necessary. Please remove this step as Code Scanning recommends analyzing the merge commit for best results.`,
|
|
});
|
|
|
|
export function getWorkflowErrors(doc: Workflow): CodedError[] {
|
|
const errors: CodedError[] = [];
|
|
|
|
const jobName = process.env.GITHUB_JOB;
|
|
|
|
if (jobName) {
|
|
const job = doc?.jobs?.[jobName];
|
|
|
|
const steps = job?.steps;
|
|
|
|
if (Array.isArray(steps)) {
|
|
for (const step of steps) {
|
|
// this was advice that we used to give in the README
|
|
// we actually want to run the analysis on the merge commit
|
|
// to produce results that are more inline with expectations
|
|
// (i.e: this is what will happen if you merge this PR)
|
|
// and avoid some race conditions
|
|
if (step?.run === "git checkout HEAD^2") {
|
|
errors.push(WorkflowErrors.CheckoutWrongHead);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
let missingPush = false;
|
|
|
|
if (doc.on === undefined) {
|
|
// this is not a valid config
|
|
} else if (typeof doc.on === "string") {
|
|
if (doc.on === "pull_request") {
|
|
missingPush = true;
|
|
}
|
|
} else if (Array.isArray(doc.on)) {
|
|
const hasPush = doc.on.includes("push");
|
|
const hasPullRequest = doc.on.includes("pull_request");
|
|
if (hasPullRequest && !hasPush) {
|
|
missingPush = true;
|
|
}
|
|
} else if (isObject(doc.on)) {
|
|
const hasPush = Object.prototype.hasOwnProperty.call(doc.on, "push");
|
|
const hasPullRequest = Object.prototype.hasOwnProperty.call(
|
|
doc.on,
|
|
"pull_request"
|
|
);
|
|
|
|
if (!hasPush && hasPullRequest) {
|
|
missingPush = true;
|
|
}
|
|
if (hasPush && hasPullRequest) {
|
|
const paths = doc.on.push?.paths;
|
|
// if you specify paths or paths-ignore you can end up with commits that have no baseline
|
|
// if they didn't change any files
|
|
// currently we cannot go back through the history and find the most recent baseline
|
|
if (Array.isArray(paths) && paths.length > 0) {
|
|
errors.push(WorkflowErrors.PathsSpecified);
|
|
}
|
|
const pathsIgnore = doc.on.push?.["paths-ignore"];
|
|
if (Array.isArray(pathsIgnore) && pathsIgnore.length > 0) {
|
|
errors.push(WorkflowErrors.PathsIgnoreSpecified);
|
|
}
|
|
}
|
|
|
|
// if doc.on.pull_request is null that means 'all branches'
|
|
// if doc.on.pull_request is undefined that means 'off'
|
|
// we only want to check for mismatched branches if pull_request is on.
|
|
if (doc.on.pull_request !== undefined) {
|
|
const push = branchesToArray(doc.on.push?.branches);
|
|
|
|
if (push !== "**") {
|
|
const pull_request = branchesToArray(doc.on.pull_request?.branches);
|
|
|
|
if (pull_request !== "**") {
|
|
const difference = pull_request.filter(
|
|
(value) => !push.some((o) => patternIsSuperset(o, value))
|
|
);
|
|
if (difference.length > 0) {
|
|
// there are branches in pull_request that may not have a baseline
|
|
// because we are not building them on push
|
|
errors.push(WorkflowErrors.MismatchedBranches);
|
|
}
|
|
} else if (push.length > 0) {
|
|
// push is set up to run on a subset of branches
|
|
// and you could open a PR against a branch with no baseline
|
|
errors.push(WorkflowErrors.MismatchedBranches);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (missingPush) {
|
|
errors.push(WorkflowErrors.MissingPushHook);
|
|
}
|
|
|
|
return errors;
|
|
}
|
|
|
|
export async function validateWorkflow(): Promise<undefined | string> {
|
|
let workflow: Workflow;
|
|
try {
|
|
workflow = await getWorkflow();
|
|
} catch (e) {
|
|
return `error: getWorkflow() failed: ${String(e)}`;
|
|
}
|
|
let workflowErrors: CodedError[];
|
|
try {
|
|
workflowErrors = getWorkflowErrors(workflow);
|
|
} catch (e) {
|
|
return `error: getWorkflowErrors() failed: ${String(e)}`;
|
|
}
|
|
|
|
if (workflowErrors.length > 0) {
|
|
let message: string;
|
|
try {
|
|
message = formatWorkflowErrors(workflowErrors);
|
|
} catch (e) {
|
|
return `error: formatWorkflowErrors() failed: ${String(e)}`;
|
|
}
|
|
core.warning(message);
|
|
}
|
|
|
|
return formatWorkflowCause(workflowErrors);
|
|
}
|
|
|
|
export function formatWorkflowErrors(errors: CodedError[]): string {
|
|
const issuesWere = errors.length === 1 ? "issue was" : "issues were";
|
|
|
|
const errorsList = errors.map((e) => e.message).join(" ");
|
|
|
|
return `${errors.length} ${issuesWere} detected with this workflow: ${errorsList}`;
|
|
}
|
|
|
|
export function formatWorkflowCause(errors: CodedError[]): undefined | string {
|
|
if (errors.length === 0) {
|
|
return undefined;
|
|
}
|
|
return errors.map((e) => e.code).join(",");
|
|
}
|
|
|
|
export async function getWorkflow(): Promise<Workflow> {
|
|
const relativePath = await getWorkflowPath();
|
|
const absolutePath = path.join(
|
|
getRequiredEnvParam("GITHUB_WORKSPACE"),
|
|
relativePath
|
|
);
|
|
|
|
return yaml.load(fs.readFileSync(absolutePath, "utf-8"));
|
|
}
|
|
|
|
/**
|
|
* Get the path of the currently executing workflow.
|
|
*/
|
|
async function getWorkflowPath(): Promise<string> {
|
|
const repo_nwo = getRequiredEnvParam("GITHUB_REPOSITORY").split("/");
|
|
const owner = repo_nwo[0];
|
|
const repo = repo_nwo[1];
|
|
const run_id = Number(getRequiredEnvParam("GITHUB_RUN_ID"));
|
|
|
|
const apiClient = api.getActionsApiClient();
|
|
const runsResponse = await apiClient.request(
|
|
"GET /repos/:owner/:repo/actions/runs/:run_id",
|
|
{
|
|
owner,
|
|
repo,
|
|
run_id,
|
|
}
|
|
);
|
|
const workflowUrl = runsResponse.data.workflow_url;
|
|
|
|
const workflowResponse = await apiClient.request(`GET ${workflowUrl}`);
|
|
|
|
return workflowResponse.data.path;
|
|
}
|
|
|
|
/**
|
|
* Get the workflow run ID.
|
|
*/
|
|
export function getWorkflowRunID(): number {
|
|
const workflowRunID = parseInt(getRequiredEnvParam("GITHUB_RUN_ID"), 10);
|
|
if (Number.isNaN(workflowRunID)) {
|
|
throw new Error("GITHUB_RUN_ID must define a non NaN workflow run ID");
|
|
}
|
|
return workflowRunID;
|
|
}
|
|
|
|
/**
|
|
* Get the analysis key parameter for the current job.
|
|
*
|
|
* This will combine the workflow path and current job name.
|
|
* Computing this the first time requires making requests to
|
|
* the github API, but after that the result will be cached.
|
|
*/
|
|
export async function getAnalysisKey(): Promise<string> {
|
|
const analysisKeyEnvVar = "CODEQL_ACTION_ANALYSIS_KEY";
|
|
|
|
let analysisKey = process.env[analysisKeyEnvVar];
|
|
if (analysisKey !== undefined) {
|
|
return analysisKey;
|
|
}
|
|
|
|
const workflowPath = await getWorkflowPath();
|
|
const jobName = getRequiredEnvParam("GITHUB_JOB");
|
|
|
|
analysisKey = `${workflowPath}:${jobName}`;
|
|
core.exportVariable(analysisKeyEnvVar, analysisKey);
|
|
return analysisKey;
|
|
}
|
|
|
|
export async function getAutomationID(): Promise<string> {
|
|
const analysis_key = await getAnalysisKey();
|
|
const environment = getRequiredInput("matrix");
|
|
|
|
return computeAutomationID(analysis_key, environment);
|
|
}
|
|
|
|
export function computeAutomationID(
|
|
analysis_key: string,
|
|
environment: string | undefined
|
|
): string {
|
|
let automationID = `${analysis_key}/`;
|
|
|
|
// the id has to be deterministic so we sort the fields
|
|
if (environment !== undefined && environment !== "null") {
|
|
const environmentObject = JSON.parse(environment);
|
|
for (const entry of Object.entries(environmentObject).sort()) {
|
|
if (typeof entry[1] === "string") {
|
|
automationID += `${entry[0]}:${entry[1]}/`;
|
|
} else {
|
|
// In code scanning we just handle the string values,
|
|
// the rest get converted to the empty string
|
|
automationID += `${entry[0]}:/`;
|
|
}
|
|
}
|
|
}
|
|
|
|
return automationID;
|
|
}
|
|
|
|
/**
|
|
* Get the ref currently being analyzed.
|
|
*/
|
|
export async function getRef(): Promise<string> {
|
|
// Will be in the form "refs/heads/master" on a push event
|
|
// or in the form "refs/pull/N/merge" on a pull_request event
|
|
const ref = getRequiredEnvParam("GITHUB_REF");
|
|
const sha = getRequiredEnvParam("GITHUB_SHA");
|
|
|
|
// For pull request refs we want to detect whether the workflow
|
|
// has run `git checkout HEAD^2` to analyze the 'head' ref rather
|
|
// than the 'merge' ref. If so, we want to convert the ref that
|
|
// we report back.
|
|
const pull_ref_regex = /refs\/pull\/(\d+)\/merge/;
|
|
if (!pull_ref_regex.test(ref)) {
|
|
return ref;
|
|
}
|
|
|
|
const head = await getCommitOid("HEAD");
|
|
|
|
// in actions/checkout@v2 we can check if git rev-parse HEAD == GITHUB_SHA
|
|
// in actions/checkout@v1 this may not be true as it checks out the repository
|
|
// using GITHUB_REF. There is a subtle race condition where
|
|
// git rev-parse GITHUB_REF != GITHUB_SHA, so we must check
|
|
// git git-parse GITHUB_REF == git rev-parse HEAD instead.
|
|
const hasChangedRef =
|
|
sha !== head &&
|
|
(await getCommitOid(ref.replace(/^refs\/pull\//, "refs/remotes/pull/"))) !==
|
|
head;
|
|
|
|
if (hasChangedRef) {
|
|
const newRef = ref.replace(pull_ref_regex, "refs/pull/$1/head");
|
|
core.debug(
|
|
`No longer on merge commit, rewriting ref from ${ref} to ${newRef}.`
|
|
);
|
|
return newRef;
|
|
} else {
|
|
return ref;
|
|
}
|
|
}
|
|
|
|
type ActionName = "init" | "autobuild" | "finish" | "upload-sarif";
|
|
type ActionStatus = "starting" | "aborted" | "success" | "failure";
|
|
|
|
export interface StatusReportBase {
|
|
// ID of the workflow run containing the action run
|
|
workflow_run_id: number;
|
|
// Workflow name. Converted to analysis_name further down the pipeline.
|
|
workflow_name: string;
|
|
// Job name from the workflow
|
|
job_name: string;
|
|
// Analysis key, normally composed from the workflow path and job name
|
|
analysis_key: string;
|
|
// Value of the matrix for this instantiation of the job
|
|
matrix_vars?: string;
|
|
// Commit oid that the workflow was triggered on
|
|
commit_oid: string;
|
|
// Ref that the workflow was triggered on
|
|
ref: string;
|
|
// Name of the action being executed
|
|
action_name: ActionName;
|
|
// Version of the action being executed, as a ref
|
|
action_ref?: string;
|
|
// Version of the action being executed, as a commit oid
|
|
action_oid: string;
|
|
// Time the first action started. Normally the init action
|
|
started_at: string;
|
|
// Time this action started
|
|
action_started_at: string;
|
|
// Time this action completed, or undefined if not yet completed
|
|
completed_at?: string;
|
|
// State this action is currently in
|
|
status: ActionStatus;
|
|
// Cause of the failure (or undefined if status is not failure)
|
|
cause?: string;
|
|
// Stack trace of the failure (or undefined if status is not failure)
|
|
exception?: string;
|
|
}
|
|
|
|
/**
|
|
* Compose a StatusReport.
|
|
*
|
|
* @param actionName The name of the action, e.g. 'init', 'finish', 'upload-sarif'
|
|
* @param status The status. Must be 'success', 'failure', or 'starting'
|
|
* @param startedAt The time this action started executing.
|
|
* @param cause Cause of failure (only supply if status is 'failure')
|
|
* @param exception Exception (only supply if status is 'failure')
|
|
*/
|
|
export async function createStatusReportBase(
|
|
actionName: ActionName,
|
|
status: ActionStatus,
|
|
actionStartedAt: Date,
|
|
cause?: string,
|
|
exception?: string
|
|
): Promise<StatusReportBase> {
|
|
const commitOid = process.env["GITHUB_SHA"] || "";
|
|
const ref = await getRef();
|
|
const workflowRunIDStr = process.env["GITHUB_RUN_ID"];
|
|
let workflowRunID = -1;
|
|
if (workflowRunIDStr) {
|
|
workflowRunID = parseInt(workflowRunIDStr, 10);
|
|
}
|
|
const workflowName = process.env["GITHUB_WORKFLOW"] || "";
|
|
const jobName = process.env["GITHUB_JOB"] || "";
|
|
const analysis_key = await getAnalysisKey();
|
|
let workflowStartedAt = process.env[sharedEnv.CODEQL_WORKFLOW_STARTED_AT];
|
|
if (workflowStartedAt === undefined) {
|
|
workflowStartedAt = actionStartedAt.toISOString();
|
|
core.exportVariable(
|
|
sharedEnv.CODEQL_WORKFLOW_STARTED_AT,
|
|
workflowStartedAt
|
|
);
|
|
}
|
|
// If running locally then the GITHUB_ACTION_REF cannot be trusted as it may be for the previous action
|
|
// See https://github.com/actions/runner/issues/803
|
|
const actionRef = isRunningLocalAction()
|
|
? undefined
|
|
: process.env["GITHUB_ACTION_REF"];
|
|
|
|
const statusReport: StatusReportBase = {
|
|
workflow_run_id: workflowRunID,
|
|
workflow_name: workflowName,
|
|
job_name: jobName,
|
|
analysis_key,
|
|
commit_oid: commitOid,
|
|
ref,
|
|
action_name: actionName,
|
|
action_ref: actionRef,
|
|
action_oid: "unknown", // TODO decide if it's possible to fill this in
|
|
started_at: workflowStartedAt,
|
|
action_started_at: actionStartedAt.toISOString(),
|
|
status,
|
|
};
|
|
|
|
// Add optional parameters
|
|
if (cause) {
|
|
statusReport.cause = cause;
|
|
}
|
|
if (exception) {
|
|
statusReport.exception = exception;
|
|
}
|
|
if (status === "success" || status === "failure" || status === "aborted") {
|
|
statusReport.completed_at = new Date().toISOString();
|
|
}
|
|
const matrix = getRequiredInput("matrix");
|
|
if (matrix) {
|
|
statusReport.matrix_vars = matrix;
|
|
}
|
|
|
|
return statusReport;
|
|
}
|
|
|
|
const GENERIC_403_MSG =
|
|
"The repo on which this action is running is not opted-in to CodeQL code scanning.";
|
|
const GENERIC_404_MSG =
|
|
"Not authorized to used the CodeQL code scanning feature on this repo.";
|
|
const OUT_OF_DATE_MSG =
|
|
"CodeQL Action is out-of-date. Please upgrade to the latest version of codeql-action.";
|
|
const INCOMPATIBLE_MSG =
|
|
"CodeQL Action version is incompatible with the code scanning endpoint. Please update to a compatible version of codeql-action.";
|
|
|
|
/**
|
|
* Send a status report to the code_scanning/analysis/status endpoint.
|
|
*
|
|
* Optionally checks the response from the API endpoint and sets the action
|
|
* as failed if the status report failed. This is only expected to be used
|
|
* when sending a 'starting' report.
|
|
*
|
|
* Returns whether sending the status report was successful of not.
|
|
*/
|
|
export async function sendStatusReport<S extends StatusReportBase>(
|
|
statusReport: S
|
|
): Promise<boolean> {
|
|
const statusReportJSON = JSON.stringify(statusReport);
|
|
core.debug(`Sending status report: ${statusReportJSON}`);
|
|
|
|
const nwo = getRequiredEnvParam("GITHUB_REPOSITORY");
|
|
const [owner, repo] = nwo.split("/");
|
|
const client = api.getActionsApiClient();
|
|
|
|
try {
|
|
await client.request(
|
|
"PUT /repos/:owner/:repo/code-scanning/analysis/status",
|
|
{
|
|
owner,
|
|
repo,
|
|
data: statusReportJSON,
|
|
}
|
|
);
|
|
|
|
return true;
|
|
} catch (e) {
|
|
console.log(e);
|
|
if (isHTTPError(e)) {
|
|
switch (e.status) {
|
|
case 403:
|
|
if (workflowIsTriggeredByPushEvent() && isDependabotActor()) {
|
|
core.setFailed(
|
|
'Workflows triggered by Dependabot on the "push" event run with read-only access. ' +
|
|
"Uploading Code Scanning results requires write access. " +
|
|
'To use Code Scanning with Dependabot, please ensure you are using the "pull_request" event for this workflow and avoid triggering on the "push" event for Dependabot branches. ' +
|
|
"See https://docs.github.com/en/code-security/secure-coding/configuring-code-scanning#scanning-on-push for more information on how to configure these events."
|
|
);
|
|
} else {
|
|
core.setFailed(e.message || GENERIC_403_MSG);
|
|
}
|
|
return false;
|
|
case 404:
|
|
core.setFailed(GENERIC_404_MSG);
|
|
return false;
|
|
case 422:
|
|
// schema incompatibility when reporting status
|
|
// this means that this action version is no longer compatible with the API
|
|
// we still want to continue as it is likely the analysis endpoint will work
|
|
if (getRequiredEnvParam("GITHUB_SERVER_URL") !== GITHUB_DOTCOM_URL) {
|
|
core.debug(INCOMPATIBLE_MSG);
|
|
} else {
|
|
core.debug(OUT_OF_DATE_MSG);
|
|
}
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// something else has gone wrong and the request/response will be logged by octokit
|
|
// it's possible this is a transient error and we should continue scanning
|
|
core.error(
|
|
"An unexpected error occurred when sending code scanning status report."
|
|
);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
// Was the workflow run triggered by a `push` event, for example as opposed to a `pull_request` event.
|
|
function workflowIsTriggeredByPushEvent() {
|
|
return process.env["GITHUB_EVENT_NAME"] === "push";
|
|
}
|
|
|
|
// Is dependabot the actor that triggered the current workflow run.
|
|
function isDependabotActor() {
|
|
return process.env["GITHUB_ACTOR"] === "dependabot[bot]";
|
|
}
|
|
|
|
// Is the current action executing a local copy (i.e. we're running a workflow on the codeql-action repo itself)
|
|
// as opposed to running a remote action (i.e. when another repo references us)
|
|
export function isRunningLocalAction(): boolean {
|
|
const relativeScriptPath = getRelativeScriptPath();
|
|
return (
|
|
relativeScriptPath.startsWith("..") || path.isAbsolute(relativeScriptPath)
|
|
);
|
|
}
|
|
|
|
// Get the location where the action is running from.
|
|
// This can be used to get the actions name or tell if we're running a local action.
|
|
export function getRelativeScriptPath(): string {
|
|
const runnerTemp = getRequiredEnvParam("RUNNER_TEMP");
|
|
const actionsDirectory = path.join(path.dirname(runnerTemp), "_actions");
|
|
return path.relative(actionsDirectory, __filename);
|
|
}
|
|
|
|
// Reads the contents of GITHUB_EVENT_PATH as a JSON object
|
|
function getWorkflowEvent(): any {
|
|
const eventJsonFile = getRequiredEnvParam("GITHUB_EVENT_PATH");
|
|
try {
|
|
return JSON.parse(fs.readFileSync(eventJsonFile, "utf-8"));
|
|
} catch (e) {
|
|
throw new Error(
|
|
`Unable to read workflow event JSON from ${eventJsonFile}: ${e}`
|
|
);
|
|
}
|
|
}
|
|
|
|
// Is the version of the repository we are currently analyzing from the default branch,
|
|
// or alternatively from another branch or a pull request.
|
|
export async function isAnalyzingDefaultBranch(): Promise<boolean> {
|
|
// Get the current ref and trim and refs/heads/ prefix
|
|
let currentRef = await getRef();
|
|
currentRef = currentRef.startsWith("refs/heads/")
|
|
? currentRef.substr("refs/heads/".length)
|
|
: currentRef;
|
|
|
|
const event = getWorkflowEvent();
|
|
const defaultBranch = event?.repository?.default_branch;
|
|
|
|
return currentRef === defaultBranch;
|
|
}
|