Skip to content

Commit 4ae4c70

Browse files
committed
Merge branch 'js/ci-coverity'
GitHub CI workflow has learned to trigger Coverity check. * js/ci-coverity: coverity: detect and report when the token or project is incorrect coverity: allow running on macOS coverity: support building on Windows coverity: allow overriding the Coverity project coverity: cache the Coverity Build Tool ci: add a GitHub workflow to submit Coverity scans
2 parents c70e7a3 + 3349520 commit 4ae4c70

File tree

1 file changed

+163
-0
lines changed

1 file changed

+163
-0
lines changed

.github/workflows/coverity.yml

Lines changed: 163 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,163 @@
1+
name: Coverity
2+
3+
# This GitHub workflow automates submitting builds to Coverity Scan. To enable it,
4+
# set the repository variable `ENABLE_COVERITY_SCAN_FOR_BRANCHES` (for details, see
5+
# https://docs.github.com/en/actions/learn-github-actions/variables) to a JSON
6+
# string array containing the names of the branches for which the workflow should be
7+
# run, e.g. `["main", "next"]`.
8+
#
9+
# In addition, two repository secrets must be set (for details how to add secrets, see
10+
# https://docs.github.com/en/actions/security-guides/using-secrets-in-github-actions):
11+
# `COVERITY_SCAN_EMAIL` and `COVERITY_SCAN_TOKEN`. The former specifies the
12+
# email to which the Coverity reports should be sent and the latter can be
13+
# obtained from the Project Settings tab of the Coverity project).
14+
#
15+
# The workflow runs on `ubuntu-latest` by default. This can be overridden by setting
16+
# the repository variable `ENABLE_COVERITY_SCAN_ON_OS` to a JSON string array specifying
17+
# the operating systems, e.g. `["ubuntu-latest", "windows-latest"]`.
18+
#
19+
# By default, the builds are submitted to the Coverity project `git`. To override this,
20+
# set the repository variable `COVERITY_PROJECT`.
21+
22+
on:
23+
push:
24+
25+
defaults:
26+
run:
27+
shell: bash
28+
29+
jobs:
30+
coverity:
31+
if: contains(fromJSON(vars.ENABLE_COVERITY_SCAN_FOR_BRANCHES || '[""]'), github.ref_name)
32+
strategy:
33+
matrix:
34+
os: ${{ fromJSON(vars.ENABLE_COVERITY_SCAN_ON_OS || '["ubuntu-latest"]') }}
35+
runs-on: ${{ matrix.os }}
36+
env:
37+
COVERITY_PROJECT: ${{ vars.COVERITY_PROJECT || 'git' }}
38+
COVERITY_LANGUAGE: cxx
39+
COVERITY_PLATFORM: overridden-below
40+
steps:
41+
- uses: actions/checkout@v3
42+
- name: install minimal Git for Windows SDK
43+
if: contains(matrix.os, 'windows')
44+
uses: git-for-windows/setup-git-for-windows-sdk@v1
45+
- run: ci/install-dependencies.sh
46+
if: contains(matrix.os, 'ubuntu') || contains(matrix.os, 'macos')
47+
env:
48+
runs_on_pool: ${{ matrix.os }}
49+
50+
# The Coverity site says the tool is usually updated twice yearly, so the
51+
# MD5 of download can be used to determine whether there's been an update.
52+
- name: get the Coverity Build Tool hash
53+
id: lookup
54+
run: |
55+
case "${{ matrix.os }}" in
56+
*windows*)
57+
COVERITY_PLATFORM=win64
58+
COVERITY_TOOL_FILENAME=cov-analysis.zip
59+
MAKEFLAGS=-j$(nproc)
60+
;;
61+
*macos*)
62+
COVERITY_PLATFORM=macOSX
63+
COVERITY_TOOL_FILENAME=cov-analysis.dmg
64+
MAKEFLAGS=-j$(sysctl -n hw.physicalcpu)
65+
;;
66+
*ubuntu*)
67+
COVERITY_PLATFORM=linux64
68+
COVERITY_TOOL_FILENAME=cov-analysis.tgz
69+
MAKEFLAGS=-j$(nproc)
70+
;;
71+
*)
72+
echo '::error::unhandled OS ${{ matrix.os }}' >&2
73+
exit 1
74+
;;
75+
esac
76+
echo "COVERITY_PLATFORM=$COVERITY_PLATFORM" >>$GITHUB_ENV
77+
echo "COVERITY_TOOL_FILENAME=$COVERITY_TOOL_FILENAME" >>$GITHUB_ENV
78+
echo "MAKEFLAGS=$MAKEFLAGS" >>$GITHUB_ENV
79+
MD5=$(curl https://scan.coverity.com/download/$COVERITY_LANGUAGE/$COVERITY_PLATFORM \
80+
--fail \
81+
--form token='${{ secrets.COVERITY_SCAN_TOKEN }}' \
82+
--form project="$COVERITY_PROJECT" \
83+
--form md5=1)
84+
case $? in
85+
0) ;; # okay
86+
22) # 40x, i.e. access denied
87+
echo "::error::incorrect token or project?" >&2
88+
exit 1
89+
;;
90+
*) # other error
91+
echo "::error::Failed to retrieve MD5" >&2
92+
exit 1
93+
;;
94+
esac
95+
echo "hash=$MD5" >>$GITHUB_OUTPUT
96+
97+
# Try to cache the tool to avoid downloading 1GB+ on every run.
98+
# A cache miss will add ~30s to create, but a cache hit will save minutes.
99+
- name: restore the Coverity Build Tool
100+
id: cache
101+
uses: actions/cache/restore@v3
102+
with:
103+
path: ${{ runner.temp }}/cov-analysis
104+
key: cov-build-${{ env.COVERITY_LANGUAGE }}-${{ env.COVERITY_PLATFORM }}-${{ steps.lookup.outputs.hash }}
105+
- name: download the Coverity Build Tool (${{ env.COVERITY_LANGUAGE }} / ${{ env.COVERITY_PLATFORM}})
106+
if: steps.cache.outputs.cache-hit != 'true'
107+
run: |
108+
curl https://scan.coverity.com/download/$COVERITY_LANGUAGE/$COVERITY_PLATFORM \
109+
--fail --no-progress-meter \
110+
--output $RUNNER_TEMP/$COVERITY_TOOL_FILENAME \
111+
--form token='${{ secrets.COVERITY_SCAN_TOKEN }}' \
112+
--form project="$COVERITY_PROJECT"
113+
- name: extract the Coverity Build Tool
114+
if: steps.cache.outputs.cache-hit != 'true'
115+
run: |
116+
case "$COVERITY_TOOL_FILENAME" in
117+
*.tgz)
118+
mkdir $RUNNER_TEMP/cov-analysis &&
119+
tar -xzf $RUNNER_TEMP/$COVERITY_TOOL_FILENAME --strip 1 -C $RUNNER_TEMP/cov-analysis
120+
;;
121+
*.dmg)
122+
cd $RUNNER_TEMP &&
123+
attach="$(hdiutil attach $COVERITY_TOOL_FILENAME)" &&
124+
volume="$(echo "$attach" | cut -f 3 | grep /Volumes/)" &&
125+
mkdir cov-analysis &&
126+
cd cov-analysis &&
127+
sh "$volume"/cov-analysis-macosx-*.sh &&
128+
ls -l &&
129+
hdiutil detach "$volume"
130+
;;
131+
*.zip)
132+
cd $RUNNER_TEMP &&
133+
mkdir cov-analysis-tmp &&
134+
unzip -d cov-analysis-tmp $COVERITY_TOOL_FILENAME &&
135+
mv cov-analysis-tmp/* cov-analysis
136+
;;
137+
*)
138+
echo "::error::unhandled archive type: $COVERITY_TOOL_FILENAME" >&2
139+
exit 1
140+
;;
141+
esac
142+
- name: cache the Coverity Build Tool
143+
if: steps.cache.outputs.cache-hit != 'true'
144+
uses: actions/cache/save@v3
145+
with:
146+
path: ${{ runner.temp }}/cov-analysis
147+
key: cov-build-${{ env.COVERITY_LANGUAGE }}-${{ env.COVERITY_PLATFORM }}-${{ steps.lookup.outputs.hash }}
148+
- name: build with cov-build
149+
run: |
150+
export PATH="$RUNNER_TEMP/cov-analysis/bin:$PATH" &&
151+
cov-configure --gcc &&
152+
cov-build --dir cov-int make
153+
- name: package the build
154+
run: tar -czvf cov-int.tgz cov-int
155+
- name: submit the build to Coverity Scan
156+
run: |
157+
curl \
158+
--fail \
159+
--form token='${{ secrets.COVERITY_SCAN_TOKEN }}' \
160+
--form email='${{ secrets.COVERITY_SCAN_EMAIL }}' \
161+
162+
--form version='${{ github.sha }}' \
163+
"https://scan.coverity.com/builds?project=$COVERITY_PROJECT"

0 commit comments

Comments
 (0)