|
| 1 | +name: "ATM - Check query suite" |
| 2 | + |
| 3 | +env: |
| 4 | + QUERY_PACK: javascript/ql/experimental/adaptivethreatmodeling/src |
| 5 | + QUERY_SUITE: codeql-suites/javascript-atm-code-scanning.qls |
| 6 | + |
| 7 | +on: |
| 8 | + pull_request: |
| 9 | + paths: |
| 10 | + - ".github/workflows/atm-check-query-suite.yml" |
| 11 | + - "javascript/ql/experimental/adaptivethreatmodeling/**" |
| 12 | + workflow_dispatch: |
| 13 | + |
| 14 | +jobs: |
| 15 | + atm-check-query-suite: |
| 16 | + runs-on: ubuntu-latest |
| 17 | + |
| 18 | + steps: |
| 19 | + - uses: actions/checkout@v3 |
| 20 | + |
| 21 | + - name: Setup CodeQL |
| 22 | + uses: ./.github/actions/fetch-codeql |
| 23 | + with: |
| 24 | + channel: release |
| 25 | + |
| 26 | + - name: Install ATM model |
| 27 | + run: | |
| 28 | + set -exu |
| 29 | +
|
| 30 | + # Install dependencies of ATM query pack, i.e. the ATM model |
| 31 | + codeql pack install "${QUERY_PACK}" |
| 32 | +
|
| 33 | + # Retrieve model checksum |
| 34 | + model_checksum=$(codeql resolve extensions "${QUERY_PACK}/${QUERY_SUITE}" | jq -r '.models[0].checksum') |
| 35 | +
|
| 36 | + # Trust the model so that we can use it in the ATM boosted queries |
| 37 | + mkdir -p "$HOME/.config/codeql" |
| 38 | + echo "--insecurely-execute-ml-model-checksums ${model_checksum}" >> "$HOME/.config/codeql/config" |
| 39 | +
|
| 40 | + - name: Create test DB |
| 41 | + run: | |
| 42 | + DB_PATH="${RUNNER_TEMP}/db" |
| 43 | + echo "DB_PATH=${DB_PATH}" >> "${GITHUB_ENV}" |
| 44 | +
|
| 45 | + codeql database create "${DB_PATH}" --source-root config/atm --language javascript |
| 46 | +
|
| 47 | + - name: Run ATM query suite |
| 48 | + run: | |
| 49 | + SARIF_PATH="${RUNNER_TEMP}/sarif.json" |
| 50 | + echo "SARIF_PATH=${SARIF_PATH}" >> "${GITHUB_ENV}" |
| 51 | +
|
| 52 | + codeql database analyze \ |
| 53 | + --format sarif-latest \ |
| 54 | + --output "${SARIF_PATH}" \ |
| 55 | + --sarif-group-rules-by-pack \ |
| 56 | + -vv \ |
| 57 | + -- \ |
| 58 | + "${DB_PATH}" \ |
| 59 | + "${QUERY_PACK}/${QUERY_SUITE}" |
| 60 | +
|
| 61 | + - name: Upload SARIF |
| 62 | + uses: actions/upload-artifact@v3 |
| 63 | + with: |
| 64 | + name: javascript-ml-powered-queries.sarif |
| 65 | + path: "${{ env.SARIF_PATH }}" |
| 66 | + retention-days: 5 |
| 67 | + |
| 68 | + - name: Check results |
| 69 | + run: | |
| 70 | + # We should run at least the ML-powered queries in `expected_rules`. |
| 71 | + expected_rules="js/ml-powered/nosql-injection js/ml-powered/path-injection js/ml-powered/sql-injection js/ml-powered/xss" |
| 72 | +
|
| 73 | + for rule in ${expected_rules}; do |
| 74 | + found_rule=$(jq --arg rule "${rule}" '[.runs[0].tool.extensions[].rules | select(. != null) | |
| 75 | + flatten | .[].id] | any(. == $rule)' "${SARIF_PATH}") |
| 76 | + if [[ "${found_rule}" != "true" ]]; then |
| 77 | + echo "Expected SARIF output to contain rule '${rule}', but found no such rule." |
| 78 | + exit 1 |
| 79 | + else |
| 80 | + echo "Found rule '${rule}'." |
| 81 | + fi |
| 82 | + done |
| 83 | +
|
| 84 | + # We should have at least one alert from an ML-powered query. |
| 85 | + num_alerts=$(jq '[.runs[0].results[] | |
| 86 | + select(.properties.score != null and (.rule.id | startswith("js/ml-powered/")))] | length' \ |
| 87 | + "${SARIF_PATH}") |
| 88 | + if [[ "${num_alerts}" -eq 0 ]]; then |
| 89 | + echo "Expected to find at least one alert from an ML-powered query but found ${num_alerts}." |
| 90 | + exit 1 |
| 91 | + else |
| 92 | + echo "Found ${num_alerts} alerts from ML-powered queries."; |
| 93 | + fi |
0 commit comments