blob: 51bd2733f9b9a460e9079bc535b83ae9906ef427 [file] [log] [blame]
#!/bin/bash
# Copyright 2019 Samsung Electronics Co., Ltd.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
set -Eeuxo pipefail
PS4='+['$(readlink -f "$0")' ${FUNCNAME[0]%main}#$LINENO] '
echo '---> maven-coverity.sh'
SUBMISSION_ATTEMPTS=5
SUBMISSION_INITIAL_REST_INTERVAL=30 # seconds, will be doubled after each attempt
#-----------------------------------------------------------------------------
# Process parameters for JS/TS/Python/Ruby/PHP files analysis
if [ -n "${SEARCH_PATHS:=}" ]; then
for SEARCH_PATH in ${SEARCH_PATHS}; do
if [ -d "${SEARCH_PATH}" ]; then
FS_CAPTURE_SEARCH_PARAMS="${FS_CAPTURE_SEARCH_PARAMS:=} --fs-capture-search '${SEARCH_PATH}'"
else
echo "'${SEARCH_PATH}' from \$SEARCH_PATHS is not an existing directory." >&2
exit 1
fi
done
for EXCLUDE_REGEX in ${SEARCH_EXCLUDE_REGEXS:=}; do
EXCLUDE_REGEX=${EXCLUDE_REGEX//\'/\'\\\'\'} # escape single quote "'"
FS_CAPTURE_SEARCH_PARAMS="${FS_CAPTURE_SEARCH_PARAMS} --fs-capture-search-exclude-regex '${EXCLUDE_REGEX}'"
# FIXME: a hack to deal with temporary(?) non-functional filter to ignore
# specific source code parts by Coverity Scan ("--fs-capture-search-exclude-regex"
# CLI parameter for "cov-build" tool). The hack can be removed when this CLI
# parameter is fixed on Coverity side.
FS_CAPTURE_SEARCH_EXCLUDE_HACK_PARAMS="${FS_CAPTURE_SEARCH_EXCLUDE_HACK_PARAMS:=} --tu-pattern 'file('\\''${EXCLUDE_REGEX}'\\'')'"
done
fi
#-----------------------------------------------------------------------------
# Check if we are allowed to submit results to Coverity Scan service
# and have not exceeded our upload quota limits
# See also: https://scan.coverity.com/faq#frequency
CURL_OUTPUT=$(
curl \
--verbose \
--silent \
--show-error \
--fail \
--form "project=${COVERITY_PROJECT_NAME}" \
--form "token=${COVERITY_TOKEN}" \
'https://scan.coverity.com/api/upload_permitted'
)
IS_COVERITY_UPLOAD_PERMITTED=$(
echo "${CURL_OUTPUT}" \
| jq '.upload_permitted'
)
if [ x"${IS_COVERITY_UPLOAD_PERMITTED}" != x'true' ]; then
echo "Upload quota reached. Next upload permitted at "$(echo "${CURL_OUTPUT}" | jq '.next_upload_permitted_at') >&2
exit 1
fi
#-----------------------------------------------------------------------------
# Get Coverity Scan build tool
curl \
--verbose \
--silent \
--show-error \
--fail \
--form "project=${COVERITY_PROJECT_NAME}" \
--form "token=${COVERITY_TOKEN}" \
--output 'coverity_tool.tgz' \
'https://scan.coverity.com/download/linux64'
curl \
--verbose \
--silent \
--show-error \
--fail \
--form "project=${COVERITY_PROJECT_NAME}" \
--form "token=${COVERITY_TOKEN}" \
--form 'md5=1' \
--output 'coverity_tool.md5' \
'https://scan.coverity.com/download/linux64'
echo -n ' coverity_tool.tgz' >> 'coverity_tool.md5'
md5sum --check 'coverity_tool.md5'
tar \
--extract \
--gunzip \
--file='coverity_tool.tgz'
COVERITY_BUILD_TOOL_DIRECTORY=$(
head -1 <( \
tar \
--list \
--gunzip \
--file='coverity_tool.tgz'
)
)
COVERITY_BINARY_DIRECTORY="${COVERITY_BUILD_TOOL_DIRECTORY}bin"
test -d "${COVERITY_BINARY_DIRECTORY}" \
|| exit 1
export PATH="${PATH}:${COVERITY_BINARY_DIRECTORY}"
rm 'coverity_tool.tgz'
#-----------------------------------------------------------------------------
# Build
export MAVEN_OPTS
eval cov-build \
--dir 'cov-int' \
--append-log \
${FS_CAPTURE_SEARCH_PARAMS:=} \
"${MVN}" clean install \
--errors \
--global-settings "${GLOBAL_SETTINGS_FILE}" \
--settings "${SETTINGS_FILE}" \
${MAVEN_OPTIONS:=} \
${MAVEN_PARAMS:=}
# FIXME: a hack to deal with temporary(?) non-functional filter to ignore
# specific source code parts by Coverity Scan ("--fs-capture-search-exclude-regex"
# CLI parameter for "cov-build" tool). The hack can be removed when this CLI
# parameter is fixed on Coverity side.
if [ -n "${FS_CAPTURE_SEARCH_EXCLUDE_HACK_PARAMS:=}" ]; then
eval cov-manage-emit \
--dir 'cov-int' \
${FS_CAPTURE_SEARCH_EXCLUDE_HACK_PARAMS} \
delete
fi
# Extract git data for analysed files
cov-import-scm \
--dir 'cov-int' \
--scm 'git'
# List all analysed files from the project
cov-manage-emit \
--dir cov-int \
list \
| grep \
--invert-match \
'^Translation unit:$' \
| sed \
's!^[[:digit:]]\+ -> !!' \
| sort \
> 'coverity-scan-analysed-files.log'
#-----------------------------------------------------------------------------
# Submit results to Coverity service
tar \
--create \
--gzip \
--file='results.tgz' \
'cov-int'
for (( ATTEMPT=1; ATTEMPT<=SUBMISSION_ATTEMPTS; ATTEMPT++ )); do
CURL_OUTPUT=$(
curl \
--verbose \
--silent \
--show-error \
--fail \
--write-out '\n%{http_code}' \
--form "project=${COVERITY_PROJECT_NAME}" \
--form "email=${COVERITY_USER_EMAIL}" \
--form "token=${COVERITY_TOKEN}" \
--form 'file=@results.tgz' \
--form "version=${GIT_COMMIT:0:7}" \
--form "description=${GIT_BRANCH}" \
'https://scan.coverity.com/builds'
)
HTTP_RESPONSE_CODE=$(echo -n "${CURL_OUTPUT}" | tail -1)
test x"${HTTP_RESPONSE_CODE}" = x"200" \
&& break
sleep "${SUBMISSION_REST_INTERVAL:-$SUBMISSION_INITIAL_REST_INTERVAL}"
SUBMISSION_REST_INTERVAL=$(( ${SUBMISSION_REST_INTERVAL:-$SUBMISSION_INITIAL_REST_INTERVAL} * 2 ))
done
HTTP_RESPONSE=$(echo -n "${CURL_OUTPUT}" | head -n -1 | tr -d '\n')
if [ x"${HTTP_RESPONSE}" != x"Build successfully submitted." ]; then
echo "Coverity Scan service responded with '${HTTP_RESPONSE}' while 'Build successfully submitted.' expected." >&2
exit 1
fi
#-----------------------------------------------------------------------------
exit 0