Authenticate when downloading CodeQL Bundle from GHES API #1083
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Warning: This file is generated automatically, and should not be modified. | |
# Instead, please modify the template in the pr-checks directory and run: | |
# (cd pr-checks; pip install ruamel.yaml@0.17.31 && python3 sync.py) | |
# to regenerate this file. | |
name: PR Check - Config export | |
env: | |
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
GO111MODULE: auto | |
CODEQL_EXTRACTOR_JAVA_AGENT_DISABLE_KOTLIN: 'true' | |
on: | |
push: | |
branches: | |
- main | |
- releases/v2 | |
pull_request: | |
types: | |
- opened | |
- synchronize | |
- reopened | |
- ready_for_review | |
workflow_dispatch: {} | |
jobs: | |
config-export: | |
strategy: | |
matrix: | |
include: | |
- os: ubuntu-latest | |
version: latest | |
- os: macos-latest | |
version: latest | |
- os: windows-latest | |
version: latest | |
- os: ubuntu-latest | |
version: nightly-latest | |
- os: macos-latest | |
version: nightly-latest | |
- os: windows-latest | |
version: nightly-latest | |
name: Config export | |
permissions: | |
contents: read | |
security-events: write | |
timeout-minutes: 45 | |
runs-on: ${{ matrix.os }} | |
steps: | |
- name: Check out repository | |
uses: actions/checkout@v4 | |
- name: Prepare test | |
id: prepare-test | |
uses: ./.github/actions/prepare-test | |
with: | |
version: ${{ matrix.version }} | |
use-all-platform-bundle: 'false' | |
- name: Set environment variable for Swift enablement | |
if: >- | |
runner.os != 'Windows' && ( | |
matrix.version == '20220908' || | |
matrix.version == '20221211' | |
) | |
shell: bash | |
run: echo "CODEQL_ENABLE_EXPERIMENTAL_FEATURES_SWIFT=true" >> $GITHUB_ENV | |
- uses: ./../action/init | |
with: | |
languages: javascript | |
queries: security-extended | |
tools: ${{ steps.prepare-test.outputs.tools-url }} | |
- uses: ./../action/analyze | |
with: | |
output: ${{ runner.temp }}/results | |
upload-database: false | |
- name: Upload SARIF | |
uses: actions/upload-artifact@v3 | |
with: | |
name: config-export-${{ matrix.os }}-${{ matrix.version }}.sarif.json | |
path: ${{ runner.temp }}/results/javascript.sarif | |
retention-days: 7 | |
- name: Check config properties appear in SARIF | |
uses: actions/github-script@v6 | |
env: | |
SARIF_PATH: ${{ runner.temp }}/results/javascript.sarif | |
with: | |
script: | | |
const fs = require('fs'); | |
const sarif = JSON.parse(fs.readFileSync(process.env['SARIF_PATH'], 'utf8')); | |
const run = sarif.runs[0]; | |
const configSummary = run.properties.codeqlConfigSummary; | |
if (configSummary === undefined) { | |
core.setFailed('`codeqlConfigSummary` property not found in the SARIF run property bag.'); | |
} | |
if (configSummary.disableDefaultQueries !== false) { | |
core.setFailed('`disableDefaultQueries` property incorrect: expected false, got ' + | |
`${JSON.stringify(configSummary.disableDefaultQueries)}.`); | |
} | |
const expectedQueries = [{ type: 'builtinSuite', uses: 'security-extended' }]; | |
// Use JSON.stringify to deep-equal the arrays. | |
if (JSON.stringify(configSummary.queries) !== JSON.stringify(expectedQueries)) { | |
core.setFailed(`\`queries\` property incorrect: expected ${JSON.stringify(expectedQueries)}, got ` + | |
`${JSON.stringify(configSummary.queries)}.`); | |
} | |
core.info('Finished config export tests.'); | |
env: | |
CODEQL_PASS_CONFIG_TO_CLI: true | |
CODEQL_ACTION_TEST_MODE: true |