• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1#!/bin/sh
2
3set -e
4
5# Environment check
6printf "\033[33;1mNote: COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN are available on Project Settings page on scan.coverity.com\033[0m\n"
7[ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exit 1
8#[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must be set" && exit 1
9[ -z "$COVERITY_SCAN_BRANCH_PATTERN" ] && echo "ERROR: COVERITY_SCAN_BRANCH_PATTERN must be set" && exit 1
10[ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && exit 1
11[ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1
12
13PLATFORM=$(uname)
14TOOL_ARCHIVE=/tmp/cov-analysis-${PLATFORM}.tgz
15TOOL_URL=https://scan.coverity.com/download/cxx/${PLATFORM}
16TOOL_BASE=/tmp/coverity-scan-analysis
17UPLOAD_URL="https://scan.coverity.com/builds"
18SCAN_URL="https://scan.coverity.com"
19
20# Verify Coverity Scan run condition
21COVERITY_SCAN_RUN_CONDITION=${coverity_scan_run_condition:-true}
22printf "\033[33;1mTesting '%s' condition... " "$COVERITY_SCAN_RUN_CONDITION"
23if eval [ "$COVERITY_SCAN_RUN_CONDITION" ]; then
24  printf "True.\033[0m\n"
25else
26  printf "False. Exit.\033[0m\n"
27  exit 0
28fi
29
30# Do not run on pull requests
31if [ "${TRAVIS_PULL_REQUEST}" = "true" ]; then
32  printf "\033[33;1mINFO: Skipping Coverity Analysis: branch is a pull request.\033[0m\n"
33  exit 0
34fi
35
36# Verify this branch should run
37IS_COVERITY_SCAN_BRANCH=$(ruby -e "puts '${TRAVIS_BRANCH}' =~ /\\A$COVERITY_SCAN_BRANCH_PATTERN\\z/ ? 1 : 0")
38if [ "$IS_COVERITY_SCAN_BRANCH" = "1" ]; then
39  printf "\033[33;1mCoverity Scan configured to run on branch %s\033[0m\n" "$TRAVIS_BRANCH"
40else
41  printf "\033[33;1mCoverity Scan NOT configured to run on branch %s\033[0m\n" "$TRAVIS_BRANCH"
42  exit 1
43fi
44
45# Verify upload is permitted
46AUTH_RES=$(curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN" $SCAN_URL/api/upload_permitted)
47if [ "$AUTH_RES" = "Access denied" ]; then
48  printf "\033[33;1mCoverity Scan API access denied. Check COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN.\033[0m\n"
49  exit 1
50else
51  AUTH=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['upload_permitted']")
52  if [ "$AUTH" = "true" ]; then
53    printf "\033[33;1mCoverity Scan analysis authorized per quota.\033[0m\n"
54  else
55    WHEN=$(echo "$AUTH_RES" | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next_upload_permitted_at']")
56    printf "\033[33;1mCoverity Scan analysis NOT authorized until %s.\033[0m\n" "$WHEN"
57    exit 0
58  fi
59fi
60
61if [ ! -d $TOOL_BASE ]; then
62  # Download Coverity Scan Analysis Tool
63  if [ ! -e "$TOOL_ARCHIVE" ]; then
64    printf "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m\n"
65    wget -nv -O "$TOOL_ARCHIVE" "$TOOL_URL" --post-data "project=$COVERITY_SCAN_PROJECT_NAME&token=$COVERITY_SCAN_TOKEN"
66  fi
67
68  # Extract Coverity Scan Analysis Tool
69  printf "\033[33;1mExtracting Coverity Scan Analysis Tool...\033[0m\n"
70  mkdir -p $TOOL_BASE
71  tar xzf "$TOOL_ARCHIVE" -C "$TOOL_BASE"
72fi
73
74TOOL_DIR=$(find $TOOL_BASE -type d -name 'cov-analysis*')
75export PATH=$TOOL_DIR/bin:$PATH
76
77# Build
78printf "\033[33;1mRunning Coverity Scan Analysis Tool...\033[0m\n"
79COV_BUILD_OPTIONS=""
80#COV_BUILD_OPTIONS="--return-emit-failures 8 --parse-error-threshold 85"
81RESULTS_DIR="cov-int"
82eval "${COVERITY_SCAN_BUILD_COMMAND_PREPEND}"
83# Do not quote COV_BUILD_OPTIONS so it collapses when it is empty and expands
84# when it is not.
85COVERITY_UNSUPPORTED=1 cov-build --dir "$RESULTS_DIR" $COV_BUILD_OPTIONS "$COVERITY_SCAN_BUILD_COMMAND"
86cov-import-scm --dir $RESULTS_DIR --scm git --log $RESULTS_DIR/scm_log.txt 2>&1
87
88# Upload results
89printf "\033[33;1mTarring Coverity Scan Analysis results...\033[0m\n"
90RESULTS_ARCHIVE=analysis-results.tgz
91tar czf $RESULTS_ARCHIVE $RESULTS_DIR
92SHA=$(git rev-parse --short HEAD)
93VERSION_SHA=$(cat VERSION)#$SHA
94
95# Verify Coverity Scan script test mode
96if [ "${coverity_scan_script_test_mode:-false}" = true ]; then
97  printf "\033[33;1mCoverity Scan configured in script test mode. Exit.\033[0m\n"
98  exit 0
99fi
100
101printf "\033[33;1mUploading Coverity Scan Analysis results...\033[0m\n"
102response=$(curl \
103  --silent --write-out "\n%{http_code}\n" \
104  --form project="$COVERITY_SCAN_PROJECT_NAME" \
105  --form token="$COVERITY_SCAN_TOKEN" \
106  --form email=blackhole@blackhole.io \
107  --form file=@$RESULTS_ARCHIVE \
108  --form version="$SHA" \
109  --form description="$VERSION_SHA" \
110  $UPLOAD_URL)
111status_code=$(echo "$response" | sed -n '$p')
112if [ "$status_code" != "200" ] && [ "$status_code" != "201" ]; then
113  TEXT=$(echo "$response" | sed '$d')
114  printf "\033[33;1mCoverity Scan upload failed with HTTP status code '%s': %s.\033[0m\n" "$status_code" "$TEXT"
115  exit 1
116fi
117