Skip to content

Produce separate SARIF file for quality-queries alerts #2935

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 13 commits into
base: main
Choose a base branch
from

Conversation

mbg
Copy link
Member

@mbg mbg commented Jun 16, 2025

Follows on from #2917.

This PR modifies the action to produce separate SARIF files for code quality queries (as specified as arguments to the quality-queries input) and uploads them to the code quality API. The approach here is that:

  • We make an additional call to database interpret-results for queries that were specified as arguments to the quality-queries input (if any). This results in SARIF files for those queries.
  • We then upload them to the CQ API endpoint.

Notes

  • The changes aim to be as backwards-compatible as possible. That includes:
    • We don't (yet) modify the existing SARIF files that are uploaded to the code scanning API to exclude results for quality-queries alerts.
    • SARIF files are output to the same place as before (e.g. as opposed to having separate subdirectories for security and quality SARIFs)

Merge / deployment checklist

  • Confirm this change is backwards compatible with existing workflows.
  • Confirm the readme has been updated if necessary.
  • Confirm the changelog has been updated if necessary.

@mbg mbg force-pushed the mbg/interpret-cq-results branch 2 times, most recently from 87b6687 to fe76653 Compare June 17, 2025 13:37
@mbg mbg force-pushed the mbg/interpret-cq-results branch from 2bf7322 to 24e4f58 Compare June 23, 2025 17:35
@mbg mbg force-pushed the mbg/interpret-cq-results branch from 7e59f77 to f7fbaa0 Compare June 24, 2025 12:09
@mbg mbg marked this pull request as ready for review June 24, 2025 13:08
@mbg mbg requested a review from a team as a code owner June 24, 2025 13:08
@mbg mbg requested a review from Copilot June 24, 2025 13:09
Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR enables separate generation and upload of SARIF files for code-quality queries specified via the quality-queries input, in addition to the existing code-scanning SARIF flow.

  • Introduces SARIF_UPLOAD_TARGET enum and UploadTarget interface to distinguish code scanning vs. code quality uploads.
  • Extends file discovery (findSarifFilesInDir, getSarifFilePaths) and upload logic (uploadFiles, uploadPayload, validateUniqueCategory) to filter and handle .quality.sarif files.
  • Updates analyze.ts/analyze-action.ts to produce and upload quality SARIFs when quality-queries are provided, and adjusts CI workflows to upload/check both SARIF artifacts.

Reviewed Changes

Copilot reviewed 12 out of 17 changed files in this pull request and generated no comments.

Show a summary per file
File Description
src/upload-lib.ts Added enum and targets for separate SARIF uploads, filtering logic for .quality.sarif.
src/upload-lib.test.ts Added tests for filtering .quality.sarif files and validateUniqueCategory prefix.
src/analyze.ts Introduced default query suites and resolveQuerySuiteAlias; generate quality SARIF.
src/analyze.test.ts Added tests for resolveQuerySuiteAlias.
src/analyze-action.ts Uploads quality SARIF and sets quality-sarif-id output when quality-queries present.
pr-checks/checks/quality-queries.yml CI updates to upload security vs. quality SARIF artifacts and adjust checks.
Comments suppressed due to low confidence (2)

src/upload-lib.ts:427

  • The getSarifFilePaths function bypasses the isSarif filter when sarifPath is a single file. This can lead to uploading unwanted files (e.g., a .quality.sarif when targeting code-scanning). Apply isSarif to the single-file case or throw if it does not match.
    sarifFiles = [sarifPath];

pr-checks/checks/quality-queries.yml:29

  • [nitpick] The CI step now only checks config properties in the quality SARIF, omitting the original security SARIF check. Consider adding a separate check for ${{ runner.temp }}/results/javascript.sarif to ensure both artifacts are validated.
      SARIF_PATH: "${{ runner.temp }}/results/javascript.quality.sarif"

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy