diff --git a/.github/workflows/tests.yml b/.github/workflows/tests.yml index 05ac0f6..ca090c9 100644 --- a/.github/workflows/tests.yml +++ b/.github/workflows/tests.yml @@ -7,352 +7,6 @@ on: types: [opened, synchronize, reopened] jobs: - create-install-dir-test: - name: create_install_path.sh script test - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v4 - with: - fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis - - - name: Existing - shell: bash - env: - INSTALL_PATH: '.sonar' - run: | - echo "- Create dir" - mkdir -p "${INSTALL_PATH}" - - echo "- Test script behavior" - ./scripts/create_install_path.sh > output - grep -v "::error::" output - - - name: Non-existing nested in current dir - shell: bash - env: - INSTALL_PATH: '.sonar' - run: | - ./scripts/create_install_path.sh > output - grep -v "::error::" output - test -d "${INSTALL_PATH}" - - - name: Nonexisting nested in home - shell: bash - env: - INSTALL_PATH: '~/third_party/.sonar' - run: | - ./scripts/create_install_path.sh > output - grep -v "::error::" output - test -d "${INSTALL_PATH}" - - - name: Empty install dir specified - shell: bash - env: - INSTALL_PATH: '' - run: | - (./scripts/create_install_path.sh || echo "=== Script failed ===") > output - grep "::error::Empty installation path specified" output - grep "=== Script failed ===" output - - - name: No permission to create directory - shell: bash - env: - INSTALL_PATH: '/non_creatable' - run: | - (./scripts/create_install_path.sh || echo "=== Script failed ===") > output - grep "::error::Failed to create non-existing installation path '/non_creatable'" output - grep "=== Script failed ===" output - - - name: Existing but not directory - shell: bash - env: - INSTALL_PATH: 'not_directory' - run: | - echo "- Create normal file" - echo "content" > "${INSTALL_PATH}" - - echo "- Test script behavior" - (./scripts/create_install_path.sh || echo "=== Script failed ===") > output - grep "::error::Installation path 'not_directory' is not a directory" output - grep "=== Script failed ===" output - - - - name: Existing but not readable - shell: bash - env: - INSTALL_PATH: 'not_readable' - run: | - echo "- Create dir and make it not readable" - mkdir -p "${INSTALL_PATH}" - chmod -r "${INSTALL_PATH}" - - echo "- Test script behavior" - (./scripts/create_install_path.sh || echo "=== Script failed ===") > output - grep "::error::Installation path 'not_readable' is not readable" output - grep "=== Script failed ===" output - - - name: Existing but not writeable - shell: bash - env: - INSTALL_PATH: 'not_writeable' - run: | - echo "- Create dir and make it not writeable" - mkdir -p "${INSTALL_PATH}" - chmod -w "${INSTALL_PATH}" - - echo "- Test script behavior" - (./scripts/create_install_path.sh || echo "=== Script failed ===") > output - grep "::error::Installation path 'not_writeable' is not writeable" output - grep "=== Script failed ===" output - - setup-script-test: - name: configure_paths.sh script test - runs-on: ubuntu-latest - env: - INSTALL_PATH: 'install-directory' - SONAR_HOST_URL: 'http://sonar-host.com' - SONAR_SCANNER_VERSION: 'vX.Y.Z.MMMM' - SONAR_SCANNER_URL_WINDOWS_X64: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-windows-x64.zip' - SONAR_SCANNER_SHA_WINDOWS_X64: 'DOWNLOAD-SHA-WINDOWS-X64' - SONAR_SCANNER_URL_LINUX_X64: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-linux-x64.zip' - SONAR_SCANNER_SHA_LINUX_X64: 'DOWNLOAD-SHA-LINUX-X64' - SONAR_SCANNER_URL_LINUX_AARCH64: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-linux-aarch64.zip' - SONAR_SCANNER_SHA_LINUX_AARCH64: 'DOWNLOAD-SHA-LINUX-AARCH64' - SONAR_SCANNER_URL_MACOSX_X64: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-macosx-x64.zip' - SONAR_SCANNER_SHA_MACOSX_X64: 'DOWNLOAD-SHA-MACOSX-X64' - SONAR_SCANNER_URL_MACOSX_AARCH64: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-macosx-aarch64.zip' - SONAR_SCANNER_SHA_MACOSX_AARCH64: 'DOWNLOAD-SHA-MACOSX-AARCH64' - steps: - - uses: actions/checkout@v4 - with: - fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis - - - name: Windows - shell: bash - env: - OS: 'Windows' - ARCH: 'X64' - run: | - ./scripts/configure_paths.sh > output - grep -v "::error::" output - - echo "- Check sonar-scanner:" - grep "sonar-scanner-url=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-windows-x64.zip" output - grep "sonar-scanner-sha=DOWNLOAD-SHA-WINDOWS-X64" output - grep "sonar-scanner-dir=install-directory/sonar-scanner-vX.Y.Z.MMMM-windows-x64" output - grep "sonar-scanner-bin=install-directory/sonar-scanner-vX.Y.Z.MMMM-windows-x64/bin/sonar-scanner.bat" output - - echo "- Check build-wrapper:" - grep "build-wrapper-url=http://sonar-host.com/static/cpp/build-wrapper-win-x86.zip" output - grep "build-wrapper-dir=install-directory/build-wrapper-win-x86" output - grep "build-wrapper-bin=install-directory/build-wrapper-win-x86/build-wrapper-win-x86-64.exe" output - - - name: Linux X64 - shell: bash - env: - OS: 'Linux' - ARCH: 'X64' - run: | - ./scripts/configure_paths.sh > output - grep -v "::error::" output - - echo "- Check sonar-scanner:" - grep "sonar-scanner-url=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-linux-x64.zip" output - grep "sonar-scanner-sha=DOWNLOAD-SHA-LINUX-X64" output - grep "sonar-scanner-dir=install-directory/sonar-scanner-vX.Y.Z.MMMM-linux-x64" output - grep "sonar-scanner-bin=install-directory/sonar-scanner-vX.Y.Z.MMMM-linux-x64/bin/sonar-scanner" output - - echo "- Check build-wrapper:" - grep "build-wrapper-url=http://sonar-host.com/static/cpp/build-wrapper-linux-x86.zip" output - grep "build-wrapper-dir=install-directory/build-wrapper-linux-x86" output - grep "build-wrapper-bin=install-directory/build-wrapper-linux-x86/build-wrapper-linux-x86-64" output - - - name: Linux ARM64 - shell: bash - env: - OS: 'Linux' - ARCH: 'ARM64' - run: | - ./scripts/configure_paths.sh > output - grep -v "::error::" output - echo "- Check sonar-scanner:" - grep "sonar-scanner-url=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-linux-aarch64.zip" output - grep "sonar-scanner-sha=DOWNLOAD-SHA-LINUX-AARCH64" output - grep "sonar-scanner-dir=install-directory/sonar-scanner-vX.Y.Z.MMMM-linux-aarch64" output - grep "sonar-scanner-bin=install-directory/sonar-scanner-vX.Y.Z.MMMM-linux-aarch64/bin/sonar-scanner" output - echo "- Check build-wrapper:" - grep "build-wrapper-url=http://sonar-host.com/static/cpp/build-wrapper-linux-aarch64.zip" output - grep "build-wrapper-dir=install-directory/build-wrapper-linux-aarch64" output - grep "build-wrapper-bin=install-directory/build-wrapper-linux-aarch64/build-wrapper-linux-aarch64" output - - - name: macOSX_X64 - shell: bash - env: - OS: 'macOS' - ARCH: 'X64' - run: | - ./scripts/configure_paths.sh > output - grep -v "::error::" output - - echo "- Check sonar-scanner:" - grep "sonar-scanner-url=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-macosx-x64.zip" output - grep "sonar-scanner-sha=DOWNLOAD-SHA-MACOSX-X64" output - grep "sonar-scanner-dir=install-directory/sonar-scanner-vX.Y.Z.MMMM-macosx-x64" output - grep "sonar-scanner-bin=install-directory/sonar-scanner-vX.Y.Z.MMMM-macosx-x64/bin/sonar-scanner" output - - echo "- Check build-wrapper:" - grep "build-wrapper-url=http://sonar-host.com/static/cpp/build-wrapper-macosx-x86.zip" output - grep "build-wrapper-dir=install-directory/build-wrapper-macosx-x86" output - grep "build-wrapper-bin=install-directory/build-wrapper-macosx-x86/build-wrapper-macosx-x86" output - - - name: macOSX_ARM64 - shell: bash - env: - OS: 'macOS' - ARCH: 'ARM64' - run: | - ./scripts/configure_paths.sh > output - grep -v "::error::" output - - echo "- Check sonar-scanner:" - grep "sonar-scanner-url=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-vX.Y.Z.MMMM-macosx-aarch64.zip" output - grep "sonar-scanner-sha=DOWNLOAD-SHA-MACOSX-AARCH64" output - grep "sonar-scanner-dir=install-directory/sonar-scanner-vX.Y.Z.MMMM-macosx-aarch64" output - grep "sonar-scanner-bin=install-directory/sonar-scanner-vX.Y.Z.MMMM-macosx-aarch64/bin/sonar-scanner" output - - echo "- Check build-wrapper:" - grep "build-wrapper-url=http://sonar-host.com/static/cpp/build-wrapper-macosx-x86.zip" output - grep "build-wrapper-dir=install-directory/build-wrapper-macosx-x86" output - grep "build-wrapper-bin=install-directory/build-wrapper-macosx-x86/build-wrapper-macosx-x86" output - - - name: Unssuported OS - shell: bash - env: - OS: 'unsupportedOS' - ARCH: 'X64' - run: | - (./scripts/configure_paths.sh || echo "=== Script failed ===") > output - - echo "- Check errors:" - grep "::error::Unsupported runner OS 'unsupportedOS'" output - grep "=== Script failed ===" output - - - name: Unssuported architecture - shell: bash - env: - OS: 'Linux' - ARCH: 'X86' - run: | - (./scripts/configure_paths.sh || echo "=== Script failed ===") > output - - echo "- Check errors:" - grep "::error::Architecture 'X86' is unsupported by build-wrapper" output - grep "=== Script failed ===" output - - - download-script-test: - name: download.sh script test - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v4 - with: - fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis - - - name: Download test without validation - shell: bash - env: - INSTALL_PATH: 'install-directory-no-sha-validation' - DOWNLOAD_URL: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-4.6.2.2472-linux.zip' - EXPECTED_SHA: 'incorrect-sha-not-validated' - TMP_ZIP_PATH: ${{ runner.temp }}/sonar-scanner.zip - run: | - ./scripts/download.sh > output - test -f "$TMP_ZIP_PATH" - grep -v "::error::" output - - name: Download test with validation - shell: bash - env: - INSTALL_PATH: 'install-directory-sha-validation' - DOWNLOAD_URL: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-4.6.2.2472-linux.zip' - EXPECTED_SHA: '9411331814c1d002bd65d37758b872918b7602e7cf3ca5b83a3e19a729b2be05' - TMP_ZIP_PATH: ${{ runner.temp }}/sonar-scanner.zip - run: | - ./scripts/download.sh -v > output - test -f "$TMP_ZIP_PATH" - grep -v "::error::" output - - name: Incorrect install dir - shell: bash - env: - INSTALL_PATH: '' - run: | - (./scripts/download.sh || echo "=== Script failed ===") > output - grep "::error::Failed to create" output - grep "=== Script failed ===" output - - name: Incorrect download url - shell: bash - env: - INSTALL_PATH: 'install-directory-incorrect-url' - DOWNLOAD_URL: 'incorrect-url' - run: | - (./scripts/download.sh || echo "=== Script failed ===") > output - grep "::error::Failed to download 'incorrect-url'" output - grep "=== Script failed ===" output - - name: Incorrect SHA256 - shell: bash - env: - INSTALL_PATH: 'install-directory-incorrect-sha' - DOWNLOAD_URL: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-4.6.2.2472-linux.zip' - EXPECTED_SHA: 'incorrect-sha256' - TMP_ZIP_PATH: ${{ runner.temp }}/sonar-scanner.zip - run: | - (./scripts/download.sh -v || echo "=== Script failed ===") > output - grep "::error::Checking sha256 failed" output - grep "=== Script failed ===" output - - name: Mismatching SHA256 - shell: bash - env: - INSTALL_PATH: 'install-directory-mismtaching-sha' - DOWNLOAD_URL: 'https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-4.6.2.2472-linux.zip' - EXPECTED_SHA: '3e121d85a4adb1f30b917d5f3eb897966b59e02c3d6d313a78dcd964193dc963' - TMP_ZIP_PATH: ${{ runner.temp }}/sonar-scanner.zip - run: | - (./scripts/download.sh -v || echo "=== Script failed ===") > output - grep "::error::Checking sha256 failed" output - grep "=== Script failed ===" output - - fetch-latest-version-test: - name: fetch_latest_version.sh script test - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v4 - with: - fetch-depth: 0 # Shallow clones should be disabled for a better relevancy of analysis - - name: Test script - shell: bash - run: | - ./scripts/fetch_latest_version.sh > output - - echo "- Check sonar-scanner version:" - grep "sonar-scanner-version=" output - SONAR_SCANNER_VERSION=$(cat output | cut -d= -f 2) - test ! -z "${SONAR_SCANNER_VERSION}" - - echo "- Check windows sonar-scanner URLs:" - grep "sonar-scanner-url-windows-x64=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${SONAR_SCANNER_VERSION}-windows-x64.zip" output - grep -e "^sonar-scanner-sha-windows-x64=[0-9A-Fa-f]\+$" output - - echo "- Check linux sonar-scanner URLs:" - grep "sonar-scanner-url-linux-x64=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${SONAR_SCANNER_VERSION}-linux-x64.zip" output - grep -e "^sonar-scanner-sha-linux-x64=[0-9A-Fa-f]\+$" output - grep "sonar-scanner-url-linux-aarch64=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${SONAR_SCANNER_VERSION}-linux-aarch64.zip" output - grep -e "^sonar-scanner-sha-linux-aarch64=[0-9A-Fa-f]\+$" output - - echo "- Check macosx sonar-scanner URLs:" - grep "sonar-scanner-url-linux-x64=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${SONAR_SCANNER_VERSION}-linux-x64.zip" output - grep -e "^sonar-scanner-sha-linux-x64=[0-9A-Fa-f]\+$" output - grep "sonar-scanner-url-linux-aarch64=https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${SONAR_SCANNER_VERSION}-linux-aarch64.zip" output - grep -e "^sonar-scanner-sha-linux-aarch64=[0-9A-Fa-f]\+$" output - output-test: name: Test action outputs strategy: diff --git a/.github/workflows/version_update.yml b/.github/workflows/version_update.yml deleted file mode 100644 index f028f3c..0000000 --- a/.github/workflows/version_update.yml +++ /dev/null @@ -1,51 +0,0 @@ -name: sonar-scanner version check -on: - workflow_dispatch: - schedule: - - cron: '15 10 * * *' - -jobs: - update-version: - name: Prepare pull request for sonar-scanner version update - runs-on: ubuntu-latest - steps: - - run: sudo apt install -y jq - - - uses: actions/checkout@v4 - with: - ref: master - persist-credentials: true - fetch-depth: 0 - - - name: "Fetch currently used sonar-scanner version" - id: tagged-version - shell: bash - run: cat sonar-scanner-version >> $GITHUB_OUTPUT - - - name: "Fetch lastest sonar-scanner version" - id: latest-version - shell: bash - run: | - ./scripts/fetch_latest_version.sh > sonar-scanner-version - cat sonar-scanner-version >> $GITHUB_OUTPUT - - - name: "Create Pull Request for version update" - if: steps.tagged-version.outputs.sonar-scanner-version != steps.latest-version.outputs.sonar-scanner-version - shell: bash - env: - UPDATE_BRANCH: update-to-sonar-scanner-${{ steps.latest-version.outputs.sonar-scanner-version }} - TITLE: "Update sonar-scanner-version to ${{ steps.latest-version.outputs.sonar-scanner-version }}" - GH_TOKEN: ${{ secrets.GITHUB_TOKEN }} - run: | - git config --global user.name "SonarTech" - git config --global user.email "sonartech@sonarsource.com" - git checkout -b ${UPDATE_BRANCH} - git add sonar-scanner-version - git commit -m "${TITLE}" - git push --force-with-lease origin ${UPDATE_BRANCH} - gh pr list - - if [[ $(gh pr list -H "${UPDATE_BRANCH}" | grep "${UPDATE_BRANCH}" | wc -l) -eq 0 ]]; then - gh pr create -B master -H ${UPDATE_BRANCH} --title "${TITLE}" --body "Automatic updated of sonar-scanner version value. Needs to be tagged for release." - fi - diff --git a/action.yml b/action.yml index e24d545..e0f2705 100644 --- a/action.yml +++ b/action.yml @@ -24,104 +24,23 @@ outputs: runs: using: "composite" steps: - # install packaged required for greadlink and sha256sum command on macOS - - name: Install required packages for macOS - if: runner.os == 'macOS' - shell: bash - run: brew install coreutils - - - name: Verify and create installation path - shell: bash - env: - INSTALL_PATH: ${{ inputs.installation-path }} - run: ${GITHUB_ACTION_PATH}/scripts/create_install_path.sh - - - name: Set version of sonar-scanner - id: sonar-scanner-version - shell: bash - run: cat ${GITHUB_ACTION_PATH}/sonar-scanner-version >> $GITHUB_OUTPUT - - - name: Configure paths - id: configure_paths - shell: bash - env: - OS: ${{ runner.os }} - ARCH: ${{ runner.arch }} - INSTALL_PATH: ${{ inputs.installation-path }} - SONAR_SCANNER_VERSION: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-version }} - SONAR_SCANNER_URL_WINDOWS_X64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-url-windows-x64 }} - SONAR_SCANNER_SHA_WINDOWS_X64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-sha-windows-x64 }} - SONAR_SCANNER_URL_LINUX_X64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-url-linux-x64 }} - SONAR_SCANNER_SHA_LINUX_X64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-sha-linux-x64 }} - SONAR_SCANNER_URL_LINUX_AARCH64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-url-linux-aarch64 }} - SONAR_SCANNER_SHA_LINUX_AARCH64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-sha-linux-aarch64 }} - SONAR_SCANNER_URL_MACOSX_X64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-url-macosx-x64 }} - SONAR_SCANNER_SHA_MACOSX_X64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-sha-macosx-x64 }} - SONAR_SCANNER_URL_MACOSX_AARCH64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-url-macosx-aarch64 }} - SONAR_SCANNER_SHA_MACOSX_AARCH64: ${{ steps.sonar-scanner-version.outputs.sonar-scanner-sha-macosx-aarch64 }} - run: ${GITHUB_ACTION_PATH}/scripts/configure_paths.sh >> $GITHUB_OUTPUT - - - name: Cache sonar-scanner installation - id: cache-sonar-tools - if: inputs.cache-binaries == 'true' - uses: actions/cache@v4 - env: - # The default value is 60mins. Reaching timeout is treated the same as a cache miss. - SEGMENT_DOWNLOAD_TIMEOUT_MINS: 1 + - name: SonarQube Scan + id: scan + uses: sonarsource/sonarqube-scan-action/deprecated-c-cpp-action@antonio/SQCPPGHA-9-rebranding-and-forward with: - key: sonar-scanner-${{ runner.os }}-${{ runner.arch }}-${{ steps.sonar-scanner-version.outputs.sonar-scanner-version }} - path: ${{ steps.configure_paths.outputs.sonar-scanner-dir }} - - - name: Download and install sonar-scanner - if: steps.cache-sonar-tools.outputs.cache-hit != 'true' - shell: bash - env: - DOWNLOAD_URL: ${{ steps.configure_paths.outputs.sonar-scanner-url }} - EXPECTED_SHA: ${{ steps.configure_paths.outputs.sonar-scanner-sha }} - INSTALL_PATH: ${{ inputs.installation-path }} - TMP_ZIP_PATH: ${{ runner.temp }}/sonar-scanner.zip - run: ${GITHUB_ACTION_PATH}/scripts/download.sh -v - - - name: Add the custom root certificate to java certificate store - shell: bash - run: ${GITHUB_ACTION_PATH}/scripts/cert.sh - - - name: Download and install build-wrapper - shell: bash - env: - DOWNLOAD_URL: ${{ steps.configure_paths.outputs.build-wrapper-url }} - INSTALL_PATH: ${{ inputs.installation-path }} - TMP_ZIP_PATH: ${{ runner.temp }}/build-wrapper.zip - run: ${GITHUB_ACTION_PATH}/scripts/download.sh - + installation-path: ${{ inputs.installation-path }} + cache-binaries: ${{ inputs.cache-binaries }} - name: Setup action outputs id: setup-outputs shell: bash env: - SONAR_SCANNER_DIR: ${{ steps.configure_paths.outputs.sonar-scanner-dir }} - SONAR_SCANNER_BIN: ${{ steps.configure_paths.outputs.sonar-scanner-bin }} - BUILD_WRAPPER_DIR: ${{ steps.configure_paths.outputs.build-wrapper-dir }} - BUILD_WRAPPER_BIN: ${{ steps.configure_paths.outputs.build-wrapper-bin }} + SONAR_SCANNER_BINARY: ${{ steps.scan.outputs.sonar-scanner-binary }} + BUILD_WRAPPER_BINARY: ${{ steps.scan.outputs.build-wrapper-binary }} run: | - source ${GITHUB_ACTION_PATH}/scripts/utils.sh - echo "::group::Action outputs" - echo "SONAR_HOST_URL=${SONAR_HOST_URL}" >> $GITHUB_ENV - echo "'SONAR_HOST_URL' environment variable set to '${SONAR_HOST_URL}'" - - SONAR_SCANNER_BIN_DIR=$(realpath "${SONAR_SCANNER_DIR}/bin") - echo "${SONAR_SCANNER_BIN_DIR}" >> $GITHUB_PATH - echo "'${SONAR_SCANNER_BIN_DIR}' added to the path" - - SONAR_SCANNER_BIN=$(realpath "${SONAR_SCANNER_BIN}") - echo "sonar-scanner-binary=${SONAR_SCANNER_BIN}" >> $GITHUB_OUTPUT - echo "'sonar-scanner-binary' output set to '${SONAR_SCANNER_BIN}'" - - BUILD_WRAPPER_BIN_DIR=$(realpath "${BUILD_WRAPPER_DIR}") - echo "${BUILD_WRAPPER_BIN_DIR}" >> $GITHUB_PATH - echo "'${BUILD_WRAPPER_BIN_DIR}' added to the path" + echo "sonar-scanner-binary=${SONAR_SCANNER_BINARY}" >> $GITHUB_OUTPUT + echo "'sonar-scanner-binary' output set to '${SONAR_SCANNER_BINARY}'" - BUILD_WRAPPER_BIN=$(realpath "${BUILD_WRAPPER_BIN}") - echo "build-wrapper-binary=${BUILD_WRAPPER_BIN}" >> $GITHUB_OUTPUT - echo "'build-wrapper-binary' output set to '${BUILD_WRAPPER_BIN}'" + echo "build-wrapper-binary=${BUILD_WRAPPER_BINARY}" >> $GITHUB_OUTPUT + echo "'build-wrapper-binary' output set to '${BUILD_WRAPPER_BINARY}'" echo "::endgroup::" diff --git a/scripts/cert.sh b/scripts/cert.sh deleted file mode 100755 index 2c2a2a5..0000000 --- a/scripts/cert.sh +++ /dev/null @@ -1,8 +0,0 @@ -#!/bin/bash - -if [[ -n "${SONAR_ROOT_CERT}" ]]; then - echo "Adding custom root certificate to java certificate store" - rm -f /tmp/tmpcert.pem - echo "${SONAR_ROOT_CERT}" > /tmp/tmpcert.pem - keytool -keystore /etc/ssl/certs/java/cacerts -storepass changeit -noprompt -trustcacerts -importcert -alias sonarqube -file /tmp/tmpcert.pem -fi diff --git a/scripts/configure_paths.sh b/scripts/configure_paths.sh deleted file mode 100755 index d1bbfe1..0000000 --- a/scripts/configure_paths.sh +++ /dev/null @@ -1,71 +0,0 @@ -#!/bin/bash - -if [[ ${ARCH} != "X64" && ! (${ARCH} == "ARM64" && (${OS} == "macOS" || ${OS} == "Linux")) ]]; then - echo "::error::Architecture '${ARCH}' is unsupported by build-wrapper" - exit 1 -fi - -case ${OS} in - Windows) - SONAR_SCANNER_SUFFIX="windows-x64" - BUILD_WRAPPER_SUFFIX="win-x86" - SONAR_SCANNER_NAME="sonar-scanner.bat" - BUILD_WRAPPER_NAME="build-wrapper-win-x86-64.exe" - SONAR_SCANNER_URL="${SONAR_SCANNER_URL_WINDOWS_X64}" - SONAR_SCANNER_SHA="${SONAR_SCANNER_SHA_WINDOWS_X64}" - ;; - Linux) - case ${ARCH} in - X64) - SONAR_SCANNER_SUFFIX="linux-x64" - BUILD_WRAPPER_SUFFIX="linux-x86" - BUILD_WRAPPER_NAME="build-wrapper-linux-x86-64" - SONAR_SCANNER_URL="${SONAR_SCANNER_URL_LINUX_X64}" - SONAR_SCANNER_SHA="${SONAR_SCANNER_SHA_LINUX_X64}" - ;; - ARM64) - SONAR_SCANNER_SUFFIX="linux-aarch64" - BUILD_WRAPPER_SUFFIX="linux-aarch64" - BUILD_WRAPPER_NAME="build-wrapper-linux-aarch64" - SONAR_SCANNER_URL="${SONAR_SCANNER_URL_LINUX_AARCH64}" - SONAR_SCANNER_SHA="${SONAR_SCANNER_SHA_LINUX_AARCH64}" - ;; - esac - SONAR_SCANNER_NAME="sonar-scanner" - ;; - macOS) - case ${ARCH} in - X64) - SONAR_SCANNER_SUFFIX="macosx-x64" - SONAR_SCANNER_URL="${SONAR_SCANNER_URL_MACOSX_X64}" - SONAR_SCANNER_SHA="${SONAR_SCANNER_SHA_MACOSX_X64}" - ;; - ARM64) - SONAR_SCANNER_SUFFIX="macosx-aarch64" - SONAR_SCANNER_URL="${SONAR_SCANNER_URL_MACOSX_AARCH64}" - SONAR_SCANNER_SHA="${SONAR_SCANNER_SHA_MACOSX_AARCH64}" - ;; - esac - BUILD_WRAPPER_SUFFIX="macosx-x86" - SONAR_SCANNER_NAME="sonar-scanner" - BUILD_WRAPPER_NAME="build-wrapper-macosx-x86" - ;; - *) - echo "::error::Unsupported runner OS '${OS}'" - exit 1 - ;; -esac - - -echo "sonar-scanner-url=${SONAR_SCANNER_URL}" -echo "sonar-scanner-sha=${SONAR_SCANNER_SHA}" - -SONAR_SCANNER_DIR="${INSTALL_PATH}/sonar-scanner-${SONAR_SCANNER_VERSION}-${SONAR_SCANNER_SUFFIX}" -echo "sonar-scanner-dir=${SONAR_SCANNER_DIR}" -echo "sonar-scanner-bin=${SONAR_SCANNER_DIR}/bin/${SONAR_SCANNER_NAME}" - -BUILD_WRAPPER_DIR="${INSTALL_PATH}/build-wrapper-${BUILD_WRAPPER_SUFFIX}" -echo "build-wrapper-url=${SONAR_HOST_URL%/}/static/cpp/build-wrapper-${BUILD_WRAPPER_SUFFIX}.zip" -echo "build-wrapper-dir=${BUILD_WRAPPER_DIR}" -echo "build-wrapper-bin=${BUILD_WRAPPER_DIR}/${BUILD_WRAPPER_NAME}" - diff --git a/scripts/create_install_path.sh b/scripts/create_install_path.sh deleted file mode 100755 index 7e35571..0000000 --- a/scripts/create_install_path.sh +++ /dev/null @@ -1,26 +0,0 @@ -#!/bin/bash - -source "$(dirname -- "$0")/utils.sh" - -echo "Installation path is '${INSTALL_PATH}'" - -test ! -z "${INSTALL_PATH}" -check_status "Empty installation path specified" - -if [[ ! -e "${INSTALL_PATH}" ]]; then - mkdir -p "${INSTALL_PATH}" - check_status "Failed to create non-existing installation path '${INSTALL_PATH}'" -fi - -ABSOLUTE_INSTALL_PATH=$(realpath "${INSTALL_PATH}") -echo "Absolute installation path is '${ABSOLUTE_INSTALL_PATH}'" - -test -d "${INSTALL_PATH}" -check_status "Installation path '${INSTALL_PATH}' is not a directory (absolute path is '${ABSOLUTE_INSTALL_PATH}')" - -test -r "${INSTALL_PATH}" -check_status "Installation path '${INSTALL_PATH}' is not readable (absolute path is '${ABSOLUTE_INSTALL_PATH}')" - -test -w "${INSTALL_PATH}" -check_status "Installation path '${INSTALL_PATH}' is not writeable (absolute path is '${ABSOLUTE_INSTALL_PATH}')" - diff --git a/scripts/download.sh b/scripts/download.sh deleted file mode 100755 index 9e1aefa..0000000 --- a/scripts/download.sh +++ /dev/null @@ -1,58 +0,0 @@ -#!/bin/bash - -source "$(dirname -- "$0")/utils.sh" - -VERIFY_CORRECTNESS=false - -help() { - cat <