Skip to content

Produce separate SARIF file for quality-queries alerts #2935

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 16 commits into
base: main
Choose a base branch
from

Conversation

mbg
Copy link
Member

@mbg mbg commented Jun 16, 2025

Follows on from #2917.

This PR modifies the action to produce separate SARIF files for code quality queries (as specified as arguments to the quality-queries input) and uploads them to the code quality API. The approach here is that:

  • We make an additional call to database interpret-results for queries that were specified as arguments to the quality-queries input (if any). This results in SARIF files for those queries.
  • We then upload them to the CQ API endpoint.

Notes

  • The changes aim to be as backwards-compatible as possible. That includes:
    • We don't (yet) modify the existing SARIF files that are uploaded to the code scanning API to exclude results for quality-queries alerts.
    • SARIF files are output to the same place as before (e.g. as opposed to having separate subdirectories for security and quality SARIFs)
  • We don't support query-filter options with respect to code quality results.

Merge / deployment checklist

  • Confirm this change is backwards compatible with existing workflows.
  • Confirm the readme has been updated if necessary.
  • Confirm the changelog has been updated if necessary.

@mbg mbg force-pushed the mbg/interpret-cq-results branch 2 times, most recently from 87b6687 to fe76653 Compare June 17, 2025 13:37
Comment on lines +342 to +346
const response = await client.request(target, {
owner: repositoryNwo.owner,
repo: repositoryNwo.repo,
data: payload,
});

Check warning

Code scanning / CodeQL

File data in outbound network request Medium

Outbound network request depends on
file data
.
@mbg mbg force-pushed the mbg/interpret-cq-results branch from 2bf7322 to 24e4f58 Compare June 23, 2025 17:35
@mbg mbg force-pushed the mbg/interpret-cq-results branch from 7e59f77 to f7fbaa0 Compare June 24, 2025 12:09
@mbg mbg marked this pull request as ready for review June 24, 2025 13:08
@mbg mbg requested a review from a team as a code owner June 24, 2025 13:08
@mbg mbg requested a review from Copilot June 24, 2025 13:09
Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR enables separate generation and upload of SARIF files for code-quality queries specified via the quality-queries input, in addition to the existing code-scanning SARIF flow.

  • Introduces SARIF_UPLOAD_TARGET enum and UploadTarget interface to distinguish code scanning vs. code quality uploads.
  • Extends file discovery (findSarifFilesInDir, getSarifFilePaths) and upload logic (uploadFiles, uploadPayload, validateUniqueCategory) to filter and handle .quality.sarif files.
  • Updates analyze.ts/analyze-action.ts to produce and upload quality SARIFs when quality-queries are provided, and adjusts CI workflows to upload/check both SARIF artifacts.

Reviewed Changes

Copilot reviewed 12 out of 17 changed files in this pull request and generated no comments.

Show a summary per file
File Description
src/upload-lib.ts Added enum and targets for separate SARIF uploads, filtering logic for .quality.sarif.
src/upload-lib.test.ts Added tests for filtering .quality.sarif files and validateUniqueCategory prefix.
src/analyze.ts Introduced default query suites and resolveQuerySuiteAlias; generate quality SARIF.
src/analyze.test.ts Added tests for resolveQuerySuiteAlias.
src/analyze-action.ts Uploads quality SARIF and sets quality-sarif-id output when quality-queries present.
pr-checks/checks/quality-queries.yml CI updates to upload security vs. quality SARIF artifacts and adjust checks.
Comments suppressed due to low confidence (2)

src/upload-lib.ts:427

  • The getSarifFilePaths function bypasses the isSarif filter when sarifPath is a single file. This can lead to uploading unwanted files (e.g., a .quality.sarif when targeting code-scanning). Apply isSarif to the single-file case or throw if it does not match.
    sarifFiles = [sarifPath];

pr-checks/checks/quality-queries.yml:29

  • [nitpick] The CI step now only checks config properties in the quality SARIF, omitting the original security SARIF check. Consider adding a separate check for ${{ runner.temp }}/results/javascript.sarif to ensure both artifacts are validated.
      SARIF_PATH: "${{ runner.temp }}/results/javascript.quality.sarif"

@mbg mbg force-pushed the mbg/interpret-cq-results branch 2 times, most recently from 3393b4e to 81969d7 Compare June 25, 2025 13:24
@mbg mbg force-pushed the mbg/interpret-cq-results branch 2 times, most recently from 4088317 to b403ba2 Compare June 25, 2025 13:38
@mbg mbg force-pushed the mbg/interpret-cq-results branch from b403ba2 to 79049d9 Compare June 25, 2025 13:42
Copy link
Contributor

@esbena esbena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice, and pleasantly surgical.

I think this does the right thing, except for a missing quality.sarif predicate in the very end.

Other than that it's mostly nits, and some concerns about maintenance in the long term. We have already discussed them elsewhere. Perhaps we should update the discussion document with our current choice for query resolution.

*/
export function resolveQuerySuiteAlias(
language: Language,
query: string,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: I think should be named suite instead of query, but if there's precedence for using the query name elsewhere, then just keep it.

Comment on lines +565 to +571
export const defaultSuites: Set<string> = new Set([
"security-experimental",
"security-extended",
"security-and-quality",
"code-quality",
"code-scanning",
]);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is my least favorite part of the PR. As it leads to double maintenance.

It would be great if the same resolution that the ordinary .queries uses could be reused here. In the interest of time, we don't need to do it right now though. Could you perhaps create an issue with a list of things to follow up on later?

databaseRunQueries(
databasePath: string,
flags: string[],
queries?: string[],
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this deserves a jsdoc comment.
I'm guessing that the semantics is that she CLI will magically look up the query suite to use if nothing explicitly is provided by the user, and not that it will run zero queries.

@@ -306,12 +306,19 @@ function getAutomationID(
return api.computeAutomationID(analysis_key, environment);
}

// Enumerates API endpoints that accept SARIF files.
export enum SARIF_UPLOAD_TARGET {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: SARIF_UPLOAD_ENDPOINT is a more standard naming scheme for <method> <path> strings like this.

Comment on lines +383 to +385
export const qualityIsSarif = (name: string) => name.endsWith(".quality.sarif");
export const defaultIsSarif = (name: string) =>
name.endsWith(".sarif") && !qualityIsSarif(name);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

could we move these definitions into UploadTarget instances below, so you always access them through their associated target. I'd like a very strong coupling between the components of such targets to avoid a fragment being used wrongly.

That is: I love seeing sentinelPrefix: string = CodeScanningTarget.sentinelPrefix, below rather than a direct reference to a codeScanningSentinelPrefix

@@ -567,6 +581,30 @@ export function buildPayload(
return payloadObj;
}

// Represents configurations for different services that we can upload SARIF to.
export interface UploadTarget {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

regarding the target/endpoint comment above: this is a much better place to call something target. I'd probably prefer SarifUploadConfig but that is splitting hairs.

@@ -567,6 +581,30 @@ export function buildPayload(
return payloadObj;
}

// Represents configurations for different services that we can upload SARIF to.
export interface UploadTarget {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I really like to see this config pattern used here. Good choice.

sentinelPrefix: string;
}

// Represents the Code Scanning upload target.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Stray thought. I have seen both line comments and jsdoc comments on your new functions. Is it deliberate that you do not use jsdoc here? If yes, OK.

features,
logger,
);
core.setOutput("sarif-id", uploadResult.sarifID);

// If there are `.quality.sarif` files in `sarifPath`, then upload those to the code quality service.
const qualitySarifFiles = upload_lib.getSarifFilePaths(sarifPath);
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Bug: getSarifFilePaths(sarifPath); is this missing a quality specialization through some argument, or is there some hidden state elsewhere?

I think this should be getSarifFilePaths(sarifPath, upload_lib.CodeQualityTarget.sarifFilter),

export interface UploadTarget {
name: string;
target: SARIF_UPLOAD_TARGET;
sarifFilter: (name: string) => boolean;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: a filter is typically a function of Array -> SubsetArray, whereas this is a predicate. The relation being that a filter is instantiated with a predicate.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants