-#!/bin/sh -xue
+#!/bin/bash -exu
#
-# Copyright (C) 2015 - Michael Jeanson <mjeanson@efficios.com>
-# Jonathan Rajotte-Julien <jonathan.rajotte-julien@efficios.com>
+# Copyright (C) 2019 Michael Jeanson <mjeanson@efficios.com>
+# Copyright (C) 2015 Jonathan Rajotte-Julien <jonathan.rajotte-julien@efficios.com>
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
+# Required variables
+WORKSPACE=${WORKSPACE:-}
+
# Coverity settings
# The project name and token have to be provided trough env variables
#COVERITY_SCAN_PROJECT_NAME=""
COVERITY_SCAN_BUILD_OPTIONS=""
#COVERITY_SCAN_BUILD_OPTIONS="--return-emit-failures 8 --parse-error-threshold 85"
+DEPS_INC="$WORKSPACE/deps/build/include"
+DEPS_LIB="$WORKSPACE/deps/build/lib"
+DEPS_PKGCONFIG="$DEPS_LIB/pkgconfig"
+DEPS_BIN="$WORKSPACE/deps/build/bin"
+
+export PATH="$DEPS_BIN:$PATH"
+export LD_LIBRARY_PATH="$DEPS_LIB:${LD_LIBRARY_PATH:-}"
+export PKG_CONFIG_PATH="$DEPS_PKGCONFIG"
+export CPPFLAGS="-I$DEPS_INC"
+export LDFLAGS="-L$DEPS_LIB"
+
SRCDIR="$WORKSPACE/src/${COVERITY_SCAN_PROJECT_NAME}"
TMPDIR="$WORKSPACE/tmp"
case "$COVERITY_SCAN_PROJECT_NAME" in
babeltrace)
- CONF_OPTS="--enable-python-bindings --enable-python-bindings-doc"
+ CONF_OPTS="--enable-python-bindings --enable-python-bindings-doc --enable-python-plugins"
+ BUILD_TYPE="autotools"
;;
liburcu)
CONF_OPTS=""
+ BUILD_TYPE="autotools"
;;
lttng-modules)
CONF_OPTS=""
+ BUILD_TYPE="autotools"
;;
lttng-tools)
CONF_OPTS=""
+ BUILD_TYPE="autotools"
;;
lttng-ust)
CONF_OPTS="--enable-java-agent-all --enable-python-agent"
+ BUILD_TYPE="autotools"
export CLASSPATH="/usr/share/java/log4j-1.2.jar"
;;
+lttng-scope|ctf-java|libdelorean-java|jabberwocky)
+ CONF_OPTS=""
+ BUILD_TYPE="maven"
+ MVN_BIN="$HOME/tools/hudson.tasks.Maven_MavenInstallation/default/bin/mvn"
+ ;;
+linux-rseq)
+ CONF_OPTS=""
+ BUILD_TYPE="linux-rseq"
+ ;;
*)
echo "Generic project, no configure options."
CONF_OPTS=""
+ BUILD_TYPE="autotools"
;;
esac
-# liburcu dependency
-if [ -d "$WORKSPACE/deps/liburcu" ]; then
- URCU_INCS="$WORKSPACE/deps/liburcu/build/include/"
- URCU_LIBS="$WORKSPACE/deps/liburcu/build/lib/"
-
- export CPPFLAGS="-I$URCU_INCS ${CPPFLAGS:-}"
- export LDFLAGS="-L$URCU_LIBS ${LDFLAGS:-}"
- export LD_LIBRARY_PATH="$URCU_LIBS:${LD_LIBRARY_PATH:-}"
-fi
-
-
-# lttng-ust dependency
-if [ -d "$WORKSPACE/deps/lttng-ust" ]; then
- UST_INCS="$WORKSPACE/deps/lttng-ust/build/include/"
- UST_LIBS="$WORKSPACE/deps/lttng-ust/build/lib/"
-
- export CPPFLAGS="-I$UST_INCS ${CPPFLAGS:-}"
- export LDFLAGS="-L$UST_LIBS ${LDFLAGS:-}"
- export LD_LIBRARY_PATH="$UST_LIBS:${LD_LIBRARY_PATH:-}"
-fi
-
-if [ -d "$WORKSPACE/linux" ]; then
- export KERNELDIR="$WORKSPACE/linux"
+if [ -d "$WORKSPACE/src/linux" ]; then
+ export KERNELDIR="$WORKSPACE/src/linux"
fi
+# Enter the source directory
+cd "$SRCDIR"
# Verify upload is permitted
+# Added "--insecure" because Coverity can't be bothered to properly install SSL certificate chains
set +x
-AUTH_RES=`curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN" $SCAN_URL/api/upload_permitted`
+AUTH_RES=$(curl -s --insecure --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN" $SCAN_URL/api/upload_permitted)
set -x
if [ "$AUTH_RES" = "Access denied" ]; then
echo -e "\033[33;1mCoverity Scan API access denied. Check COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN.\033[0m"
exit 1
else
- AUTH=`echo $AUTH_RES | jq .upload_permitted`
+ AUTH=$(echo "$AUTH_RES" | jq .upload_permitted)
if [ "$AUTH" = "true" ]; then
echo -e "\033[33;1mCoverity Scan analysis authorized per quota.\033[0m"
else
- WHEN=`echo $AUTH_RES | jq .next_upload_permitted_at`
+ WHEN=$(echo "$AUTH_RES" | jq .next_upload_permitted_at)
echo -e "\033[33;1mCoverity Scan analysis NOT authorized until $WHEN.\033[0m"
exit 1
fi
# Download Coverity Scan Analysis Tool
-if [ ! -d $TOOL_BASE ]; then
- if [ ! -e $TOOL_ARCHIVE ]; then
+if [ ! -d "$TOOL_BASE" ]; then
+ if [ ! -e "$TOOL_ARCHIVE" ]; then
echo -e "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m"
set +x
- wget -nv -O $TOOL_ARCHIVE $TOOL_URL --post-data "project=$COVERITY_SCAN_PROJECT_NAME&token=$COVERITY_SCAN_TOKEN"
+ curl -s --insecure --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN" -o "$TOOL_ARCHIVE" "$TOOL_URL"
set -x
fi
# Extract Coverity Scan Analysis Tool
echo -e "\033[33;1mExtracting Coverity Scan Analysis Tool...\033[0m"
- mkdir -p $TOOL_BASE
- cd $TOOL_BASE
- tar xzf $TOOL_ARCHIVE
+ mkdir -p "$TOOL_BASE"
+ cd "$TOOL_BASE" || exit 1
+ tar xzf "$TOOL_ARCHIVE"
cd -
fi
-TOOL_DIR=`find $TOOL_BASE -type d -name 'cov-analysis*'`
+TOOL_DIR=$(find "$TOOL_BASE" -type d -name 'cov-analysis*')
export PATH=$TOOL_DIR/bin:$PATH
-cd "$SRCDIR"
-
-COVERITY_SCAN_VERSION=`git describe --always | sed 's|-|.|g'`
-
-# Prepare build dir
-if [ -f "./bootstrap" ]; then
- ./bootstrap
- ./configure $CONF_OPTS
-fi
+COVERITY_SCAN_VERSION=$(git describe --always | sed 's|-|.|g')
# Build
echo -e "\033[33;1mRunning Coverity Scan Analysis Tool...\033[0m"
-cov-build --dir $RESULTS_DIR $COVERITY_SCAN_BUILD_OPTIONS make -j$NPROC V=1
-cov-import-scm --dir $RESULTS_DIR --scm git --log $RESULTS_DIR/scm_log.txt
+case "$BUILD_TYPE" in
+maven)
+ cov-configure --java
+ cov-build --dir "$RESULTS_DIR" $COVERITY_SCAN_BUILD_OPTIONS "$MVN_BIN" \
+ -s "$MVN_SETTINGS" \
+ -Dmaven.repo.local="$WORKSPACE/.repository" \
+ -Dmaven.compiler.fork=true \
+ -Dmaven.compiler.forceJavaCompilerUse=true \
+ -Dmaven.test.skip=true \
+ -DskipTests \
+ clean verify
+ ;;
+autotools)
+ # Prepare build dir for autotools based projects
+ if [ -f "./bootstrap" ]; then
+ ./bootstrap
+ ./configure $CONF_OPTS
+ fi
+
+ cov-build --dir "$RESULTS_DIR" $COVERITY_SCAN_BUILD_OPTIONS make -j"$NPROC" V=1
+ ;;
+linux-rseq)
+ make defconfig
+ make -j"$NPROC" prepare
+ cov-build --dir "$RESULTS_DIR" $COVERITY_SCAN_BUILD_OPTIONS make -j"$NPROC" kernel/rseq.o kernel/do_on_cpu/core.o kernel/do_on_cpu/interpreter.o kernel/do_on_cpu/validate.o V=1
+ ;;
+*)
+ echo "Unsupported build type: $BUILD_TYPE"
+ exit 1
+ ;;
+esac
+
+
+
+cov-import-scm --dir "$RESULTS_DIR" --scm git --log "$RESULTS_DIR/scm_log.txt"
cd "${WORKSPACE}"
# Upload results
echo -e "\033[33;1mUploading Coverity Scan Analysis results...\033[0m"
set +x
-response=$(curl \
+response=$(curl --insecure \
--silent --write-out "\n%{http_code}\n" \
- --form project=$COVERITY_SCAN_PROJECT_NAME \
- --form token=$COVERITY_SCAN_TOKEN \
- --form email=$COVERITY_SCAN_NOTIFICATION_EMAIL \
- --form file=@$RESULTS_ARCHIVE \
- --form version=$COVERITY_SCAN_VERSION \
- --form description=$COVERITY_SCAN_DESCRIPTION \
- $UPLOAD_URL)
+ --form project="$COVERITY_SCAN_PROJECT_NAME" \
+ --form token="$COVERITY_SCAN_TOKEN" \
+ --form email="$COVERITY_SCAN_NOTIFICATION_EMAIL" \
+ --form file=@"$RESULTS_ARCHIVE" \
+ --form version="$COVERITY_SCAN_VERSION" \
+ --form description="$COVERITY_SCAN_DESCRIPTION" \
+ "$UPLOAD_URL")
set -x
status_code=$(echo "$response" | sed -n '$p')
-if [ "$status_code" != "201" ]; then
+if [ "${status_code:0:1}" == "2" ]; then
+ echo -e "\033[33;1mCoverity Scan upload successful.\033[0m"
+else
TEXT=$(echo "$response" | sed '$d')
echo -e "\033[33;1mCoverity Scan upload failed: $TEXT.\033[0m"
exit 1
fi
+
+# EOF