Adding poutine SAST #19
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Basic checks | ||
permissions: | ||
contents: read | ||
on: [workflow_call, workflow_dispatch] | ||
jobs: | ||
workflowcheck: | ||
name: Check validity of GitHub workflows | ||
runs-on: ubuntu-latest | ||
container: openquantumsafe/ci-ubuntu-latest:latest | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Ensure GitHub actions are valid | ||
run: actionlint -shellcheck "" # run *without* shellcheck | ||
- name: poutine - Static Application Security Testing | ||
uses: boostsecurityio/poutine-action@main | ||
- name: Upload poutine SARIF file | ||
uses: github/codeql-action/upload-sarif@4355270be187e1b672a7a1c7c7bae5afdc1ab94a # v3.24.10 | ||
with: | ||
sarif_file: results.sarif | ||
stylecheck: | ||
name: Check code formatting | ||
needs: [workflowcheck] | ||
runs-on: ubuntu-latest | ||
container: openquantumsafe/ci-ubuntu-latest:latest | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Ensure code conventions are upheld | ||
run: python3 -m pytest --verbose tests/test_code_conventions.py | ||
- name: Check that doxygen can parse the documentation | ||
run: mkdir build && ./scripts/run_doxygen.sh $(which doxygen) ./docs/.Doxyfile ./build | ||
- name: Validate CBOM | ||
run: scripts/validate_cbom.sh | ||
upstreamcheck: | ||
name: Check upstream code is properly integrated | ||
needs: [workflowcheck] | ||
runs-on: ubuntu-latest | ||
container: openquantumsafe/ci-ubuntu-latest:latest | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Configure | ||
run: | | ||
git config --global user.name "ciuser" && \ | ||
git config --global user.email "[email protected]" && \ | ||
git config --global --add safe.directory "$PWD" && \ | ||
echo "LIBOQS_DIR=$PWD" >> "$GITHUB_ENV" | ||
- name: Verify copy_from_upstream state after copy | ||
working-directory: "scripts/copy_from_upstream" | ||
run: | | ||
python3 copy_from_upstream.py -d copy && \ | ||
git status --porcelain && \ | ||
test -z "$(git status --porcelain)" | ||
- name: Verify copy_from_upstream state after libjade | ||
working-directory: "scripts/copy_from_upstream" | ||
run: | | ||
python3 copy_from_upstream.py -d libjade && \ | ||
git status --porcelain && \ | ||
test -z "$(git status --porcelain)" | ||
buildcheck: | ||
name: Check that code passes a basic build | ||
needs: [workflowcheck, stylecheck, upstreamcheck] | ||
runs-on: ubuntu-latest | ||
container: openquantumsafe/ci-ubuntu-latest:latest | ||
env: | ||
KEM_NAME: ml_kem_768 | ||
SIG_NAME: ml_dsa_65 | ||
steps: | ||
- name: Create random build folder | ||
run: tmp_build=$(mktemp -d) && echo "RANDOM_BUILD_DIR=$tmp_build" >> $GITHUB_ENV | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Configure | ||
run: | | ||
cmake \ | ||
-B ${{ env.RANDOM_BUILD_DIR }} \ | ||
-GNinja \ | ||
-DOQS_STRICT_WARNINGS=ON \ | ||
-DOQS_MINIMAL_BUILD="KEM_$KEM_NAME;SIG_$SIG_NAME" \ | ||
--warn-uninitialized . > config.log 2>&1 && \ | ||
cat config.log && \ | ||
cmake -LA -N . && \ | ||
! (grep -i "uninitialized variable" config.log) | ||
- name: Build code | ||
run: ninja | ||
working-directory: ${{ env.RANDOM_BUILD_DIR }} | ||
- name: Build documentation | ||
run: ninja gen_docs | ||
working-directory: ${{ env.RANDOM_BUILD_DIR }} | ||
cppcheck: | ||
name: Check C++ linking with example program | ||
runs-on: ubuntu-latest | ||
container: openquantumsafe/ci-ubuntu-latest:latest | ||
env: | ||
SIG_NAME: dilithium_2 | ||
steps: | ||
- name: Create random build folder | ||
run: tmp_build=$(mktemp -d) && echo "RANDOM_BUILD_DIR=$tmp_build" >> $GITHUB_ENV | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Configure | ||
run: | | ||
cmake \ | ||
-B ${{ env.RANDOM_BUILD_DIR }} \ | ||
-GNinja \ | ||
-DOQS_STRICT_WARNINGS=ON \ | ||
-DOQS_MINIMAL_BUILD="SIG_$SIG_NAME" \ | ||
--warn-uninitialized . > config.log 2>&1 && \ | ||
cat config.log && \ | ||
cmake -LA -N . && \ | ||
! (grep -i "uninitialized variable" config.log) | ||
- name: Build liboqs | ||
run: ninja | ||
working-directory: ${{ env.RANDOM_BUILD_DIR }} | ||
- name: Link with C++ program | ||
run: | | ||
g++ "$GITHUB_WORKSPACE"/cpp/sig_linking_test.cpp -g \ | ||
-I./include -L./lib -loqs -lcrypto -std=c++11 -o example_sig && \ | ||
./example_sig | ||
working-directory: ${{ env.RANDOM_BUILD_DIR }} | ||
fuzzbuildcheck: | ||
name: Check that code passes a basic fuzzing build | ||
needs: [workflowcheck, stylecheck, upstreamcheck] | ||
runs-on: ubuntu-latest | ||
container: openquantumsafe/ci-ubuntu-latest:latest | ||
env: | ||
SIG_NAME: dilithium_2 | ||
CC: clang | ||
CXX: clang++ | ||
CFLAGS: -fsanitize=fuzzer-no-link,address | ||
LDFLAGS: -fsanitize=address | ||
steps: | ||
- name: Create random build folder | ||
run: tmp_build=$(mktemp -d) && echo "RANDOM_BUILD_DIR=$tmp_build" >> $GITHUB_ENV | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Configure | ||
run: | | ||
cmake \ | ||
-B ${{ env.RANDOM_BUILD_DIR }} \ | ||
-GNinja \ | ||
-DOQS_STRICT_WARNINGS=ON \ | ||
-DOQS_BUILD_FUZZ_TESTS=ON \ | ||
-DOQS_MINIMAL_BUILD="SIG_$SIG_NAME" \ | ||
--warn-uninitialized . > config.log 2>&1 && \ | ||
cat config.log && \ | ||
cmake -LA -N . && \ | ||
! (grep -i "uninitialized variable" config.log) | ||
- name: Build code | ||
run: ninja fuzz_test_sig | ||
working-directory: ${{ env.RANDOM_BUILD_DIR }} | ||
- name: Short fuzz check (30s) | ||
run: ./tests/fuzz_test_sig -max_total_time=30 | ||
working-directory: ${{ env.RANDOM_BUILD_DIR }} | ||
nixflakecheck: | ||
name: Check that Nix flake has correct syntax and can build | ||
runs-on: ubuntu-latest | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # pin@v4 | ||
- name: Install Nix | ||
uses: cachix/install-nix-action@08dcb3a5e62fa31e2da3d490afc4176ef55ecd72 | ||
- name: Check devShell | ||
run: nix develop --command echo | ||
- name: Check flake syntax | ||
run: nix flake check --no-build # check for accurate syntax | ||
- name: Check that the flake builds | ||
run: nix build # check that the build runs |