From patchwork Thu Jun 22 03:32:15 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= X-Patchwork-Id: 106142 Delivered-To: patch@linaro.org Received: by 10.140.91.2 with SMTP id y2csp2256447qgd; Wed, 21 Jun 2017 20:42:02 -0700 (PDT) X-Received: by 10.55.146.133 with SMTP id u127mr498834qkd.17.1498102922809; Wed, 21 Jun 2017 20:42:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1498102922; cv=none; d=google.com; s=arc-20160816; b=PqIQHhORuUey2uP7attwUmqJIAQd1oBUtGpqWWiDJzwRzil50BdRd9Mfw2A9CGyuov tCI1sDhDzj7xuPUMDx2homFuO4jQQ91SdCXaMLiFH6ZzLawSpIbzj+KOuhWwapOBQb1u I5mjIEeA5zMTjFPlbR+FXRw4h3lUYRG4dbyICHH81cBsoh1x3oBVU6J+uYDIh2Dd/FjC GBRXETAS3RbrfAvRiC4qWwyrr3EQHTZhEliOW4st4vD8Yq0YNsbTTRwqqOeE/1dYRj3/ mE/7z1XmYJmxo05lSudBEchTALFpbHZ+r/ivFurUiQnK6lo9oifuU0kKSRV1AHttyk3I OgUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:cc:list-subscribe:list-help:list-post:list-archive :list-unsubscribe:list-id:precedence:subject :content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:to:from:dkim-signature:arc-authentication-results; bh=3n6GZ2eWcBU3woEgXfm/D1mpOZKpiFhq1O6Pe8E9P/w=; b=MDJ85BVuFYh4JEfBK+RmfqvhhOUix/zXBLokUpUceWfGuJjey7frHMWkHamKmFpFYh C9pxyb31YBg+ZYAq0KNeNB0b9wMx5ZxSE1MCnvATXyeXFpJtKsEMYajXlqG3ueg3Kdg7 MGAiEhRx6M21rlPuqE3r9U9HW6wnEmtGeTLqvIJBonAM3uGtqg8z6cUVf2cqWLP0mVwJ VnrEwVH52M0C+POOGD3rfbaHXYX14Wyu5mmTvaOawNqjSDEWqgRfzcu7Q/f+dR4Pwjgh snhZWPTohjnkUqbrnReZu0cPj4iW3cNIUcHQm19TX13zPIhc3z055RqdHl56tdtkkmww 0q7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.b=k8T/H5E+; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+patch=linaro.org@nongnu.org Return-Path: Received: from lists.gnu.org (lists.gnu.org. [208.118.235.17]) by mx.google.com with ESMTPS id y3si320649qta.82.2017.06.21.20.42.02 for (version=TLS1 cipher=AES128-SHA bits=128/128); Wed, 21 Jun 2017 20:42:02 -0700 (PDT) Received-SPF: pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 208.118.235.17 as permitted sender) client-ip=208.118.235.17; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.b=k8T/H5E+; spf=pass (google.com: domain of qemu-devel-bounces+patch=linaro.org@nongnu.org designates 208.118.235.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+patch=linaro.org@nongnu.org Received: from localhost ([::1]:56896 helo=lists.gnu.org) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dNt0K-0004AT-2K for patch@linaro.org; Wed, 21 Jun 2017 23:42:00 -0400 Received: from eggs.gnu.org ([2001:4830:134:3::10]:56131) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1dNsrn-0005dD-8m for qemu-devel@nongnu.org; Wed, 21 Jun 2017 23:33:14 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1dNsrl-0004lk-PJ for qemu-devel@nongnu.org; Wed, 21 Jun 2017 23:33:11 -0400 Received: from mail-qt0-x233.google.com ([2607:f8b0:400d:c0d::233]:35656) by eggs.gnu.org with esmtps (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.71) (envelope-from ) id 1dNsrl-0004kq-J6 for qemu-devel@nongnu.org; Wed, 21 Jun 2017 23:33:09 -0400 Received: by mail-qt0-x233.google.com with SMTP id f92so2933876qtb.2 for ; Wed, 21 Jun 2017 20:33:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=3n6GZ2eWcBU3woEgXfm/D1mpOZKpiFhq1O6Pe8E9P/w=; b=k8T/H5E+TXHa0MXWFOlARAnqjZy5MbKx0NpQt2X0qcTandnzxKPlJYVGBLhCod5mVP wYN6kLfRW1+UlhYFzf4ixnplEZ5xzPFVBxCuRuH+sRN4YxmrBvzDDulV471Po1kYY5td 5NWp2lRFlNTCKmkdI7d4LM3DxgXO0y8Opw/LTXrW4QUaPGGqpdqgP9hboKsu0BGjer4c hERqMxaINN5/JSI+Voine+kCFJFhv2PZTVA9Hix90aWffMxzpB1gVGrjEGQfx6+Lf9cO m46DbM5m7zjABihfUJPqi02qrfzsesicO8pb3SxqgtcFjl52JoIbmBkrWbmBRtxZDY/e J8yg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references:mime-version:content-transfer-encoding; bh=3n6GZ2eWcBU3woEgXfm/D1mpOZKpiFhq1O6Pe8E9P/w=; b=ENwLlGFt4eDPeIx3q+E3TG+p/9bL5DZ10HZ+P6o2VyuXCLroTPNZ7M9sm9IFZaEzBr EUhYd05tY8My81C2TjZ7QqYgRSHxxABFB7sC5w2GvRXEdjVV144hZQKuXKWpYCEt7bdO JvJ5p2ltcjvE3oRRDJihhekCngfHmpebS0yGM93RjAUgI657nM7JfBBskkgOqbOmtV6a 4L/xX7oXdbOUXBV0HuuF/700BKqOlpWrcEgb3BMeV+D1sFLmkTcDDombJ1a2k/JkdXd0 i950CFvKrcFO8XBcUjQTALyshlJHGT5/iB+fyc0QxdEF0LafP7+4ma64fvQm2m3l1nnA w7AQ== X-Gm-Message-State: AKS2vOz1ZlbUJQIZN9At4S/ZILcErJXYj5G4xdNTgIRtZfFP5zSvjm7b Llv97jmRN3MSCbPzYT8= X-Received: by 10.237.47.228 with SMTP id m91mr462967qtd.242.1498102388761; Wed, 21 Jun 2017 20:33:08 -0700 (PDT) Received: from yoga.offpageads.com ([138.117.48.226]) by smtp.gmail.com with ESMTPSA id g39sm247454qtc.12.2017.06.21.20.33.06 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Jun 2017 20:33:07 -0700 (PDT) From: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= To: qemu-devel@nongnu.org, =?utf-8?q?Alex_Benn=C3=A9e?= , Fam Zheng , Peter Maydell Date: Thu, 22 Jun 2017 00:32:15 -0300 Message-Id: <20170622033231.19344-6-f4bug@amsat.org> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170622033231.19344-1-f4bug@amsat.org> References: <20170622033231.19344-1-f4bug@amsat.org> MIME-Version: 1.0 X-detected-operating-system: by eggs.gnu.org: Genre and OS details not recognized. X-Received-From: 2607:f8b0:400d:c0d::233 Subject: [Qemu-devel] [PATCH v2 05/21] scripts/run-coverity-scan: Script to run Coverity Scan build X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= Errors-To: qemu-devel-bounces+patch=linaro.org@nongnu.org Sender: "Qemu-devel" From: Peter Maydell Add a new script to automate the process of running the Coverity Scan build tools and uploading the resulting tarball to the website. This is primarily intended to be driven from Travis, but it can be run locally (if you are a maintainer of the QEMU project on the Coverity Scan website and have the secret upload token). Signed-off-by: Peter Maydell Reviewed-by: Alex Bennée Signed-off-by: Philippe Mathieu-Daudé --- scripts/run-coverity-scan | 170 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 170 insertions(+) create mode 100755 scripts/run-coverity-scan -- 2.11.0 diff --git a/scripts/run-coverity-scan b/scripts/run-coverity-scan new file mode 100755 index 0000000000..e6d5fc58d8 --- /dev/null +++ b/scripts/run-coverity-scan @@ -0,0 +1,170 @@ +#!/bin/sh -e + +# Upload a created tarball to Coverity Scan, as per +# https://scan.coverity.com/projects/qemu/builds/new + +# This work is licensed under the terms of the GNU GPL version 2, +# or (at your option) any later version. +# See the COPYING file in the top-level directory. +# +# Copyright (c) 2017 Linaro Limited +# Written by Peter Maydell + +# Note that this script will automatically download and +# run the (closed-source) coverity build tools, so don't +# use it if you don't trust them! + +# This script assumes that you're running it from a QEMU source +# tree, and that tree is a fresh clean one, because we do an in-tree +# build. (This is necessary so that the filenames that the Coverity +# Scan server sees are relative paths that match up with the component +# regular expressions it uses; an out-of-tree build won't work for this.) +# The host machine should have as many of QEMU's dependencies +# installed as possible, for maximum coverity coverage. + +# You need to pass the following environment variables to the script: +# COVERITY_TOKEN -- this is the secret 8 digit hex string which lets +# you upload to Coverity Scan. If you're a maintainer +# in Coverity then the web UI will tell you this. +# COVERITY_EMAIL -- the email address to use for uploads + +# and optionally +# COVERITY_DRYRUN -- set to not actually do the upload +# COVERITY_BUILD_CMD -- make command (defaults to 'make -j8') +# COVERITY_TOOL_BASE -- set to directory to put coverity tools +# (defaults to /tmp/coverity-tools) + +# The primary purpose of this script is to be run as part of +# a Travis build, but it is possible to run it manually locally. + +if [ -z "$COVERITY_TOKEN" ]; then + echo "COVERITY_TOKEN environment variable not set" + exit 1 +fi + +if [ -z "$COVERITY_EMAIL" ]; then + echo "COVERITY_EMAIL environment variable not set" + exit 1 +fi + +if [ -z "$COVERITY_BUILD_CMD" ]; then + echo "COVERITY_BUILD_CMD: using default 'make -j8'" + COVERITY_BUILD_CMD="make -j8" +fi + +if [ -z "$COVERITY_TOOL_BASE" ]; then + echo "COVERITY_TOOL_BASE: using default /tmp/coverity-tools" + COVERITY_TOOL_BASE=/tmp/coverity-tools +fi + +PROJTOKEN="$COVERITY_TOKEN" +PROJNAME=QEMU +TARBALL=cov-int.tar.xz +SRCDIR="$(pwd)" + +echo "Checking this is a QEMU source tree..." +if ! [ -e VERSION ]; then + echo "Not in a QEMU source tree?" + exit 1 +fi + +echo "Checking upload permissions..." + +if ! up_perm="$(wget https://scan.coverity.com/api/upload_permitted --post-data "token=$PROJTOKEN&project=$PROJNAME" -q -O -)"; then + echo "Coverity Scan API access denied: bad token?" + exit 1 +fi + +# Really up_perm is a JSON response with either +# {upload_permitted:true} or {next_upload_permitted_at:} +# We do some hacky string parsing instead of properly parsing it. +case "$up_perm" in + *upload_permitted*true*) + echo "Coverity Scan: upload permitted" + ;; + *next_upload_permitted_at*) + if [ -z "$COVERITY_DRYRUN" ]; then + echo "Coverity Scan: upload quota reached; stopping here" + # Exit success as this isn't a build error. + exit 0 + else + echo "Coverity Scan: upload quota reached, continuing dry run" + fi + ;; + *) + echo "Coverity Scan upload check: unexpected result $up_perm" + exit 1 + ;; +esac + +mkdir -p "$COVERITY_TOOL_BASE" +cd "$COVERITY_TOOL_BASE" + +echo "Checking for new version of coverity build tools..." +wget https://scan.coverity.com/download/linux64 --post-data "token=$PROJTOKEN&project=$PROJNAME&md5=1" -O coverity_tool.md5.new + +if ! cmp -s coverity_tool.md5 coverity_tool.md5.new; then + # out of date md5 or no md5: download new build tool + # blow away the old build tool + echo "Downloading coverity build tools..." + rm -rf coverity_tool coverity_tool.tgz + wget https://scan.coverity.com/download/linux64 --post-data "token=$PROJTOKEN&project=$PROJNAME" -O coverity_tool.tgz + if ! (cat coverity_tool.md5.new; echo " coverity_tool.tgz") | md5sum -c --status; then + echo "Downloaded tarball didn't match md5sum!" + exit 1 + fi + # extract the new one, keeping it corralled in a 'coverity_tool' directory + echo "Unpacking coverity build tools..." + mkdir -p coverity_tool + cd coverity_tool + tar xf ../coverity_tool.tgz + cd .. + mv coverity_tool.md5.new coverity_tool.md5 +fi + +rm -f coverity_tool.md5.new + +TOOLBIN="$(echo $(pwd)/coverity_tool/cov-analysis-*/bin)" + +if ! test -x "$TOOLBIN/cov-build"; then + echo "Couldn't find cov-build in the coverity build-tool directory??" + exit 1 +fi + +export PATH="$TOOLBIN:$PATH" + +cd "$SRCDIR" + +echo "Doing make distclean..." +make distclean + +echo "Configuring..." +./configure --audio-drv-list=oss,alsa,sdl,pa --disable-werror + +echo "Making libqemustub.a..." +make libqemustub.a + +echo "Running cov-build..." +rm -rf cov-int +mkdir cov-int +cov-build --dir cov-int $COVERITY_BUILD_CMD + +echo "Creating results tarball..." +tar cvf - cov-int | xz > "$TARBALL" + +echo "Uploading results tarball..." + +VERSION="$(git describe --always HEAD)" +DESCRIPTION="$(git rev-parse HEAD)" + +if ! [ -z "$COVERITY_DRYRUN" ]; then + echo "Dry run only, not uploading $TARBALL" + exit 0 +fi + +curl --form token="$PROJTOKEN" --form email="$COVERITY_EMAIL" \ + --form file=@"$TARBALL" --form version="$VERSION" \ + --form description="$DESCRIPTION" \ + https://scan.coverity.com/builds?project="$PROJNAME" + +echo "Done."