-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HDF->SARIF converters missing location, making invalid for use by GitHub #2694
Comments
candrews
added a commit
that referenced
this issue
Jul 24, 2023
Per https://sarifweb.azurewebsites.net/Validation > Each result location must provide the property 'physicalLocation.artifactLocation.uri'. > GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result. Signed-off-by: Craig Andrews <[email protected]>
candrews
added a commit
that referenced
this issue
Jul 24, 2023
Per https://sarifweb.azurewebsites.net/Validation > Each result location must provide the property 'physicalLocation.artifactLocation.uri'. > GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result. Signed-off-by: Craig Andrews <[email protected]>
candrews
added a commit
that referenced
this issue
Jul 24, 2023
Per https://sarifweb.azurewebsites.net/Validation > Each result location must provide the property 'physicalLocation.artifactLocation.uri'. > GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result. Signed-off-by: Craig Andrews <[email protected]>
candrews
added a commit
that referenced
this issue
Jul 25, 2023
Per https://sarifweb.azurewebsites.net/Validation > Each result location must provide the property 'physicalLocation.artifactLocation.uri'. > GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result. Signed-off-by: Craig Andrews <[email protected]>
candrews
added a commit
that referenced
this issue
Jul 25, 2023
Per https://sarifweb.azurewebsites.net/Validation > Each result location must provide the property 'physicalLocation.artifactLocation.uri'. > GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result. Signed-off-by: Craig Andrews <[email protected]>
michaelcfanning
pushed a commit
that referenced
this issue
Jul 27, 2023
* HdfConverter: Add location, address GitHub validation error (#2694) Per https://sarifweb.azurewebsites.net/Validation > Each result location must provide the property 'physicalLocation.artifactLocation.uri'. > GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result. Signed-off-by: Craig Andrews <[email protected]> * HdfConvert: Use HDF "control.descriptions" for "help" (#2633) Signed-off-by: Craig Andrews <[email protected]> * HdfConverter: Use HDF title as SARIF shortDescription * HdfConverter: make name a Pascal case identifier See: https://docs.oasis-open.org/sarif/sarif/v2.1.0/os/sarif-v2.1.0-os.html#_Toc34317843 Signed-off-by: Craig Andrews <[email protected]> * HdfConverter: Set Enabled to true if and only if all results have status skipped See: https://docs.oasis-open.org/sarif/sarif/v2.1.0/os/sarif-v2.1.0-os.html#_Toc34317854 Signed-off-by: Craig Andrews <[email protected]> --------- Signed-off-by: Craig Andrews <[email protected]>
This issue has been resolved as of version 4.2.1. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The SARIF generated by this tool from HDF does not pass GitHub validation.
To reproduce:
npx @microsoft/[email protected] convert -t Hdf -o "openscap-report.sarif" "openscap-report.hdf.json"
Here's the resulting sarif (I pretty formatted it for readability):openscap-report.sarif.gz
openscap-report.sarif
file with the "GitHub ingestion rules" option selected.Expected:
Successful validation.
Actual:
GH1001: Each result location must provide the property 'physicalLocation.artifactLocation.uri'. GitHub Advanced Security code scanning will not display a result whose location does not provide the URI of the artifact that contains the result.
When trying to use the SARIF in practice with GitHub's
github/codeql-action/upload-sarif@v2
action as documented at https://docs.github.com/en/code-security/code-scanning/integrating-with-code-scanning/uploading-a-sarif-file-to-github#example-workflow-for-sarif-files-generated-outside-of-a-repository GitHub fails to process the SARIF as expected due to the missing required location data. For example failing GitHub action, see https://github.com/candrews/jumpstart/actions/runs/5603707977/job/15181171825?pr=884#step:10:22 the failure is:Trivy had the same problem a while back (see aquasecurity/trivy#1038), they solved it by add
location
/region
information to the SARIF: AndreyLevchenko/trivy@a8ec7ecPerhaps this tool could similarly add location information when it converts HDF->SARIF?
The text was updated successfully, but these errors were encountered: