Skip to content

Commit 26c5182

Browse files
SQSCANGHA-76 Support self-hosted runners not clearing truststore after run (#165)
1 parent 0ab314b commit 26c5182

File tree

3 files changed

+179
-11
lines changed

3 files changed

+179
-11
lines changed

.github/workflows/qa-main.yml

+132-4
Original file line numberDiff line numberDiff line change
@@ -619,9 +619,9 @@ jobs:
619619
- name: Assert failure of previous step
620620
if: steps.wrong_ssl_certificate.outcome == 'success'
621621
run: exit 1
622-
overridesScannerLocalFolderWhenPresent:
622+
overridesScannerLocalFolderWhenPresent: # can happen in uncleaned self-hosted runners
623623
name: >
624-
'SCANNER_LOCAL_FOLDER' is overridden with warning when present
624+
'SCANNER_LOCAL_FOLDER' is cleaned with warning when present
625625
runs-on: ubuntu-latest
626626
steps:
627627
- uses: actions/checkout@v4
@@ -643,14 +643,142 @@ jobs:
643643
- name: Run action with SONAR_SCANNER_TEMP
644644
uses: ./
645645
env:
646+
NO_CACHE: true # force install-sonar-scanner-cli.sh execution
646647
SONAR_SCANNER_TEMP: /tmp/sonar-scanner
647648
SONAR_HOST_URL: http://not_actually_used
648-
NO_CACHE: true # force install-sonar-scanner-cli.sh execution
649649
with:
650650
args: -Dsonar.scanner.internal.dumpToFile=./output.properties
651651
scannerVersion: ${{ env.SCANNER_VERSION }}
652652
- name: Assert SCANNER_LOCAL_FOLDER exists and dummy file is not in it
653653
run: |
654654
[ -d "$SCANNER_LOCAL_FOLDER" ] || exit 1
655655
[ ! -f "$SCANNER_LOCAL_FOLDER/some_content.txt" ] || exit 1
656-
656+
updateTruststoreWhenPresent: # can happen in uncleaned self-hosted runners
657+
name: >
658+
truststore.p12 is updated when present
659+
runs-on: ubuntu-latest
660+
steps:
661+
- uses: actions/checkout@v4
662+
with:
663+
token: ${{ secrets.GITHUB_TOKEN }}
664+
- name: Create SONAR_SSL_FOLDER with a file in it (not-truststore.p12)
665+
run: |
666+
SONAR_SSL_FOLDER=~/.sonar/ssl
667+
mkdir -p "$SONAR_SSL_FOLDER"
668+
touch "$SONAR_SSL_FOLDER/not-truststore.p12"
669+
# emit SONAR_SSL_FOLDER to be able to read it in the next steps
670+
echo "SONAR_SSL_FOLDER=$SONAR_SSL_FOLDER" >> $GITHUB_ENV
671+
- name: Assert truststore.p12 does not file exists
672+
run: |
673+
[ ! -f "$SONAR_SSL_FOLDER/truststore.p12" ] || exit 1
674+
- name: Run action with SONAR_ROOT_CERT
675+
uses: ./
676+
env:
677+
# NO_CACHE not needed, as SONAR_SSL_FOLDER is setup when the Sonar Scanner is run, not installed
678+
SONAR_HOST_URL: http://not_actually_used
679+
SONAR_ROOT_CERT: |
680+
-----BEGIN CERTIFICATE-----
681+
MIIFlTCCA32gAwIBAgIUXK4LyGUFe4ZVL93StPXCoJzmnLMwDQYJKoZIhvcNAQEL
682+
BQAwTzELMAkGA1UEBhMCQ0gxDzANBgNVBAgMBkdlbmV2YTEPMA0GA1UEBwwGR2Vu
683+
ZXZhMQ8wDQYDVQQKDAZTZXJ2ZXIxDTALBgNVBAsMBERlcHQwHhcNMjQxMTAxMDgx
684+
MzM3WhcNMzQxMDMwMDgxMzM3WjBPMQswCQYDVQQGEwJDSDEPMA0GA1UECAwGR2Vu
685+
ZXZhMQ8wDQYDVQQHDAZHZW5ldmExDzANBgNVBAoMBlNlcnZlcjENMAsGA1UECwwE
686+
RGVwdDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK5m0V6IFFykib77
687+
nmlN7weS9q3D6YGEj+8hRNQViL9KduUoLjoKpONIihU5kfIg+5SkGygjHRkBvIp3
688+
b0HQqhkwtGln3/FxxaSfGEguLHgzXR8JDQSyJ8UKIGOPCH93n1rUip5Ok1iExVup
689+
HtkiVDRoCC9cRjZXbGOKrO6VBT4RvakpkaqCdXYikV244B5ElM7kdFdz8fso78Aq
690+
xekb9dM0f21uUaDBKCIhRcxWeafp0CJIoejTq0+PF7qA2qIY5UHqWElWO5NsvQ8+
691+
MqKkIdsOa1pYNuH/5eQ59k9KSE92ps1xTKweW000GfPqxx8IQ/e4aAd2SaMTKvN6
692+
aac6piWBeJ7AssgWwkg/3rnZB5seQIrWjIUePmxJ4c0g0eL9cnVpYF0K/Dldle/G
693+
wg0zi1g709rBI1TYj9xwrivxSwEQupz8OdKqOmgqrKHJJ/CCLl+JdFYjgwl3NWLH
694+
wsU639H1bMXIJoQujg9U47e9fXbwiqdkMQzt7rPGkOBBaAkSctAReiXnWy+CbVEM
695+
QFHDrnD5YUJRd5t/DUuWuqhR2QhfUvRClPUKoVqB/iOu2IumlgDEDA8jb1dxEW+W
696+
iaYokQCS94OpxOJ8aeReSt9bghT0vc9ifCLWvuE1iBjujdK32ekKSY9DCZyBHXsG
697+
J9N1nt1qd/k7QqWOkuPjr1JrTIMbAgMBAAGjaTBnMB0GA1UdDgQWBBQw4ESReEk+
698+
AIxwjHRqPkESzMv1bTAfBgNVHSMEGDAWgBQw4ESReEk+AIxwjHRqPkESzMv1bTAP
699+
BgNVHRMBAf8EBTADAQH/MBQGA1UdEQQNMAuCCWxvY2FsaG9zdDANBgkqhkiG9w0B
700+
AQsFAAOCAgEAE8WefoZN23aOSe79ZN7zRBWP8DdPgFAqg5XUhfc9bCIVfJ4XMpEe
701+
3lzRhgjwDm4naEs35QWOhPZH2vx8XrEKnZNI6vKO8JzaCsivgngk8bsWnvhwSXy5
702+
eFdc99K+FOmOHevDmeiimoQnikffnSULRhQYzE2Qwyo9iky8703/+D3IKEC/8exC
703+
rlyGMUV/Nqj+4M+57DiZ6OXeFuunfoFB7vmcDZygqDhKoHhVRyu8qN6PeK2fvUFK
704+
EjeRtvA0GkdlOtLIF2g5yBTK2ykkt/oLUoAolfYUTKcoV2/FS0gVR5ovmEpKyBcP
705+
H9hzr16a8dtrEqOf/oKHQSLwxn8afmS354HJ75sq9SujOtIWpHfyH5IgqtUpiBN/
706+
bzvKs/QZjtGlqvquOTkdh9L4oxTXqG7zEStZyo/v9g5jf1Tq195b2DNFwVUZIcbb
707+
u2d4CvAZ1yNr+8ax/kTwBSY8WU+mCtmvowFstdvsJXVXJKnUO6EZOdbg0GxTBVyE
708+
zMsnPcnkOwV5TJIKKhonrgrwmPmQ9IOV9BrThVxujjjEbAdA6jM9PMiXzuDukldm
709+
QBRwNbczGbdsHkMKHmQnrTqOyQyI4KCXF08kcOm4C1P+Whrvi0DXkqHnyKvBE0td
710+
dciInBoeHwUs2eclz7gP7pMBJUlFUkKfQxwxGLIqZSXnlAFBfW6hHLI=
711+
-----END CERTIFICATE-----
712+
with:
713+
args: -Dsonar.scanner.internal.dumpToFile=./output.properties
714+
- name: Assert not-truststore.p12 file still exists
715+
run: |
716+
[ -f "$SONAR_SSL_FOLDER/not-truststore.p12" ] || exit 1
717+
- name: Assert truststore.p12 file now exists and take note of modification time
718+
run: |
719+
[ -f "$SONAR_SSL_FOLDER/truststore.p12" ] || exit 1
720+
# emit the modification time of the truststore.p12 file to be able to read it in the next steps
721+
TRUSTSTORE_P12_MOD_TIME_T1=$(stat -c %Y "$SONAR_SSL_FOLDER/truststore.p12")
722+
echo "TRUSTSTORE_P12_MOD_TIME_T1=$TRUSTSTORE_P12_MOD_TIME_T1" >> $GITHUB_ENV
723+
- name: Run action a second time with a different SONAR_ROOT_CERT
724+
uses: ./
725+
env:
726+
# NO_CACHE not needed, as SONAR_SSL_FOLDER is setup when the Sonar Scanner is run, not installed
727+
SONAR_HOST_URL: http://not_actually_used
728+
SONAR_ROOT_CERT: |
729+
-----BEGIN CERTIFICATE-----
730+
MIICgTCCAeoCCQCbOlrWDdX7FTANBgkqhkiG9w0BAQUFADCBhDELMAkGA1UEBhMC
731+
Tk8xGDAWBgNVBAgTD0FuZHJlYXMgU29sYmVyZzEMMAoGA1UEBxMDRm9vMRAwDgYD
732+
VQQKEwdVTklORVRUMRgwFgYDVQQDEw9mZWlkZS5lcmxhbmcubm8xITAfBgkqhkiG
733+
9w0BCQEWEmFuZHJlYXNAdW5pbmV0dC5ubzAeFw0wNzA2MTUxMjAxMzVaFw0wNzA4
734+
MTQxMjAxMzVaMIGEMQswCQYDVQQGEwJOTzEYMBYGA1UECBMPQW5kcmVhcyBTb2xi
735+
ZXJnMQwwCgYDVQQHEwNGb28xEDAOBgNVBAoTB1VOSU5FVFQxGDAWBgNVBAMTD2Zl
736+
aWRlLmVybGFuZy5ubzEhMB8GCSqGSIb3DQEJARYSYW5kcmVhc0B1bmluZXR0Lm5v
737+
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDivbhR7P516x/S3BqKxupQe0LO
738+
NoliupiBOesCO3SHbDrl3+q9IbfnfmE04rNuMcPsIxB161TdDpIesLCn7c8aPHIS
739+
KOtPlAeTZSnb8QAu7aRjZq3+PbrP5uW3TcfCGPtKTytHOge/OlJbo078dVhXQ14d
740+
1EDwXJW1rRXuUt4C8QIDAQABMA0GCSqGSIb3DQEBBQUAA4GBACDVfp86HObqY+e8
741+
BUoWQ9+VMQx1ASDohBjwOsg2WykUqRXF+dLfcUH9dWR63CtZIKFDbStNomPnQz7n
742+
bK+onygwBspVEbnHuUihZq3ZUdmumQqCw4Uvs/1Uvq3orOo/WJVhTyvLgFVK2Qar
743+
Q4/67OZfHd7R+POBXhophSMv1ZOo
744+
-----END CERTIFICATE-----
745+
with:
746+
args: -Dsonar.scanner.internal.dumpToFile=./output.properties
747+
- name: Assert truststore.p12 still exists, but it has been updated, and take note of modification time
748+
run: |
749+
[ -f "$SONAR_SSL_FOLDER/truststore.p12" ] || exit 1
750+
TRUSTSTORE_P12_MOD_TIME_T2=$(stat -c %Y "$SONAR_SSL_FOLDER/truststore.p12")
751+
[ "$TRUSTSTORE_P12_MOD_TIME_T1" != "$TRUSTSTORE_P12_MOD_TIME_T2" ] || exit 1
752+
# emit the modification time of the truststore.p12 file to be able to read it in the next steps
753+
echo "TRUSTSTORE_P12_MOD_TIME_T2=$TRUSTSTORE_P12_MOD_TIME_T2" >> $GITHUB_ENV
754+
- name: Remove sonar alias from truststore.p12
755+
run: keytool -delete -alias sonar -keystore "$SONAR_SSL_FOLDER/truststore.p12" -storepass changeit
756+
- name: Run action a third time
757+
uses: ./
758+
env:
759+
# NO_CACHE not needed, as SONAR_SSL_FOLDER is setup when the Sonar Scanner is run, not installed
760+
SONAR_HOST_URL: http://not_actually_used
761+
SONAR_ROOT_CERT: |
762+
-----BEGIN CERTIFICATE-----
763+
MIICgTCCAeoCCQCbOlrWDdX7FTANBgkqhkiG9w0BAQUFADCBhDELMAkGA1UEBhMC
764+
Tk8xGDAWBgNVBAgTD0FuZHJlYXMgU29sYmVyZzEMMAoGA1UEBxMDRm9vMRAwDgYD
765+
VQQKEwdVTklORVRUMRgwFgYDVQQDEw9mZWlkZS5lcmxhbmcubm8xITAfBgkqhkiG
766+
9w0BCQEWEmFuZHJlYXNAdW5pbmV0dC5ubzAeFw0wNzA2MTUxMjAxMzVaFw0wNzA4
767+
MTQxMjAxMzVaMIGEMQswCQYDVQQGEwJOTzEYMBYGA1UECBMPQW5kcmVhcyBTb2xi
768+
ZXJnMQwwCgYDVQQHEwNGb28xEDAOBgNVBAoTB1VOSU5FVFQxGDAWBgNVBAMTD2Zl
769+
aWRlLmVybGFuZy5ubzEhMB8GCSqGSIb3DQEJARYSYW5kcmVhc0B1bmluZXR0Lm5v
770+
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDivbhR7P516x/S3BqKxupQe0LO
771+
NoliupiBOesCO3SHbDrl3+q9IbfnfmE04rNuMcPsIxB161TdDpIesLCn7c8aPHIS
772+
KOtPlAeTZSnb8QAu7aRjZq3+PbrP5uW3TcfCGPtKTytHOge/OlJbo078dVhXQ14d
773+
1EDwXJW1rRXuUt4C8QIDAQABMA0GCSqGSIb3DQEBBQUAA4GBACDVfp86HObqY+e8
774+
BUoWQ9+VMQx1ASDohBjwOsg2WykUqRXF+dLfcUH9dWR63CtZIKFDbStNomPnQz7n
775+
bK+onygwBspVEbnHuUihZq3ZUdmumQqCw4Uvs/1Uvq3orOo/WJVhTyvLgFVK2Qar
776+
Q4/67OZfHd7R+POBXhophSMv1ZOo
777+
-----END CERTIFICATE-----
778+
with:
779+
args: -Dsonar.scanner.internal.dumpToFile=./output.properties
780+
- name: Assert truststore.p12 still exists, and it has been updated again
781+
run: |
782+
[ -f "$SONAR_SSL_FOLDER/truststore.p12" ] || exit 1
783+
TRUSTSTORE_P12_MOD_TIME_T3=$(stat -c %Y "$SONAR_SSL_FOLDER/truststore.p12")
784+
[ "$TRUSTSTORE_P12_MOD_TIME_T2" != "$TRUSTSTORE_P12_MOD_TIME_T3" ] || exit 1

README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ If your source code file names contain special characters that are not covered b
294294
LC_ALL: "ru_RU.UTF-8"
295295
```
296296

297-
## Alternatives for Java, .NET, and C/C++ projects
297+
## Alternatives for Java and .NET
298298

299299
This GitHub Action will not work for all technologies. If you are in one of the following situations, you should use the following alternatives:
300300

scripts/run-sonar-scanner-cli.sh

+46-6
Original file line numberDiff line numberDiff line change
@@ -21,16 +21,56 @@ if [[ -n "${INPUT_PROJECTBASEDIR}" ]]; then
2121
scanner_args+=("-Dsonar.projectBaseDir=${INPUT_PROJECTBASEDIR}")
2222
fi
2323

24+
# The SSL folder may exist on an uncleaned self-hosted runner
25+
SONAR_SSL_FOLDER=~/.sonar/ssl
26+
# Use keytool for now, as SonarQube 10.6 and below doesn't support openssl generated keystores
27+
# keytool requires a password > 6 characters, so we won't use the default password 'sonar'
28+
KEYTOOL_MAIN_CLASS=sun.security.tools.keytool.Main
29+
SONAR_SSL_TRUSTSTORE_FILE="$SONAR_SSL_FOLDER/truststore.p12"
30+
SONAR_SSL_TRUSTSTORE_PASSWORD=changeit
31+
32+
if [ -f "$SONAR_SSL_TRUSTSTORE_FILE" ]; then
33+
ALIAS_SONAR_IS_PRESENT=true
34+
35+
"$SONAR_SCANNER_JRE/bin/java" "$KEYTOOL_MAIN_CLASS" \
36+
-storetype PKCS12 \
37+
-keystore "$SONAR_SSL_TRUSTSTORE_FILE" \
38+
-storepass "$SONAR_SSL_TRUSTSTORE_PASSWORD" \
39+
-noprompt \
40+
-trustcacerts \
41+
-list -v -alias sonar > /dev/null 2>&1 || {
42+
ALIAS_SONAR_IS_PRESENT=false
43+
echo "Existing Scanner truststore $SONAR_SSL_TRUSTSTORE_FILE does not contain 'sonar' alias"
44+
}
45+
46+
if [[ $ALIAS_SONAR_IS_PRESENT == "true" ]]; then
47+
echo "Removing 'sonar' alias from already existing Scanner truststore: $SONAR_SSL_TRUSTSTORE_FILE"
48+
"$SONAR_SCANNER_JRE/bin/java" "$KEYTOOL_MAIN_CLASS" \
49+
-storetype PKCS12 \
50+
-keystore "$SONAR_SSL_TRUSTSTORE_FILE" \
51+
-storepass "$SONAR_SSL_TRUSTSTORE_PASSWORD" \
52+
-noprompt \
53+
-trustcacerts \
54+
-delete \
55+
-alias sonar
56+
fi
57+
fi
58+
2459
if [[ -n "${SONAR_ROOT_CERT}" ]]; then
2560
echo "Adding SSL certificate to the Scanner truststore"
2661
rm -f $RUNNER_TEMP/tmpcert.pem
2762
echo "${SONAR_ROOT_CERT}" > $RUNNER_TEMP/tmpcert.pem
28-
# Use keytool for now, as SonarQube 10.6 and below doesn't support openssl generated keystores
29-
# keytool require a password > 6 characters, so we wan't use the default password 'sonar'
30-
store_pass=changeit
31-
mkdir -p ~/.sonar/ssl
32-
$SONAR_SCANNER_JRE/bin/java sun.security.tools.keytool.Main -storetype PKCS12 -keystore ~/.sonar/ssl/truststore.p12 -storepass $store_pass -noprompt -trustcacerts -importcert -alias sonar -file $RUNNER_TEMP/tmpcert.pem
33-
scanner_args+=("-Dsonar.scanner.truststorePassword=$store_pass")
63+
mkdir -p "$SONAR_SSL_FOLDER"
64+
"$SONAR_SCANNER_JRE/bin/java" "$KEYTOOL_MAIN_CLASS" \
65+
-storetype PKCS12 \
66+
-keystore "$SONAR_SSL_TRUSTSTORE_FILE" \
67+
-storepass "$SONAR_SSL_TRUSTSTORE_PASSWORD" \
68+
-noprompt \
69+
-trustcacerts \
70+
-importcert \
71+
-alias sonar \
72+
-file "$RUNNER_TEMP/tmpcert.pem"
73+
scanner_args+=("-Dsonar.scanner.truststorePassword=$SONAR_SSL_TRUSTSTORE_PASSWORD")
3474
fi
3575

3676
scanner_args+=("$@")

0 commit comments

Comments
 (0)