Git action test [AllBridgeFacet v3.0.1] [@coderabbit ignore] #10
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Audit Verifier | |
# - checks if an audit is required for a given PR | |
# - an audit is required if any .sol file in path 'src/' has been modified or added | |
# - if audit is required, the action will assign the label "AuditRequired", otherwise it will assign label "AuditNotRequired" | |
# - it will also make sure that at the end, exactly one of these two labels is indeed assigned | |
name: Audit Verifier | |
# - checks if an audit is required and assigns a (protected) label based on the result ('AuditRequired' or 'AuditNotRequired') | |
# - if an audit is required, it will verify that the audit was actually done and assign label "AuditCompleted" | |
# - verification includes: | |
# - ensuring the audit log contains an entry for all added/modified contracts in their latest version | |
# - ensuring that an audit report has been added | |
# - ensuring that the PR is approved by the auditor (uses auditor git handle from audit log) | |
# - ensuring that the commit hash that was audited is actually part of this PR | |
# KNOWN LIMITATIONS | |
# - will only check the last 100 commits for any matches with audit commit hashes | |
on: | |
pull_request: | |
types: [opened, synchronize, reopened] | |
jobs: | |
check-if-audit-required: | |
# will only run once the PR is in "Ready for Review" state | |
if: ${{ github.event.pull_request.draft == false }} | |
runs-on: ubuntu-latest | |
env: | |
GITHUB_TOKEN: ${{ secrets.GIT_ACTIONS_BOT_PAT_CLASSIC }} | |
permissions: | |
pull-requests: write | |
steps: | |
- name: Checkout repository | |
uses: actions/checkout@v4 | |
with: | |
fetch-depth: 0 ##### Fetch all history for all branches | |
- name: Check PR for changes for protected folders ('src/*') | |
id: check_if_audit_is_required | |
run: | | |
##### Get all files modified by this PR | |
FILES=$(git diff --name-only origin/main HEAD) | |
##### Make sure that there are modified files | |
if [[ -z $FILES ]]; then | |
echo -e "\033[31mNo files found. This should not happen. Please check the code of the Github action. Aborting now.\033[0m" | |
echo "CONTINUE=false" >> "$GITHUB_ENV" | |
fi | |
##### Initialize empty variables | |
PROTECTED_CONTRACTS="" | |
##### Go through all modified file names/paths and identify contracts with path 'src/*' | |
while IFS= read -r FILE; do | |
if echo "$FILE" | grep -E '^src/.*\.sol$'; then | |
##### Contract found | |
PROTECTED_CONTRACTS="${PROTECTED_CONTRACTS}${FILE}"$'\n' | |
fi | |
done <<< "$FILES" | |
##### Determine if audit is required | |
if [[ -z "$PROTECTED_CONTRACTS" ]]; then | |
echo -e "\033[32mNo protected contracts found in this PR.\033[0m" | |
echo "AUDIT_REQUIRED=false" >> "$GITHUB_ENV" | |
else | |
echo -e "\033[31mProtected contracts found in this PR.\033[0m" | |
echo "PROTECTED_CONTRACTS: $PROTECTED_CONTRACTS" | |
echo "AUDIT_REQUIRED=true" >> "$GITHUB_ENV" | |
echo -e "$PROTECTED_CONTRACTS" > protected_contracts.txt | |
fi | |
- name: Assign, update, and verify labels based on check outcome | |
uses: actions/github-script@v7 | |
env: | |
AUDIT_REQUIRED: ${{ env.AUDIT_REQUIRED }} | |
with: | |
script: | | |
const { execSync } = require('child_process'); | |
// ANSI escape codes for colors (used for colored output in Git action console) | |
const colors = { | |
reset: "\033[0m", | |
red: "\033[31m", | |
green: "\033[32m", | |
}; | |
// Fetch currently assigned labels from GitHub using GitHub CLI | |
let assignedLabels = []; | |
try { | |
// Fetch the labels directly from the pull request | |
const labelsOutput = execSync(`gh pr view ${{ github.event.pull_request.number }} --json labels --jq '.labels[].name'`).toString(); | |
// Split the labels output into an array and trim each label | |
assignedLabels = labelsOutput.split('\n').map(label => label.trim()).filter(Boolean); | |
} catch (error) { | |
console.error(`${colors.red}Error fetching assigned labels: ${error.message}${colors.reset}`); | |
process.exit(1); | |
} | |
// check if audit is required (determined by previous step) | |
const auditRequired = process.env.AUDIT_REQUIRED === 'true'; | |
// determine which label should be assigned and which should be removed | |
const labelToAssign = auditRequired ? 'AuditRequired' : 'AuditNotRequired'; | |
const oppositeLabel = auditRequired ? 'AuditNotRequired' : 'AuditRequired'; | |
console.log(`Currently assigned labels: ${JSON.stringify(assignedLabels)}`); | |
console.log(`Label '${labelToAssign}' has to be assigned to this PR`); | |
console.log(`Label '${oppositeLabel}' will be removed, if currently present`); | |
// Assign the required label if not already present | |
if (!assignedLabels.includes(labelToAssign)) { | |
console.log(`Assigning label: ${labelToAssign}`); | |
execSync(`gh pr edit ${{ github.event.pull_request.number }} --add-label "${labelToAssign}"`, { stdio: 'inherit' }); | |
} else { | |
console.log(`${colors.green}Label "${labelToAssign}" is already assigned. No action needed.${colors.reset}`); | |
} | |
// Remove the opposite label if it is present | |
if (assignedLabels.includes(oppositeLabel)) { | |
console.log(`Removing opposite label: ${oppositeLabel}`); | |
execSync(`gh pr edit ${{ github.event.pull_request.number }} --remove-label "${oppositeLabel}"`, { stdio: 'inherit' }); | |
} else { | |
console.log(`${colors.green}Opposite label "${oppositeLabel}" is not assigned. No action needed.${colors.reset}`); | |
} | |
// Verify that exactly one of the two labels is assigned | |
const requiredLabelCount = assignedLabels.filter(label => label === 'AuditRequired').length; | |
const notRequiredLabelCount = assignedLabels.filter(label => label === 'AuditNotRequired').length; | |
const totalLabelsAssigned = requiredLabelCount + notRequiredLabelCount; | |
console.log(`Total labels assigned: ${totalLabelsAssigned}`); | |
if (totalLabelsAssigned !== 1) { | |
console.error(`${colors.red}Error: Exactly one of the two protected labels should be assigned but found ${totalLabelsAssigned} assigned labels.${colors.reset}`); | |
process.exit(1); | |
} else { | |
console.log(`${colors.green}Verified that exactly one label is assigned. All good :)${colors.reset}`); | |
} |