Compare commits

...

17 Commits

Author SHA1 Message Date
Francisco Robles Martín
ee95a7cad6
Fix error message when pom or build.gradle are detected (#48) 2024-12-29 22:47:55 +07:00
Dwi Siswanto
616b2df627
docs: update blockquote notes
(adapt https://github.com/orgs/community/discussions/16925)

Signed-off-by: Dwi Siswanto <me@dw1.io>
2023-11-17 21:22:58 +07:00
Ivan Schaller
72254bbe1e fix project basedir path
Signed-off-by: Ivan Schaller <ivan@schaller.sh>
2023-09-25 15:20:37 +07:00
Dwi Siswanto
9017aabde4
chore: update CODEOWNERS 2023-09-12 06:20:22 +07:00
Dwi Siswanto
a76da8f0e6
docs: update README 2023-09-12 06:18:51 +07:00
Dwi Siswanto
513476d3b8 Update readme 2022-06-16 12:34:30 +07:00
Dwi Siswanto
b3336b356f update(entrypoint): code-style & sonar sources pointing to project base dir 2022-06-16 12:33:59 +07:00
Dwi Siswanto
214c4b604a update(entrypoint): remove conditional trigger event & dynamic source encoding
and code-style
2022-06-16 12:28:38 +07:00
Dwi Siswanto
70d39d8c86 Add source encoding 2022-06-16 12:28:25 +07:00
Dwi Siswanto
7e63816c89 Update readme 2022-06-16 12:28:13 +07:00
Dwi Siswanto
9d60bddfc9 update(entrypoint): exit early on Maven/Gradle project, and
- display warning on auth w/o using token
- proper `sonar-project.properties` link
- unset `JAVA_HOME` environment (fix #31)
2022-06-16 12:02:05 +07:00
Dwi Siswanto
c17fe0c59d Update wording 2022-06-16 12:01:28 +07:00
Dwi Siswanto
c4b2851844 Remove unused code 2022-06-16 11:47:29 +07:00
Dwi Siswanto
2796ffc8b5 misc: Wording 2022-06-16 11:13:04 +07:00
Dwi Siswanto
b87ffe4bf5 Update readme 2022-06-16 10:27:37 +07:00
Erdem Karasahin
16486220f2 docker build fail && please check 2022-06-16 10:25:32 +07:00
Dwi Siswanto
d7e1e2bb60 misc: Update code owners 2021-12-17 13:57:02 +07:00
5 changed files with 87 additions and 56 deletions

1
CODEOWNERS Normal file
View File

@ -0,0 +1 @@
* @dwisiswant0

View File

@ -10,15 +10,6 @@ LABEL repository="https://github.com/kitabisa/sonarqube-action"
LABEL homepage="https://kitabisa.github.io" LABEL homepage="https://kitabisa.github.io"
LABEL maintainer="dwisiswant0" LABEL maintainer="dwisiswant0"
RUN npm config set unsafe-perm true && \
npm install --silent --save-dev -g typescript@3.5.2 && \
npm config set unsafe-perm false && \
apk add --no-cache ca-certificates jq
ENV NODE_PATH "/usr/lib/node_modules/"
COPY entrypoint.sh /entrypoint.sh COPY entrypoint.sh /entrypoint.sh
RUN chmod +x /entrypoint.sh RUN chmod +x /entrypoint.sh
ENTRYPOINT ["/entrypoint.sh"] ENTRYPOINT ["/entrypoint.sh"]

View File

@ -2,52 +2,76 @@
Using this GitHub Action, scan your code with SonarQube scanner to detects bugs, vulnerabilities and code smells in more than 20 programming languages! Using this GitHub Action, scan your code with SonarQube scanner to detects bugs, vulnerabilities and code smells in more than 20 programming languages!
<img src="https://www.sonarqube.org/assets/logo-31ad3115b1b4b120f3d1efd63e6b13ac9f1f89437f0cf6881cc4d8b5603a52b4.svg" width="320px"> <img src="https://assets-eu-01.kc-usercontent.com/d1e40bf0-65fc-01ef-5235-9aeaedac229b/12e3974b-220d-4cde-8f17-2ff9fa9d9c27/SonarQube_Logo.svg" width="320px">
SonarQube is an open-source platform developed by SonarSource for continuous inspection of code quality to perform automatic reviews with static analysis of code to detect bugs, code smells, and security vulnerabilities on 20+ programming languages. SonarQube is an open-source platform developed by SonarSource for continuous inspection of code quality to perform automatic reviews with static analysis of code to detect bugs, code smells, and security vulnerabilities on 20+ programming languages.
## Requirements ## Requirements
* Have SonarQube on server. [Install now](https://docs.sonarqube.org/latest/setup/install-server/) if it's not already the case! * [SonarQube server](https://docs.sonarqube.org/latest/setup/install-server/).
* That's all!
## Usage ## Usage
The workflow, usually declared in `.github/workflows/build.yml`, looks like: The workflow, usually declared in `.github/workflows/build.yaml`, looks like:
```yaml ```yaml
on: push on:
name: Main Workflow # Trigger analysis when pushing in master or pull requests, and when creating
# a pull request.
push:
branches:
- master
pull_request:
types: [opened, synchronize, reopened]
name: SonarQube Scan
jobs: jobs:
sonarQubeTrigger: sonarqube:
name: SonarQube Trigger name: SonarQube Trigger
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- uses: actions/checkout@master - name: Checking out
uses: actions/checkout@master
with:
# Disabling shallow clone is recommended for improving relevancy of reporting
fetch-depth: 0
- name: SonarQube Scan - name: SonarQube Scan
uses: kitabisa/sonarqube-action@v1.1.0 uses: kitabisa/sonarqube-action@v1.2.0
with: with:
host: ${{ secrets.SONARQUBE_HOST }} host: ${{ secrets.SONARQUBE_HOST }}
login: ${{ secrets.SONARQUBE_TOKEN }} login: ${{ secrets.SONARQUBE_TOKEN }}
``` ```
You can change the analysis base directory and/ project key _(allowed characters: letters, numbers, -, \_, . and :, with at least one non-digit.)_ by using the optional input like this: You can change the analysis base directory and/or project key by using the optional input like this:
```yaml ```yaml
uses: kitabisa/sonarqube-action@master uses: kitabisa/sonarqube-action@master
with: with:
projectBaseDir: "/path/to/my-custom-project" host: ${{ secrets.SONARQUBE_HOST }}
login: ${{ secrets.SONARQUBE_TOKEN }}
projectBaseDir: "src/"
projectKey: "my-custom-project" projectKey: "my-custom-project"
projectName: "my-custom-project-name"
projectVersion: "v0.0.1"
``` ```
## Secrets ### Inputs
- `host` - **_(Required)_** this is the SonarQube server URL. These are some of the supported input parameters of action.
- `login` - **_(Required)_** the login or authentication token of a SonarQube user with Execute Analysis permission on the project. See [how to generate SonarQube token](https://docs.sonarqube.org/latest/user-guide/user-token/).
- `password` - The password that goes with the `login` username. This should be left blank if an `login` are authentication token.
You can set all variable in the "Secrets" settings page of your repository. | **Parameter** | **Description** | **Required?** | **Default** | **Note** |
|----------------------|---------------------------------------------------|---------------|-------------|-----------------------------------------------------------------------------------------------|
| **`host`** | SonarQube server URL | 🟢 | | |
| **`login`** | Login or authentication token of a SonarQube user | 🟢 | | `Execute Analysis` permission required. |
| **`password`** | The password that goes with the `login` username | 🔴 | | This should be left blank if an `login` are authentication token. |
| **`projectBaseDir`** | Set custom project base directory analysis | 🔴 | `.` | |
| **`projectKey`** | The project's unique key | 🔴 | | Allowed characters are: letters, numbers, `-`, `_`, `.` and `:`, with at least one non-digit. |
| **`projectName`** | Name of the project | 🔴 | | It will be displayed on the SonarQube web interface. |
| **`projectVersion`** | The project version | 🔴 | | |
| **`encoding`** | Encoding of the source code | 🔴 | `UTF-8` | |
> [!NOTE]
> If you opt to configure the project metadata and other related settings in a **`sonar-project.properties`** file (must be placed within the base directory, `projectBaseDir`) instead of using input parameters, this action is compatible with that approach!
## License ## License

View File

@ -1,15 +1,18 @@
name: "SonarQube Scan" name: "SonarQube Scan"
description: "Scan your code with SonarQube Scanner to detect bugs, vulnerabilities and code smells in more than 25 programming languages." description: "Scan your code with SonarQube Scanner to detect bugs, vulnerabilities and code smells in more than 25 programming languages."
author: "Dwi Siswanto" author: "Dwi Siswanto"
branding: branding:
icon: "check" icon: "check"
color: "green" color: "green"
runs: runs:
using: "docker" using: "docker"
image: "Dockerfile" image: "Dockerfile"
inputs: inputs:
host: host:
description: "SonarQube server URL" description: "SonarQube server URL."
required: true required: true
projectKey: projectKey:
description: "The project's unique key. Allowed characters are: letters, numbers, -, _, . and :, with at least one non-digit." description: "The project's unique key. Allowed characters are: letters, numbers, -, _, . and :, with at least one non-digit."
@ -24,12 +27,16 @@ inputs:
required: false required: false
default: "" default: ""
projectBaseDir: projectBaseDir:
description: "Set the sonar.projectBaseDir analysis property" description: "Set the sonar.projectBaseDir analysis property."
required: false required: false
default: "." default: "."
login: login:
description: "Login or authentication token of a SonarQube user" description: "Login or authentication token of a SonarQube user."
required: true required: true
password: password:
description: "Password that goes with the sonar.login username. This should be left blank if an authentication token is being used." description: "Password that goes with the sonar.login username. This should be left blank if an authentication token is being used."
required: false required: false
encoding:
description: "Encoding of the source code."
required: false
default: "UTF-8"

View File

@ -2,36 +2,44 @@
set -e set -e
if [[ "${GITHUB_EVENT_NAME}" == "pull_request" ]]; then
EVENT_ACTION=$(jq -r ".action" "${GITHUB_EVENT_PATH}")
if [[ "${EVENT_ACTION}" != "opened" ]]; then
echo "No need to run analysis. It is already triggered by the push event."
exit
fi
fi
REPOSITORY_NAME=$(basename "${GITHUB_REPOSITORY}") REPOSITORY_NAME=$(basename "${GITHUB_REPOSITORY}")
[[ ! -z ${INPUT_PASSWORD} ]] && SONAR_PASSWORD="${INPUT_PASSWORD}" || SONAR_PASSWORD="" if [[ ! -z "${INPUT_PASSWORD}" ]]; then
echo "::warning ::Running this GitHub Action without authentication token is NOT recommended!"
SONAR_PASSWORD="${INPUT_PASSWORD}"
else
SONAR_PASSWORD=""
fi
if [[ ! -f "${GITHUB_WORKSPACE}/sonar-project.properties" ]]; then if [[ -f "${INPUT_PROJECTBASEDIR%/}/pom.xml" ]]; then
[[ -z ${INPUT_PROJECTKEY} ]] && SONAR_PROJECTKEY="${REPOSITORY_NAME}" || SONAR_PROJECTKEY="${INPUT_PROJECTKEY}" echo "::error file=${INPUT_PROJECTBASEDIR%/}/pom.xml::Maven project detected. You should run the goal 'org.sonarsource.scanner.maven:sonar' during build rather than using this GitHub Action."
[[ -z ${INPUT_PROJECTNAME} ]] && SONAR_PROJECTNAME="${REPOSITORY_NAME}" || SONAR_PROJECTNAME="${INPUT_PROJECTNAME}" exit 1
[[ -z ${INPUT_PROJECTVERSION} ]] && SONAR_PROJECTVERSION="" || SONAR_PROJECTVERSION="${INPUT_PROJECTVERSION}" fi
if [[ -f "${INPUT_PROJECTBASEDIR%/}/build.gradle" ]]; then
echo "::error file=${INPUT_PROJECTBASEDIR%/}/build.gradle::Gradle project detected. You should use the SonarQube plugin for Gradle during build rather than using this GitHub Action."
exit 1
fi
unset JAVA_HOME
if [[ ! -f "${INPUT_PROJECTBASEDIR%/}/sonar-project.properties" ]]; then
[[ -z "${INPUT_PROJECTKEY}" ]] && SONAR_PROJECTKEY="${REPOSITORY_NAME}" || SONAR_PROJECTKEY="${INPUT_PROJECTKEY}"
[[ -z "${INPUT_PROJECTNAME}" ]] && SONAR_PROJECTNAME="${REPOSITORY_NAME}" || SONAR_PROJECTNAME="${INPUT_PROJECTNAME}"
[[ -z "${INPUT_PROJECTVERSION}" ]] && SONAR_PROJECTVERSION="" || SONAR_PROJECTVERSION="${INPUT_PROJECTVERSION}"
sonar-scanner \ sonar-scanner \
-Dsonar.host.url=${INPUT_HOST} \ -Dsonar.host.url="${INPUT_HOST}" \
-Dsonar.projectKey=${SONAR_PROJECTKEY} \ -Dsonar.projectKey="${SONAR_PROJECTKEY}" \
-Dsonar.projectName=${SONAR_PROJECTNAME} \ -Dsonar.projectName="${SONAR_PROJECTNAME}" \
-Dsonar.projectVersion=${SONAR_PROJECTVERSION} \ -Dsonar.projectVersion="${SONAR_PROJECTVERSION}" \
-Dsonar.projectBaseDir=${INPUT_PROJECTBASEDIR} \ -Dsonar.projectBaseDir="${INPUT_PROJECTBASEDIR}" \
-Dsonar.login=${INPUT_LOGIN} \ -Dsonar.login="${INPUT_LOGIN}" \
-Dsonar.password=${SONAR_PASSWORD} \ -Dsonar.password="${SONAR_PASSWORD}" \
-Dsonar.sources=. \ -Dsonar.sources="${INPUT_PROJECTBASEDIR}" \
-Dsonar.sourceEncoding=UTF-8 -Dsonar.sourceEncoding="${INPUT_ENCODING}"
else else
sonar-scanner \ sonar-scanner \
-Dsonar.host.url=${INPUT_HOST} \ -Dsonar.host.url="${INPUT_HOST}" \
-Dsonar.projectBaseDir=${INPUT_PROJECTBASEDIR} \ -Dsonar.login="${INPUT_LOGIN}" \
-Dsonar.login=${INPUT_LOGIN} \ -Dsonar.password="${SONAR_PASSWORD}"
-Dsonar.password=${SONAR_PASSWORD}
fi fi