Configuration Notes
Criticality filter value can contain custom severities or can be blank. Example: criticalityFilter=”blocker;severe;medium” Note: Values should be separated using semicolon (;).
Steps for Integrating SonarQube with Embold Code Quality
The following are the steps for running the SonarQube module with Remote Analysis:
Standard Compliance
BrowserStack Code Quality detects violations of standards such as MISRA. To understand the percentage coverage on each standard, please read the respective sections below.
Prerequisites (Sonar)
Make sure Sonar analysis for a particular project is completed and code issues are visible on Sonar UI.
Configuration for https enabled Embold
Import the same set of certificates used for Embold in default jre keystore on standalone Corona machine. Default jre path: Javajre1.8.0_171libsecurity. Below is the command: “keytool -import -trustcacerts -alias gamma -file “ ”-keystore cacerts”
Steps to run remote analysis
Login to Embold. Create a project. Link the repository you want to scan. On your remote Embold instance navigate to the repository you want to scan. Download configuration json from Embold UI, it resides in Project configuration. Open the JSON file. In the gammaAccess section, provide the URL of your…
Prerequisites (Remote Analysis)
In order to give read, write and execute permission to a user running remote scan: create a group ‘gamma’ with the help of following command: sudo groupadd gamma Change the group of the gamma installation directory to ‘gamma’ sudo chgrp gamma -R /opt/gamma Add permission to gamma installation directory: sudo…
Embold Jenkins Plugin as a downstream job
Below are the steps to run Embold Jenkins Plugin as a downstream job: Create a new Jenkins job for Embold Analysis. Configure it for running as a downstream job for the main job. Click on the “Advanced” button. Add a custom Workspace and give a path for the main job’s…