GitHub Action
SonarQube Quality Gate Check
Check the Quality Gate of your code with SonarQube Server to ensure your code meets your own quality standards before you release or deploy new features.
SonarQube Server is the leading product for Continuous Code Quality & Code Security. It supports most popular programming languages, including Java, JavaScript, TypeScript, C#, Python, C, C++, and many more.
A previous step must have run an analysis on your code.
Read more information on how to analyze your code here
The workflow YAML file will usually look something like this::
on:
# Trigger analysis when pushing in master or pull requests, and when creating
# a pull request.
push:
branches:
- master
pull_request:
types: [opened, synchronize, reopened]
name: Main Workflow
jobs:
sonarqube:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
# Disabling shallow clone is recommended for improving relevancy of reporting.
fetch-depth: 0
# Triggering SonarQube analysis as results of it are required by Quality Gate check.
- name: SonarQube Server Scan
uses: sonarsource/sonarqube-scan-action@master
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }}
# Check the Quality Gate status.
- name: SonarQube Server Quality Gate check
id: sonarqube-quality-gate-check
uses: sonarsource/sonarqube-quality-gate-action@master
with:
pollingTimeoutSec: 600
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
SONAR_HOST_URL: ${{ secrets.SONAR_HOST_URL }} #OPTIONAL
# Optionally you can use the output from the Quality Gate in another step.
# The possible outputs of the `quality-gate-status` variable are `PASSED`, `WARN` or `FAILED`.
- name: "Example show SonarQube Server Quality Gate Status value"
run: echo "The Quality Gate status is ${{ steps.sonarqube-quality-gate-check.outputs.quality-gate-status }}"
Make sure to set up pollingTimeoutSec
property in your step, to avoid wasting action minutes per month (see above example). If not provided, the default value of 300s is applied.
When using this action with sonarsource/sonarqube-scan action or with C/C++ code analysis you don't have to provide scanMetadataReportFile
input, otherwise you should alter the location of it.
Typically, report metadata file for different scanners can vary and can be located in:
target/sonar/report-task.txt
for Maven projectsbuild/sonar/report-task.txt
for Gradle projects.sonarqube/out/.sonar/report-task.txt
for .NET projects
Example usage:
- name: SonarQube Server Quality Gate check
uses: sonarsource/sonarqube-quality-gate-action@master
with:
scanMetadataReportFile: target/sonar/report-task.txt
-
SONAR_TOKEN
– Required this is the token used to authenticate access to SonarQube Server. You can read more about security tokens here. You can set theSONAR_TOKEN
environment variable in the "Secrets" settings page of your repository, or you can add them at the level of your GitHub organization (recommended). -
SONAR_HOST_URL
– Optional this tells the scanner where SonarQube Server is hosted, otherwise it will get the one from the scan report. You can set theSONAR_HOST_URL
environment variable in the "Secrets" settings page of your repository, or you can add them at the level of your GitHub organization (recommended). -
SONAR_ROOT_CERT
– Holds an additional root certificate (in PEM format) that is used to validate the SonarQube Server certificate. You can set theSONAR_ROOT_CERT
environment variable in the "Secrets" settings page of your repository, or you can add them at the level of your GitHub organization (recommended).
To provide feedback (requesting a feature or reporting a bug) please post on the SonarSource Community Forum.
Scripts and documentation in this project are released under the LGPLv3 License.