It is very easy to analyze a C, C++ and Objective-C project with SonarQube on GitLab CI:
-
Create a
sonar-project.properties
file to store your configuration -
In your
.gitlab-ci.yml
file:-
Configure SonarQube server url (e.g.: https://example.com:9000)
-
As part of the
get-sonar-binaries
stage:-
Download the Sonar Scanner
-
Download the Build Wrapper from SonarQube server
-
Push both binaries to cache, so they can be used in next step
-
-
As part of the
build
stage:-
Install cmake package
-
Pull Sonar Scanner and Build Wrapper from cache
-
Wrap your compilation with the Build Wrapper
-
Push Sonar Scanner and build Wrapper output directory to the cache
-
-
As part of the
sonarqube-check
stage:-
Pull build wrapper output and Sonar Scanner from cache
-
Run
sonar-scanner
, specifying:-
the property
sonar.cfamily.compile-commands
with, as its value,bw-output/compile_commands.json
, if you are using SonarQube version 10.6 or later -
the property
sonar.cfamily.build-wrapper-output
, with valuebw-output
, if you are using SonarQube version 10.5 or earlier, as build-wrapper did not generate acompile_commands.json
file before SonarQube 10.6
Noting that
bw-output
is the build wrapper output directory that you pulled from cache. -
-
-
As part of the
sonarqube-vulnerability-report
stage:-
Pull the vulnerability report resulting from the latest scan
-
Make its content available to the GitLab CI via the file gl-sast-sonar-report.json
-
-
-
Make sure that you have your token stored as a CI variable in your project (
SONAR_TOKEN
). You can generate and use new tokens in SonarQube.
You can take a look at the sonar-project.properties and .gitlab-ci.yml to see it in practice. Please be aware that the SonarQube server URL is not completed in this .gitlab-ci.yml example.
A build of the code repository on a Linux platform using CMake build system.
To build the code run:
mkdir build && cd build cmake .. make
An example of a flawed C++ code. The code repository is meant to be compiled with different build systems using different CI pipelines on Linux, macOS, and Windows.
The code repository is forked into other repositories in this collection to add a specific build system, platform, and CI. The downstream repositories are analyzed either with SonarQube or SonarCloud.
You can find examples for:
Using the following build systems:
Running on the following CI services:
-
Additionally, generic examples demonstrate integration with other CIs and manual-configuration examples should help you if you are running locally.
Configured for analysis on:
You can find also a few examples demonstrating:
See examples-structure.adoc for a description of the structure of this GitHub organization and the relations between its different repositories.