Integrating CodeScan in GitLab
Last updated
Was this helpful?
Last updated
Was this helpful?
Integrating CodeScan into your GitLab pipeline is easy with our SFDX plugin. There are only a few lines to add to your .YML file to run CodeScan when a build is triggered.
First, we'll need to add your CodeScan token as a variable we can access in our .YML file.
Open your project and navigate to Settings > CI/CD
then expand the Variables
section.
Add your token with the name CODESCAN_TOKEN
and check the masked variable box. To learn how to generate a token, see .
You'll be now be able to access this variable by using $CODESCAN_TOKEN in your .YML file.
Add the following into your .YML file:
project
organization
token
server
Enter the CodeScan server URL. The default server URL is https://app.codescan.io
. For EU regions users, the server URL would be https://app-eu.codescan.io
, and for AUS regions, the server URL will be https://app-aus.codescan.io.
branch
Name of your branch.
The pull request details are being set by the following parameters:
sonar.pullrequest.branch:
Name of the branch containing the changes that need to be merged.
sonar.pullrequest.base:
The branch where the pull request will be merged.
sonar.pullrequest.key:
The pull request key or number or id.
By default, the CodeScan SFDX plugin will fail if the Quality Gate fails. If you would prefer that the build passes despite the quality gate, use the
--nofail
tag when callingsfdx codescan:run
.
The script above scans the full branch of the Merge request that triggers the pipeline.
If you want to narrow down results to scanning only files that were changed in this Merge request, there are a couple of additional steps to take.
By adding the following lines to the script, you can generate a comma-separated string of changed files in the Merge request:
Then, the $CHANGED_FILES variable can be passed to the merge request scan command. Like this:
-Dsonar.inclusions=$CHANGED_FILES
Enter your
Enter your
Enter the CodeScan
Note: The above is a great way to get started scanning with this plugin; however, this script will install the with each run. A better implementation would include this installation in the docker image used.
You can find a complete list of flags and examples on our .