{"id":25308697,"url":"https://github.com/baloise-incubator/codeql2sonar-maven-plugin","last_synced_at":"2025-09-18T08:46:31.884Z","repository":{"id":37719141,"uuid":"347698006","full_name":"baloise-incubator/codeql2sonar-maven-plugin","owner":"baloise-incubator","description":"Maven plugin parsing SARIF files created by CodeQL used for SonarQube issueReporter.","archived":false,"fork":false,"pushed_at":"2025-02-12T22:35:21.000Z","size":207,"stargazers_count":1,"open_issues_count":0,"forks_count":1,"subscribers_count":4,"default_branch":"main","last_synced_at":"2025-02-12T23:25:21.814Z","etag":null,"topics":["codeql","sarif","sonar","sonarqube"],"latest_commit_sha":null,"homepage":"","language":"Java","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/baloise-incubator.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":"docs/CODEOWNERS","security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2021-03-14T17:00:38.000Z","updated_at":"2025-02-12T22:35:24.000Z","dependencies_parsed_at":"2023-09-26T23:10:44.408Z","dependency_job_id":"76fa3170-a7e2-4205-a953-a4d0fb2e836f","html_url":"https://github.com/baloise-incubator/codeql2sonar-maven-plugin","commit_stats":null,"previous_names":[],"tags_count":9,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/baloise-incubator%2Fcodeql2sonar-maven-plugin","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/baloise-incubator%2Fcodeql2sonar-maven-plugin/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/baloise-incubator%2Fcodeql2sonar-maven-plugin/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/baloise-incubator%2Fcodeql2sonar-maven-plugin/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/baloise-incubator","download_url":"https://codeload.github.com/baloise-incubator/codeql2sonar-maven-plugin/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":238656349,"owners_count":19508802,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["codeql","sarif","sonar","sonarqube"],"created_at":"2025-02-13T12:34:51.489Z","updated_at":"2025-09-18T08:46:31.858Z","avatar_url":"https://github.com/baloise-incubator.png","language":"Java","readme":"[![CI](https://github.com/baloise-incubator/codeql2sonar-maven-plugin/actions/workflows/ci.yml/badge.svg)](https://github.com/baloise-incubator/codeql2sonar-maven-plugin/actions/workflows/ci.yml)\n[![CodeQL](https://github.com/baloise-incubator/codeql2sonar-maven-plugin/actions/workflows/codeql-analysis.yml/badge.svg)](https://github.com/baloise-incubator/codeql2sonar-maven-plugin/actions/workflows/codeql-analysis.yml)\n[![Quality Gate Status](https://sonarcloud.io/api/project_badges/measure?project=baloise-incubator_codeql2sonar-maven-plugin\u0026metric=alert_status)](https://sonarcloud.io/dashboard?id=baloise-incubator_codeql2sonar-maven-plugin)\n\n# codeql2sonar-maven-plugin\nIt is a Maven Plugin parsing SARIF files which were created by conducted CodeQL scan. The parsed result is provided to\nSonarqube via SonarIssueReporter thus issue are displayed on Sonar's project dashboard.\n\n## Prerequisit\nIn order to use this plugin properly, your JAVA project needs to be configured in Sonar already and connected using \n___org.sonarsource.scanner.maven:sonar-maven-plugin___\n\n## How to use\nadd the following plugin to your pom.xml\n```XML\n\u003cplugin\u003e\n  \u003cgroupId\u003ecom.baloise.open\u003c/groupId\u003e\n  \u003cartifactId\u003ecodeql2sonar-maven-plugin\u003c/artifactId\u003e\n  \u003cversion\u003e0.1.7\u003c/version\u003e\n\u003c/plugin\u003e\n```\n\nRun to execute ```mvn codeql2sonar:SonarIssueReporter```\n\n## How to configure\n### Mandatory properties\n- __codeql2sonar.sarif.inputfile__: specifies the SARIF file created by CodeQL scan\n\n### Optional properties\n- __codeql2sonar.sarif.outputfile__: location where to write the parsed result.\n  \u003cbr/\u003e_Default: target/sonar/codeql2sonar.json_\n- __codeql2sonar.sarif.ignoreTests__: if set to true, resources containing '/test/' in artifact location \n  are not reported to Sonar.\u003cbr/\u003e_Default: false_\n- __codeql2sonar.sarif.path.excludes__: Array of artifact locations to be excluded from result.\n  Regex-patterns can be used here according to pattern ```.*\u003ccodeql2sonar.sarif.path.excludes.value\u003e.*``` \n  while patterns are compiled case-insensitive.\n  \u003cbr/\u003eExample:\n  ```xml\n  \u003ccodeql2sonar.sarif.path.excludes\u003e\n    \u003cparam\u003evalue1\u003c/param\u003e\n    \u003cparam\u003evalue2\u003c/param\u003e\n  \u003c/codeql2sonar.sarif.path.excludes\u003e\n  ```\n  When using on command line with __-Dcodeql2sonar.sarif.path.exclude=__ the paths can be separated by comma, e.g.\n  ```\n  -Dcodeql2sonar.sarif.path.excludes=path/subdir1,path/subdir2/\n  ```\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbaloise-incubator%2Fcodeql2sonar-maven-plugin","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fbaloise-incubator%2Fcodeql2sonar-maven-plugin","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbaloise-incubator%2Fcodeql2sonar-maven-plugin/lists"}