{"id":20428286,"url":"https://github.com/tomasbjerre/violations-command-line","last_synced_at":"2025-04-12T19:23:53.194Z","repository":{"id":57392701,"uuid":"189465593","full_name":"tomasbjerre/violations-command-line","owner":"tomasbjerre","description":"Command line tool that will find report files from static code analysis, present and optionally fail the command.","archived":false,"fork":false,"pushed_at":"2024-10-05T19:32:56.000Z","size":703,"stargazers_count":15,"open_issues_count":0,"forks_count":1,"subscribers_count":1,"default_branch":"master","last_synced_at":"2025-03-26T13:45:32.087Z","etag":null,"topics":["lint","static-code-analysis"],"latest_commit_sha":null,"homepage":"https://www.npmjs.com/package/violations-command-line","language":"Java","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/tomasbjerre.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"github":["tomasbjerre"]}},"created_at":"2019-05-30T18:47:06.000Z","updated_at":"2024-10-05T19:32:59.000Z","dependencies_parsed_at":"2024-03-31T21:27:21.290Z","dependency_job_id":"c5539e91-1e48-42e7-a185-c0c1e23a1948","html_url":"https://github.com/tomasbjerre/violations-command-line","commit_stats":{"total_commits":122,"total_committers":1,"mean_commits":122.0,"dds":0.0,"last_synced_commit":"4f75be3a7b68074e17ac88e17edca9d4b65ba8f0"},"previous_names":[],"tags_count":60,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tomasbjerre%2Fviolations-command-line","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tomasbjerre%2Fviolations-command-line/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tomasbjerre%2Fviolations-command-line/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/tomasbjerre%2Fviolations-command-line/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/tomasbjerre","download_url":"https://codeload.github.com/tomasbjerre/violations-command-line/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248619248,"owners_count":21134379,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["lint","static-code-analysis"],"created_at":"2024-11-15T07:24:59.606Z","updated_at":"2025-04-12T19:23:53.170Z","avatar_url":"https://github.com/tomasbjerre.png","language":"Java","readme":"# Violations Command Line\n\n[![Maven Central](https://maven-badges.herokuapp.com/maven-central/se.bjurr.violations/violations-command-line/badge.svg)](https://maven-badges.herokuapp.com/maven-central/se.bjurr.violations/violations-command-line)\n[![NPM](https://img.shields.io/npm/v/violations-command-line.svg?style=flat-square) ](https://www.npmjs.com/package/violations-command-line)\n[![NPM Downloads](https://img.shields.io/npm/dm/violations-command-line.svg?style=flat)](https://www.npmjs.com/package/violations-command-line)\n[![Docker Pulls](https://badgen.net/docker/pulls/tomasbjerre/violations-command-line?icon=docker\u0026label=pulls)](https://hub.docker.com/r/tomasbjerre/violations-command-line/)\n\nThis is a command line tool that will find report files from static code analysis, present and optionally fail the command. It uses the [Violations Lib](https://github.com/tomasbjerre/violations-lib).\n\n- The runnable can be found in [Maven Central](http://search.maven.org/#search%7Cga%7C1%7Ca%3A%22violations-command-line%22)\n- or [NPM](https://www.npmjs.com/package/violations-command-line).\n- The `Docker` image can be found in [Dockerhub](https://hub.docker.com/r/tomasbjerre/violations-command-line)\n  - Can used like `docker run --mount src=\"$(pwd)\",target=/home/violations-command-line,type=bind tomasbjerre/violations-command-line:a.b.c -v \"FINDBUGS\" src/test/resources/findbugs/ \".*main\\.xml$\" \"Spotbugs\"`.\n  - Or open a shell to have a look `docker run --rm -it --entrypoint sh tomasbjerre/violations-command-line:a.b.c`\n\n| Version           | Java Version |\n| ------------------| ------------ |\n| version \u003c 2.0.0   | 8            |\n| 2.0.0 \u003c= version  | 11           |\n\nRun it with:\n\n```bash\nnpx violations-command-line -s ERROR -mv 0 \\\n -v \"CHECKSTYLE\" \".\" \".*checkstyle/main\\.xml$\" \"Checkstyle\" \\\n -v \"JSLINT\" \".\" \".*jshint/report\\.xml$\" \"JSHint\"\n```\n\nIt can parse results from static code analysis and:\n\n- Report violations in the build log.\n- Export to a normalized JSON format.\n\n```bash\nnpx violations-command-line -vf violations-report.json \\\n -v \"CHECKSTYLE\" \".\" \".*checkstyle/main\\.xml$\" \"Checkstyle\"\n```\n\n- Export to CodeClimate JSON.\n\n```bash\nnpx violations-command-line -cc code-climate-report.json \\\n -v \"CHECKSTYLE\" \".\" \".*checkstyle/main\\.xml$\" \"Checkstyle\"\n```\n\n- Export to Sarif JSON.\n\n```bash\nnpx violations-command-line -sa sarif-report.json \\\n -v \"CHECKSTYLE\" \".\" \".*checkstyle/main\\.xml$\" \"Checkstyle\"\n```\n\n- Optionally fail the build depending on violations found.\n\nA snippet of the output may look like this:\n\n```\n...\nse/bjurr/violations/lib/example/OtherClass.java\n╔══════════╤════════════╤══════════╤══════╤════════════════════════════════════════════════════╗\n║ Reporter │ Rule       │ Severity │ Line │ Message                                            ║\n╠══════════╪════════════╪══════════╪══════╪════════════════════════════════════════════════════╣\n║ Findbugs │ MS_SHOULD_ │ INFO     │ 7    │ Field isn't final but should be                    ║\n║          │ BE_FINAL   │          │      │                                                    ║\n║          │            │          │      │                                                    ║\n║          │            │          │      │    \u003cp\u003e                                             ║\n║          │            │          │      │ This static field public but not final, and        ║\n║          │            │          │      │ could be changed by malicious code or              ║\n║          │            │          │      │         by accident from another package.          ║\n║          │            │          │      │         The field could be made final to avoid     ║\n║          │            │          │      │         this vulnerability.\u003c/p\u003e                    ║\n╟──────────┼────────────┼──────────┼──────┼────────────────────────────────────────────────────╢\n║ Findbugs │ NM_FIELD_N │ INFO     │ 6    │ Field names should start with a lower case letter  ║\n║          │ AMING_CONV │          │      │                                                    ║\n║          │ ENTION     │          │      │                                                    ║\n║          │            │          │      │   \u003cp\u003e                                              ║\n║          │            │          │      │ Names of fields that are not final should be in mi ║\n║          │            │          │      │ xed case with a lowercase first letter and the fir ║\n║          │            │          │      │ st letters of subsequent words capitalized.        ║\n║          │            │          │      │ \u003c/p\u003e                                               ║\n╚══════════╧════════════╧══════════╧══════╧════════════════════════════════════════════════════╝\n\nSummary of se/bjurr/violations/lib/example/OtherClass.java\n╔══════════╤══════╤══════╤═══════╤═══════╗\n║ Reporter │ INFO │ WARN │ ERROR │ Total ║\n╠══════════╪══════╪══════╪═══════╪═══════╣\n║ Findbugs │ 2    │ 0    │ 0     │ 2     ║\n╟──────────┼──────┼──────┼───────┼───────╢\n║          │ 2    │ 0    │ 0     │ 2     ║\n╚══════════╧══════╧══════╧═══════╧═══════╝\n\n\nSummary\n╔════════════╤══════╤══════╤═══════╤═══════╗\n║ Reporter   │ INFO │ WARN │ ERROR │ Total ║\n╠════════════╪══════╪══════╪═══════╪═══════╣\n║ Checkstyle │ 4    │ 1    │ 1     │ 6     ║\n╟────────────┼──────┼──────┼───────┼───────╢\n║ Findbugs   │ 2    │ 2    │ 5     │ 9     ║\n╟────────────┼──────┼──────┼───────┼───────╢\n║            │ 6    │ 3    │ 6     │ 15    ║\n╚════════════╧══════╧══════╧═══════╧═══════╝\n```\n\n## GitHub\n\nGitHub is supported via `SARIF`. This tool can export `SARIF` format and it can be uploaded to Github to get feedback in pull-requests.\n\n```yml\nname: My workflow\n\non: [workflow_call, push, pull_request]\n\njobs:\n  build:\n    permissions:\n      security-events: write\n      actions: read\n      contents: read\n    steps:\n      - name: Build\n        run: |\n          your-build-command-here\n      - name: Transorm static code analysis to SARIF\n        if: success() || failure()\n        run: |\n          npx violations-command-line -sarif sarif-report.json \\\n          -v \"FINDBUGS\" \".\" \".*spotbugs/main\\.xml$\" \"Spotbugs\" \\\n          -v \"CHECKSTYLE\" \".\" \".*checkstyle/main\\.xml$\" \"Checkstyle\" \\\n          -v \"PMD\" \".\" \".*pmd/main\\.xml$\" \"PMD\" \\\n          -v \"JUNIT\" \".\" \".*test/TEST-.*\\.xml$\" \"JUNIT\"\n      - uses: github/codeql-action/upload-sarif@v3\n        if: success() || failure()\n        with:\n          sarif_file: sarif-report.json\n          category: violations-lib\n```\n\n## GitLab\n\nGitLab is supported via `CodeClimate`. This tool can export `CodeClimate` format and it can be uploaded to GitLab to get feedback in pull-requests.\n\nIf you export `CodeClimate` like this:\n\n```sh\nnpx violations-command-line -cc code-climate-report.json \\\n  -v \"FINDBUGS\" \".\" \".*spotbugs/main\\.xml$\" \"Spotbugs\" \\\n  -v \"CHECKSTYLE\" \".\" \".*checkstyle/main\\.xml$\" \"Checkstyle\" \\\n  -v \"PMD\" \".\" \".*pmd/main\\.xml$\" \"PMD\" \\\n  -v \"JUNIT\" \".\" \".*test/TEST-.*\\.xml$\" \"JUNIT\"\n```\n\nYou can upload it like this:\n\n```yml\n  artifacts:\n    paths:\n      - code-climate-report.json\n    reports:\n      codequality: code-climate-report.json\n```\n\n## Formats\n\n\nExample of supported reports are available [here](https://github.com/tomasbjerre/violations-lib/tree/master/src/test/resources).\n\nA number of **parsers** have been implemented. Some **parsers** can parse output from several **reporters**.\n\n| Reporter | Parser | Notes\n| --- | --- | ---\n| [_ARM-GCC_](https://developer.arm.com/open-source/gnu-toolchain/gnu-rm)               | `CLANG`              | \n| [_AndroidLint_](http://developer.android.com/tools/help/lint.html)                    | `ANDROIDLINT`        | \n| [_Ansible-Later_](https://github.com/thegeeklab/ansible-later)                        | `ANSIBLELATER`       | With `json` format\n| [_AnsibleLint_](https://github.com/willthames/ansible-lint)                           | `FLAKE8`             | With `-p`\n| [_Bandit_](https://github.com/PyCQA/bandit)                                           | `CLANG`              | With `bandit -r examples/ -f custom -o bandit.out --msg-template \"{abspath}:{line}: {severity}: {test_id}: {msg}\"`\n| [_CLang_](https://clang-analyzer.llvm.org/)                                           | `CLANG`              | \n| [_CPD_](http://pmd.sourceforge.net/pmd-4.3.0/cpd.html)                                | `CPD`                | \n| [_CPPCheck_](http://cppcheck.sourceforge.net/)                                        | `CPPCHECK`           | With `cppcheck test.cpp --output-file=cppcheck.xml --xml`\n| [_CPPLint_](https://github.com/theandrewdavis/cpplint)                                | `CPPLINT`            | \n| [_CSSLint_](https://github.com/CSSLint/csslint)                                       | `CSSLINT`            | \n| [_Checkstyle_](http://checkstyle.sourceforge.net/)                                    | `CHECKSTYLE`         | \n| [_CloudFormation Linter_](https://github.com/aws-cloudformation/cfn-lint)             | `JUNIT`              | `cfn-lint . -f junit --output-file report-junit.xml`\n| [_CodeClimate_](https://codeclimate.com/)                                             | `CODECLIMATE`        | \n| [_CodeNarc_](http://codenarc.sourceforge.net/)                                        | `CODENARC`           | \n| [_Coverity_](https://scan.coverity.com/)                                              | `COVERITY`           | \n| [_Dart_](https://dart.dev/)                                                           | `MACHINE`            | With `dart analyze --format=machine`\n| [_Dependency Check_](https://jeremylong.github.io/DependencyCheck/)                   | `SARIF`              | Using `--format SARIF`\n| [_Detekt_](https://github.com/arturbosch/detekt)                                      | `CHECKSTYLE`         | With `--output-format xml`.\n| [_DocFX_](http://dotnet.github.io/docfx/)                                             | `DOCFX`              | \n| [_Doxygen_](https://www.stack.nl/~dimitri/doxygen/)                                   | `CLANG`              | \n| [_ERB_](https://www.puppetcookbook.com/posts/erb-template-validation.html)            | `CLANG`              | With `erb -P -x -T '-' \"${it}\" \\| ruby -c 2\u003e\u00261 \u003e/dev/null \\| grep '^-' \\| sed -E 's/^-([a-zA-Z0-9:]+)/${filename}\\1 ERROR:/p' \u003e erbfiles.out`.\n| [_ESLint_](https://github.com/sindresorhus/grunt-eslint)                              | `CHECKSTYLE`         | With `format: 'checkstyle'`.\n| [_Findbugs_](http://findbugs.sourceforge.net/)                                        | `FINDBUGS`           | \n| [_Flake8_](http://flake8.readthedocs.org/en/latest/)                                  | `FLAKE8`             | \n| [_FxCop_](https://en.wikipedia.org/wiki/FxCop)                                        | `FXCOP`              | \n| [_GCC_](https://gcc.gnu.org/)                                                         | `CLANG`              | \n| [_GHS_](https://www.ghs.com/)                                                         | `GHS`                | \n| [_Gendarme_](http://www.mono-project.com/docs/tools+libraries/tools/gendarme/)        | `GENDARME`           | \n| [_Generic reporter_]()                                                                | `GENERIC`            | Will create one single violation with all the content as message.\n| [_GoLint_](https://github.com/golang/lint)                                            | `GOLINT`             | \n| [_GoVet_](https://golang.org/cmd/vet/)                                                | `GOLINT`             | Same format as GoLint.\n| [_GolangCI-Lint_](https://github.com/golangci/golangci-lint/)                         | `CHECKSTYLE`         | With `--out-format=checkstyle`.\n| [_GoogleErrorProne_](https://github.com/google/error-prone)                           | `GOOGLEERRORPRONE`   | \n| [_HadoLint_](https://github.com/hadolint/hadolint/)                                   | `CHECKSTYLE`         | With `-f checkstyle`\n| [_IAR_](https://www.iar.com/iar-embedded-workbench/)                                  | `IAR`                | With `--no_wrap_diagnostics`\n| [_Infer_](http://fbinfer.com/)                                                        | `PMD`                | Facebook Infer. With `--pmd-xml`.\n| [_JACOCO_](https://www.jacoco.org/)                                                   | `JACOCO`             | \n| [_JCReport_](https://github.com/jCoderZ/fawkez/wiki/JcReport)                         | `JCREPORT`           | \n| [_JSHint_](http://jshint.com/)                                                        | `JSLINT`             | With `--reporter=jslint` or the CHECKSTYLE parser with `--reporter=checkstyle`\n| [_JUnit_](https://junit.org/junit4/)                                                  | `JUNIT`              | It only contains the failures.\n| [_KTLint_](https://github.com/shyiko/ktlint)                                          | `CHECKSTYLE`         | \n| [_Klocwork_](http://www.klocwork.com/products-services/klocwork/static-code-analysis)  | `KLOCWORK`           | \n| [_KotlinGradle_](https://github.com/JetBrains/kotlin)                                 | `KOTLINGRADLE`       | Output from Kotlin Gradle Plugin.\n| [_KotlinMaven_](https://github.com/JetBrains/kotlin)                                  | `KOTLINMAVEN`        | Output from Kotlin Maven Plugin.\n| [_Lint_]()                                                                            | `LINT`               | A common XML format, used by different linters.\n| [_MSBuildLog_](https://docs.microsoft.com/en-us/visualstudio/msbuild/obtaining-build-logs-with-msbuild?view=vs-2019)  | `MSBULDLOG`          | With `-fileLogger` use `.*msbuild\\\\.log$` as pattern or `-fl -flp:logfile=MyProjectOutput.log;verbosity=diagnostic` for a custom output filename\n| [_MSCpp_](https://visualstudio.microsoft.com/vs/features/cplusplus/)                  | `MSCPP`              | \n| [_Mccabe_](https://pypi.python.org/pypi/mccabe)                                       | `FLAKE8`             | \n| [_MyPy_](https://pypi.python.org/pypi/mypy-lang)                                      | `MYPY`               | \n| [_NullAway_](https://github.com/uber/NullAway)                                        | `GOOGLEERRORPRONE`   | Same format as Google Error Prone.\n| [_PCLint_](http://www.gimpel.com/html/pcl.htm)                                        | `PCLINT`             | PC-Lint using the same output format as the Jenkins warnings plugin, [_details here_](https://wiki.jenkins.io/display/JENKINS/PcLint+options)\n| [_PHPCS_](https://github.com/squizlabs/PHP_CodeSniffer)                               | `CHECKSTYLE`         | With `phpcs api.php --report=checkstyle`.\n| [_PHPPMD_](https://phpmd.org/)                                                        | `PMD`                | With `phpmd api.php xml ruleset.xml`.\n| [_PMD_](https://pmd.github.io/)                                                       | `PMD`                | \n| [_Pep8_](https://github.com/PyCQA/pycodestyle)                                        | `FLAKE8`             | \n| [_PerlCritic_](https://github.com/Perl-Critic)                                        | `PERLCRITIC`         | \n| [_PiTest_](http://pitest.org/)                                                        | `PITEST`             | \n| [_ProtoLint_](https://github.com/yoheimuta/protolint)                                 | `PROTOLINT`          | \n| [_Puppet-Lint_](http://puppet-lint.com/)                                              | `CLANG`              | With `-log-format %{fullpath}:%{line}:%{column}: %{kind}: %{message}`\n| [_PyDocStyle_](https://pypi.python.org/pypi/pydocstyle)                               | `PYDOCSTYLE`         | \n| [_PyFlakes_](https://pypi.python.org/pypi/pyflakes)                                   | `FLAKE8`             | \n| [_PyLint_](https://www.pylint.org/)                                                   | `PYLINT`             | With `pylint --output-format=parseable`.\n| [_ReSharper_](https://www.jetbrains.com/resharper/)                                   | `RESHARPER`          | \n| [_RubyCop_](http://rubocop.readthedocs.io/en/latest/formatters/)                      | `CLANG`              | With `rubycop -f clang file.rb`\n| [_SARIF_](https://github.com/oasis-tcs/sarif-spec)                                    | `SARIF`              | v2.x. Microsoft Visual C# can generate it with `ErrorLog=\"BuildErrors.sarif,version=2\"`.\n| [_SbtScalac_](http://www.scala-sbt.org/)                                              | `SBTSCALAC`          | \n| [_Scalastyle_](http://www.scalastyle.org/)                                            | `CHECKSTYLE`         | \n| [_Semgrep_](https://semgrep.dev/)                                                     | `SEMGREP`            | With `--json`.\n| [_Simian_](http://www.harukizaemon.com/simian/)                                       | `SIMIAN`             | \n| [_Sonar_](https://www.sonarqube.org/)                                                 | `SONAR`              | With `mvn sonar:sonar -Dsonar.analysis.mode=preview -Dsonar.report.export.path=sonar-report.json`. Removed in 7.7, see [SONAR-11670](https://jira.sonarsource.com/browse/SONAR-11670) but can be retrieved with: `curl --silent 'http://sonar-server/api/issues/search?componentKeys=unique-key\u0026resolved=false' \\| jq -f sonar-report-builder.jq \u003e sonar-report.json`.\n| [_Spotbugs_](https://spotbugs.github.io/)                                             | `FINDBUGS`           | \n| [_StyleCop_](https://stylecop.codeplex.com/)                                          | `STYLECOP`           | \n| [_SwiftLint_](https://github.com/realm/SwiftLint)                                     | `CHECKSTYLE`         | With `--reporter checkstyle`.\n| [_TSLint_](https://palantir.github.io/tslint/usage/cli/)                              | `CHECKSTYLE`         | With `-t checkstyle`\n| [_Valgrind_](https://valgrind.org/)                                                   | `VALGRIND`           | With `--xml=yes`.\n| [_XMLLint_](http://xmlsoft.org/xmllint.html)                                          | `XMLLINT`            | \n| [_XUnit_](https://xunit.net/)                                                         | `XUNIT`              | It only contains the failures.\n| [_YAMLLint_](https://yamllint.readthedocs.io/en/stable/index.html)                    | `YAMLLINT`           | With `-f parsable`\n| [_ZPTLint_](https://pypi.python.org/pypi/zptlint)                                     | `ZPTLINT`            |\n\n52 parsers and 79 reporters.\n\nMissing a format? Open an issue [here](https://github.com/tomasbjerre/violations-lib/issues)!\n\n# Usage\n\n```shell\nAvailable parsers are:\nANDROIDLINT, ANSIBLELATER, CHECKSTYLE, CODENARC, CLANG, COVERITY, CPD, CPPCHECK, CPPLINT, CSSLINT, GENERIC, GHS, FINDBUGS, FLAKE8, MACHINE, FXCOP, GENDARME, IAR, JACOCO, JCREPORT, JSLINT, JUNIT, LINT, KLOCWORK, KOTLINMAVEN, KOTLINGRADLE, MSCPP, MSBULDLOG, MYPY, GOLINT, GOOGLEERRORPRONE, PERLCRITIC, PITEST, PMD, PROTOLINT, PYDOCSTYLE, PYLINT, RESHARPER, SARIF, SBTSCALAC, SEMGREP, SIMIAN, SONAR, STYLECOP, XMLLINT, YAMLLINT, ZPTLINT, DOCFX, PCLINT, CODECLIMATE, XUNIT, VALGRIND\n\nUsage: violations-command-line [-dpv] [--help] [-pv] [-show-debug-info]\n                               [-show-json-config] [-cc=\u003ccodeClimateFileArg\u003e]\n                               [-cf=\u003cconfigFileArg\u003e] [-ddl=\u003cdiffDetailLevel\u003e]\n                               [-df=\u003cdiffFrom\u003e] [-dl=\u003cdetailLevelArg\u003e]\n                               [-dmv=\u003cdiffMaxViolations\u003e]\n                               [-ds=\u003cdiffMinSeverity\u003e] [-dt=\u003cdiffTo\u003e]\n                               [-gr=\u003cgitRepoArg\u003e] [-jmc=\u003cjacocoMinCoverage\u003e]\n                               [-jmlc=\u003cjacocoMinLineCount\u003e]\n                               [-mlcw=\u003cmaxLineColumnWidth\u003e]\n                               [-mmcw=\u003cmaxMessageColumnWidth\u003e]\n                               [-mrcw=\u003cmaxReporterColumnWidth\u003e]\n                               [-mrucw=\u003cmaxRuleColumnWidth\u003e]\n                               [-mscw=\u003cmaxSeverityColumnWidth\u003e]\n                               [-mv=\u003cmaxViolationsArg\u003e] [-s=\u003cminSeverityArg\u003e]\n                               [-ss=\u003csarifFileArg\u003e] [-vf=\u003cviolationsFileArg\u003e]\n                               [-v=\u003cviolationsArg\u003e]...\n      -cc, -code-climate=\u003ccodeClimateFileArg\u003e\n                          Create a CodeClimate file with all the violations.\n      -cf, -config-file=\u003cconfigFileArg\u003e\n                          Will read config from given file. Can also be\n                            configured with environment variable\n                            VIOLATIONS_CONFIG. Format is what you get from\n                            -show-json-config.\n      -ddl, -diff-detail-level=\u003cdiffDetailLevel\u003e\n                          VERBOSE, COMPACT, PER_FILE_COMPACT\n      -df, -diff-from=\u003cdiffFrom\u003e\n                          Can be empty (ignored), Git-commit or any\n                            Git-reference\n      -dl, -detail-level=\u003cdetailLevelArg\u003e\n                          Verbosity VERBOSE, COMPACT, PER_FILE_COMPACT\n      -dmv, -diff-max-violations=\u003cdiffMaxViolations\u003e\n                          Will fail the build if total number of found\n                            violations is higher\n      -dpv, -diff-print-violations\n                          Will print violations found in diff\n      -ds, -diff-severity=\u003cdiffMinSeverity\u003e\n                          INFO, WARN, ERROR\n      -dt, -diff-to=\u003cdiffTo\u003e\n                          Can be empty (ignored), Git-commit or any\n                            Git-reference\n      -gr, -git-repo=\u003cgitRepoArg\u003e\n                          Where to look for Git.\n      --help              display this help and exit\n      -jmc, -jacoco-min-coverage=\u003cjacocoMinCoverage\u003e\n                          Minimum coverage in Jacoco that will generate a\n                            violation.\n      -jmlc, -jacoco-min-line-count=\u003cjacocoMinLineCount\u003e\n                          Minimum line count in Jacoco that will generate a\n                            violation.\n      -mlcw, -max-line-column-width=\u003cmaxLineColumnWidth\u003e\n                          0 means no limit\n      -mmcw, -max-message-column-width=\u003cmaxMessageColumnWidth\u003e\n                          0 means no limit\n      -mrcw, -max-reporter-column-width=\u003cmaxReporterColumnWidth\u003e\n                          0 means no limit\n      -mrucw, -max-rule-column-width=\u003cmaxRuleColumnWidth\u003e\n                          0 means no limit\n      -mscw, -max-severity-column-width=\u003cmaxSeverityColumnWidth\u003e\n                          0 means no limit\n      -mv, -max-violations=\u003cmaxViolationsArg\u003e\n                          Will fail the build if total number of found\n                            violations is higher.\n      -pv, -print-violations\n                          Will print violations found\n  -s, -severity=\u003cminSeverityArg\u003e\n                          Minimum severity level to report. INFO, WARN, ERROR\n      -show-debug-info    Please run your command with this parameter and\n                            supply output when reporting bugs.\n      -show-json-config   Will print the given config as JSON.\n      -ss, -sarif=\u003csarifFileArg\u003e\n                          Create a Sarif file with all the violations.\n  -v, --violations=\u003cviolationsArg\u003e\n                          Format: \u003cPARSER\u003e \u003cFOLDER\u003e \u003cREGEXP PATTERN\u003e \u003cNAME\u003e,\n                            Example: -v \"JSLINT\" \".\" \".*/jshint.xml$\" \"JSHint\"\n      -vf, -violations-file=\u003cviolationsFileArg\u003e\n                          Create a JSON file with all the violations.\n```\n\nCheckout the [Violations Lib](https://github.com/tomasbjerre/violations-lib) for more documentation.\n","funding_links":["https://github.com/sponsors/tomasbjerre"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftomasbjerre%2Fviolations-command-line","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ftomasbjerre%2Fviolations-command-line","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ftomasbjerre%2Fviolations-command-line/lists"}