This API integration is able to automate the sonarcloud code scan, create assessments based off the code smells, bugs and vulnerabilties found then create child issues linked to the assessment with severities based on the vulnerability severity level assigned by sonarcloud
There are 3 issue types available within SonarCloud:
- Code Smell
Within these issue types there are 4 Security Categories available in SonarCloud:
- OWASP (Open Web Applicatin Security Project)
- SANS (SysAdmin, Audit, Network, and Security)
- CWE (Common Weakness Enumeration)
There are 5 severities available from SonarCloud that are condensed within the RegScale issue creation:
(NOTE: Requires release 4.14.0 or greater.)
This tool is meant to be run as part of automated code checks when the pipeline is run and is not meant to be run separately as a regscale-cli command.
There is 1 piece of information required to use the sonarcloud API integration:
sonarToken- The sonarcloud token assigned in the UI
The first step is to set the values for this variable in the init.yaml file.
You can execute python files using scripts. These scripts could be in Bash, Python, PowerShell, etc. Below is an example Bash file (named "Sonarcloud.sh") in Ubuntu for executing the SonarCloud API integration that runs the automated dependabot vulnerability scan.
#!/bin/sh # Run the automated github dependabot vulnerabilty scan python3 sonarcloud.py
To execute the Bash file, run this command:
Updated 8 months ago