12345678910111213141516171819202122232425262728 |
- sonar.projectKey=carbonlibra
- sonar.projectName=carbonlibra generated by jhipster
- sonar.projectVersion=1.0
- sonar.sources=src/main/
- sonar.host.url=http://localhost:9001
- sonar.tests=src/test/
- sonar.coverage.jacoco.xmlReportPaths=build/reports/jacoco/test/jacocoTestReport.xml
- sonar.java.codeCoveragePlugin=jacoco
- sonar.junit.reportPaths=build/test-results/test, build/test-results/integrationTest
- sonar.sourceEncoding=UTF-8
- sonar.exclusions=src/main/webapp/content/**/*.*, src/main/webapp/i18n/*.js, build/resources/main/static/**/*.*
- sonar.issue.ignore.multicriteria=S3437,S4502,S4684,UndocumentedApi
- # Rule https://rules.sonarsource.com/java/RSPEC-3437 is ignored, as a JPA-managed field cannot be transient
- sonar.issue.ignore.multicriteria.S3437.resourceKey=src/main/java/**/*
- sonar.issue.ignore.multicriteria.S3437.ruleKey=squid:S3437
- # Rule https://rules.sonarsource.com/java/RSPEC-1176 is ignored, as we want to follow "clean code" guidelines and classes, methods and arguments names should be self-explanatory
- sonar.issue.ignore.multicriteria.UndocumentedApi.resourceKey=src/main/java/**/*
- sonar.issue.ignore.multicriteria.UndocumentedApi.ruleKey=squid:UndocumentedApi
- # Rule https://rules.sonarsource.com/java/RSPEC-4502 is ignored, as for JWT tokens we are not subject to CSRF attack
- sonar.issue.ignore.multicriteria.S4502.resourceKey=src/main/java/**/*
- sonar.issue.ignore.multicriteria.S4502.ruleKey=squid:S4502
- # Rule https://rules.sonarsource.com/java/RSPEC-4684
- sonar.issue.ignore.multicriteria.S4684.resourceKey=src/main/java/**/*
- sonar.issue.ignore.multicriteria.S4684.ruleKey=java:S4684
|