A certificate is required to connect my SonarQube server. I have installed the SonarLint plugin, but it does not have any option to add certificates to connect my SonarQube server. It has only URL, username , password options. Is there any way to set certificates ?
相关问题
- Sonarqube: Squid Rules customization/suppression
- 2 instances of Sonar on same machine
- CA0001: Object reference not set to an instance of
- Gallio error : MSTest executable was not found
- Using Sonar MSBuild Runner with /p:IsPackaging=Tru
相关文章
- SonarQube: How to suppress a warning in Kotlin cod
- @Nullable and SonarQube 'Conditionally execute
- Property 'sonar.jacoco.reportPath' is depr
- This version of OSX is not able to perform the nec
- Please provide compiled classes of your project wi
- Execute sonar-runner in TFS build
- sonar-maven-plugin 5.1.1 not found
- Why sonar-maven-plugin-3.0.1.jar cannot be found w
SonarLint does not permit the configuration of certificates, but you can add certificate to JRE or JDK.
https://docs.oracle.com/javase/tutorial/security/toolsign/rstep2.html
Copied text from Oracle documentation:
Import the Certificate as a Trusted Certificate
Before you can grant the signed code permission to read a specified file, you need to import Susan's certificate as a trusted certificate in your keystore.
Suppose that you have received from Susan
sCount.jar
, which contains theCount.class
file, andExample.cer
, which contains the public key certificate for the public key corresponding to the private key used to sign the JAR file.Even though you created these files and they haven't actually been transported anywhere, you can simulate being someone other than the creater and sender, Susan. Pretend that you are now Ray. Acting as Ray, you will create a keystore named
exampleraystore
and will use it to import the certificate into an entry with an alias ofsusan
.A keystore is created whenever you use a
keytool
command specifying a keystore that doesn't yet exist. Thus we can create theexampleraystore
and import the certificate via a singlekeytool
command. Do the following in your command window.Example.cer
. (You should actually already be there, since this lesson assumes that you stay in a single directory throughout.)Since the keystore doesn't yet exist, it will be created, and you will be prompted for a keystore password; type whatever password you want.
The
keytool
command will print out the certificate information and ask you to verify it, for example, by comparing the displayed certificate fingerprints with those obtained from another (trusted) source of information. (Each fingerprint is a relatively short number that uniquely and reliably identifies the certificate.) For example, in the real world you might call up Susan and ask her what the fingerprints should be. She can get the fingerprints of theExample.cer
file she created by executing the commandIf the fingerprints she sees are the same as the ones reported to you by
keytool
, the certificate has not been modified in transit. In that case you letkeytool
proceed with placing a trusted certificate entry in the keystore. The entry contains the public key certificate data from the fileExample.cer
and is assigned the aliassusan
.