This plugin enables user authentication and Single Sign-On via Phabricator.
This was based on the Bitbucket Authentication Plugin for SonarQube.
- Install the plugin into the SONARQUBE_HOME/extensions/plugins directory
- Restart the SonarQube server
- In Phabricator, create an OAuth application :
- Set "phabricator.show-prototypes" to true
- Go to "More Applications" -> "Administration" -> "OAuth Server" -> "Create OAuth Server"
- Name: Something like "SonarQube"
- Redirect URI: SonarQube_URL/oauth2/callback/phabricator
- In SonarQube :
- Go to "Administration" -> "Configuration" -> "General Settings" -> "Security" -> "Phabricator"
- Set the "Enabled" property to true
- Set the "OAuth Application Client PHID" from the value provided by the Phabricator OAuth Application Client PHID
- Set the "OAuth Application Secret" from the value provided by the Phabricator OAuth Application Secret
- Set the "Phabricator Host" to the URL of your Phabricator server
- Go to the login form, a new button "Log in with Phabricator" allow users to connect to SonarQube with their Phabricator accounts.
Note: Only HTTPS is supported
- SonarQube must be publicly accessible through HTTPS only
- The property 'sonar.core.serverBaseURL' must be set to this public HTTPS URL
Property | Description | Default value |
---|---|---|
sonar.auth.phabricator.allowUsersToSignUp | Allow new users to authenticate. When set to 'false', only existing users will be able to authenticate to the server | true |
sonar.auth.phabricator.clientId.secured | Client PHID provided by Phabricator when registering the application | None |
sonar.auth.phabricator.clientSecret.secured | Application Secret provided by Phabricator when registering the application | None |
sonar.auth.phabricator.enabled | Enable Phabricator users to login. Value is ignored if Client PHID and Application are not defined | false |
sonar.auth.phabricator.hostUrl | Phabricator server URL | https://secure.phabricator.com |
This project is licensed under the terms of the MIT license.