Skip to content

CodeNarc analyzes Groovy code for defects, bad practices, inconsistencies, style issues and more.

Notifications You must be signed in to change notification settings

mst-ableton/docker-codenarc

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

docker-codenarc

CodeNarc analyzes Groovy code for defects, bad practices, inconsistencies, style issues and more.

Usage

As an application

docker run --rm -v `pwd`:/ws -u `id -u`:`id -g` edupo/codenarc

By default this docker image will run codenarc checks on /ws directory, mount your current folder in that location to use the image as an application.

Default user is groovy, so is recomended you run the image with you own user to avoid permission issues.

As a container

docker run --rm -v `pwd`:/ws -u `id -u`:`id -g` --entrypoint=/bin/bash -i -t edupo/codenarc

Login into the container overriding the entry point. you can execute codenarc inside as a regular program.

Specifiying ruleset

As described in the documentation you can specify your own ruleset file relative to your workspace in the command using -rulesetfile flag.

docker run --rm -v `pwd`:/ws -u `id -u`:`id -g` edupo/codenarc -rulesetfiles=file:all.groovy

Reference

http://codenarc.sourceforge.net/

About

CodeNarc analyzes Groovy code for defects, bad practices, inconsistencies, style issues and more.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Groovy 92.8%
  • Shell 3.7%
  • Makefile 3.5%