QSM for Mendix customers using the Teamserver
This documentation covers cloud-based Sigrid. For on-premise Sigrid, refer to the section about on-premise analysis configuration.
This document describes onboarding of Mendix apps to Sigrid for customers that are using the central Mendix Teamserver.
please note: When the customer is not using the teamserver but they are in a “Bring Your Own Git” scenario then the below does not apply. Then please refer to Mendix for GitHub or Mendix for Gitlab
Default: Onboarding via the dedicated Mendix support app
Onboarding a new Mendix app into Sigrid is easy via the Mendix app addon.mendix.com. After successfull onboarding an email is sent to the user requesting the onboarding. When onboarding a new app the mainline will be selected by default. You can select a different branch to be scanned. In this way you could onboard both the Mainline and a Development branch from the same Mendix app in Sigrid. After the onboarding Sigrid QSM will provide a daily scan for maintainability, OSH and security. AQM customers will only see maintainability results.
Scripted: Onboarding via a POST command to the Sigrid API
In some cases customers would like to take onboarding of teamserver based apps into their own hands. Examples can be automated onboarding or the need to specify a specific branch. In those cases customers can use the Sigrid API to onboard a Mendix app to Sigrid.
API details
In order to onboard an app use the below post command where {customer} is your customer name. Check the url of sigrid-says.com/customer/ if you are not sure.
POST https://sigrid-says.com/rest/inboundresults/qsm/{customer}
Token
Note that this endpoint requires a Sigrid CI Authentication token that is valid for {customer}.
Headers
- 'Authorization: Bearer YOUR_TOKEN'
- `Content-Type: application/json` ##### Body
{
"userName": "[email address]", // to be used to send email notifications, not relevant for authentication in case of PAT
"mendixToken": "[use a Mendix PAT with model read only rights]", // You can also update an expired Mendix PAT via the same POST, simply rerun with the new mendixToken
"appId": "[a UUID]",
"appName": "[the app name]",
"teamServerBranch": "[the name of a specific branch]" // leave empty or omit alltogether to use mainline
}
Example request
curl --header 'Authorization: Bearer YOUR_TOKEN' -X POST https://sigrid-says.com/rest/inboundresults/qsm/CUSTOMER -H 'Content-Type: application/json' -d '{ "appId" : "01234567-89ab-cdef-0123-456789abcdef", "appName" : "mendixsystemname", "userName" : "user@sig.eu", "mendixToken" : "123456-abcdef", "teamServerBranch" : "some_branch" }'
This request will return the following response:
{
"customerName": "customer",
"systemName": "mendixsystemname-branch-some-branch"
}
Note that the Sigrid system name is a concatenation of the Mendix app name, the word branch
and the branch name, with unsupported characters replaced or removed. In case of omitting the teamServerBranch
or leaving it empty, the system name would be mendixsystemname
.
On-demand QSM scan for a system
This is useful when a customer would like to do an on-demand trigger in addition to the daily scan. The trigger could be a step in a CICD pipeline or a trigger from a developer who is interested in a scan for the updates in mainline or branch. There will be no email, the scan will simply overwrite the previous results in Sigrid.
API details
In order to trigger an on-demand scan for an app use the below post command where {customer} is your customer name and {system} your system name. Check the url of Sigrid-says.com/customer/system if you are not sure.
POST https://sigrid-says.com/rest/inboundresults/qsm/{customer}/{system}
Token
Note that this endpoint requires a Sigrid CI Authentication token that is valid for {customer}.
Headers
- 'Authorization: Bearer YOUR_TOKEN' ##### Body Should remain empty
Example request
curl --header 'Authorization: Bearer YOUR_TOKEN' -X POST https://sigrid-says.com/rest/inboundresults/qsm/CUSTOMER/SYSTEM
Combining both the Teamserver and a CI pipeline to scan any branch against mainline
We see that some of our customers use the Mendix Team sever to store the Mendix apps and they also use a separate CI pipeline connected the teamserver to do automated ‘pipeline’ tasks. This is called the ‘bring your own pipeline’ scenario. Some of these customers would like to scan any branch in QSM and not only scan the default mainline.
In those cases the following hybrid setup will work. The trick of this hybrid set up is that the daily clone of the mainline de facto serves as a SigridCI --publish
step.
- QSM Sigrid-says.com will pull a daily clone from the team server busines as usual. It scans by default the mainline for both maintainability, open source health and security.
- In the CI pipeline the customer only needs to add the SigriCI step to scan any branch against the above ‘published’ mainline for maintainability results.