Code analysis enforcement
- Updated: 2024/07/30
Code analysis enforcement
As an administrator, you can enforce code analysis when developers check in automation files to the public workspace. You can restrict the RPA developers or Citizen Developers from checking in automations that contain code analysis violations based on permissions assigned to them in their custom role.
- Policies applied to folders
- Permissions allocated to users in their custom roles
Code analysis enforcement permissions
The following code analysis enforcement permissions are available:
- Enable enforcement for bot check-in: A default permission for all roles which allows the user to check in the automation file if it has no code analysis violations.
- Allow check-in with low severity violations: This optional permission allows the user to check in the automation file if it has low severity code analysis violations.
- Allow check-in with high severity violations: This optional permission allows the user to check in the automation file if it has high severity code analysis violations.
Use different roles and permissions to restrict automation file check-in based on the skill level of the developer. For example, you can have policies with low and high severity violations applied to a folder. You might have Citizen Developers who are assigned the permission to check in automation files with both high and low severity violations, whereas the RPA developers might have the permission to check in automation files with no violations or only low severity violations.
You can use different policies on different automation projects and set different rule severity levels for different policies and environments. For example, in the testing environment, you can have policies where all rules are set to high severity, and the RPA developers can only check in automation files with low severity or no violations.
Example
Automation files | Code analysis results |
---|---|
File 1 | 10 rules with high severity violation |
File 2 | 7 rules with high severity violation 20 rules with low severity violation |
File 3 | 10 rules with low severity violation |
User | Role assigned |
---|---|
Alice | Role 1 |
Bob | Role 2 |
Carol | Role 1, Role 2 |
- Users in role 1 can check in automation files with results of high severity violation.
- Users in role 2 can check in automation files with results of low severity violation.
The code analysis enforcement for these users are as follows:
- Alice can check in file 1.
- Bob can check in file 3.
- Carol can check in file 1, file 2, and file 3.