Measuring coverage for Unit and Integration tests with Maven, Jenkins, and SonarQube

4 minute read

This blog post provides a very simple example of integrating Maven, Jenkins, and SonarQube, in particular to properly get coverage metrics of integration tests. While the basic integration Maven, Jenkins, and SonarQube was really simple (including code coverage metrics during unit tests, getting the integration data to display in Sonar was more complicated, and required me to piece together this configuration from several posts around the internet.

These tools are very easy to install, and provide the basic framework for serious quality development. Hopefully you will find this information useful.

This tutorial assumes that you have installed and setup the following tools:

  • Maven A Java build management system.
  • Jenkins A continuous integration (CI) system
  • SonarQube A software quality mangement system.   

If you want some pointers on getting these tools setup, you can find plenty of resources in the web:

Project setup 

We will start looking at the pom.xml, which is most critical part of this tutorial. If you’re familiar with Jenkins a and Sonar, the rest of this tutorial might be redudant for you.

<project xmlns="" xmlns:xsi=""  
    <name>Coverage Maven Application</name>  
        <sonar.jacoco.itReportPath>${env.WORKSPACE}/target/jacoco-integration.exec</sonar.jacoco.itReportPath> <!-- 1 -->  
                    <propertyName>jacoco.agent.argLine</propertyName> <!-- 2 -->  
                    <dataFile>${}/jacoco-integration.exec</dataFile> <!-- 3 -->  
                            <goal>prepare-agent</goal> <!-- 4 -->  
                    <argLine>${jacoco.agent.argLine}</argLine> <!-- 5 -->  
                    <reportsDirectory>${}/surefire-reports</reportsDirectory> <!-- 6 -->                   
                            <goal>verify</goal> <!-- 7 -->  
  1. This property lets sonar know where to find JaCoCo reports for the integration tests. The ${env.WORKSPACE} prefix enables the Sonar plugin to find these files.
  2. The JVM argument required to inject JaCoCo into the integration tests with be stored in a property named jacoco.agent.argLine.
  3. The destFile and dataFile properties indicate where JaCoCo will output its files.
  4. The prepare-agent goal will setup the JVM argument that we will reuse later.
  5. Property will inject the required JVM arguments to enable JaCoCo integration. Since JaCoCo does instrumentation at runtime, building and injecting the proper parameters is all that’s required to get coverage information.
  6. Changing the reportsDirectory property is optional, and will cause the Failsafe plugin to output it’s results to the same directory used by the Surefire plugin. The Surefire plugin executes Unit Tests in Maven, and it’s results are read by SonarQube, and displayed as “Unit test success”. Sending Failsafe’s results to the Surefire report directory will trick Sonar into display the information. If you have a CI server such as Jenkins displaying this information, this “trick” might be superfluous.
  7. The Failsafe plugin will run in the integration-test and verify goals.

Other than the pom.xml, the test project includes to very basic tests, a unit test, and an integration test. Each one covers 50% of the classes in the projects.  You can get the complete source code here. You will find a minimal example from which you can work up.

Setting up a job with Sonar support in Jenkins

There’s several ways of running SonarQube against a project:

  • Using the SonarQube plugin for Jenkins
  • Using the stand alone SonarQube Runner
  • Adding it to your Maven (or Ant) build

In this tutorial we will use the first option.  Personally I prefer to keep the pom as clean as possible, and have Jenkins perform extra steps such as analyzing code quality, deployment into package managers, etc.

Make sure that you install the Jenkins SonarQube plugin:

The SonarQube plugin must be configured with one or Sonar installation.  Most shops will only have one Sonar installation.  This can be done in “Manage Jenkins” -> “Configure System”

In this case, we’re using the defaults, since our SonarQube installation is running on http://localhost:9000, and we’re using the embedded database, so there’s no need to configure any of the database information.

It is also useful to check “Skip if triggered by SCM Changes” and “Skip if triggered by the build of a dependency”, to prevent Sonar running after every commit.  Running Sonar once a night is normally enough for most projects.  This assumes that you have one nightly build scheduled for every project that you want to analyze with SonarQube.

We will then set up a simple Maven job in Jenkins:

We will check this project out of Source Control Management.  I’m going to use SVN to access a directory inside my git repository.  For real projects, I would recommend having a one git repository per each project:

Finally, we just add a “Post-build Action”, to invoke SonarQube.  This will use the configuration for the SonarQube instance we configured before.

Finally you can start a build manually.  This will cause to project to first be built as usual using Maven, and the analyzed by Sonar:

The results

After the build is run successfully by Jenkins, you can see the results on your SonarQube installation.  Make sure that you have the “Integration Tests Coverage” widget in your dashboard.  To add it, log into SonarQube, and click on “Configure widgets”.

You can see how Test Coverage for Integration Tests is reported separately, and that there’s a metric for “Overall Coverage”, which joins the coverage for unit tests and integration tests.  If you drill down can see much more detail about your project, so I encourage to click around and see what Sonar has to say about your code.

Source Code

As always the code is available for you to download and play with. Clone it from it from github:

git clone  

The finished code is contained in directory coverage.


This post was put together with tidbits of information from other postings around the net: