Install Free
Eclipse | Using SonarQube for Eclipse | Rules and languages

Rules and languages

On this page

The Sonar Rules catalog is the entry point where you can discover all the existing rules. While running an analysis, SonarQube for IDE raises an issue every time a piece of code breaks a coding rule. 

Issues in your code are linked to Clean Code code attributes. When an issue is detected, it signifies that this part of your code is not consistent, intentional, adaptable, or responsible enough and that it impacts one or multiple software qualities. 

For more information about Clean Code attributes and software qualities, check out the Clean Code introduction page.

Overview

SonarQube for Eclipse provides analysis for several languages. Support for your language may vary depending on the SonarQube for Eclipse version you're running. 

The table below lists the supported language and language versions. For each language version, the level of support is defined as follows: 

  • Fully supported: The analysis will complete. All the language features are understood and examined.
  • Not supported: The analysis might break, there is no guarantee it will complete.
  • Supported: Everything between fully supported and not supported.

For language-specific properties, refer to the relevant language page in SonarQube Server and SonarQube Cloud directly, as the same Sonar language analyzers are used by SonarQube for IDE.

r Supported out of the box: SonarQube for IDE automatically checks your code in these languages and formats.
a Connected Mode required: Running in Connected Mode with SonarQube (Server, Cloud) unlocks analysis for these languages and formats.

Language
Supported version
Abap rulesa-
Apex rulesa-
C rulesa

C89, C99, C11, C17: fully supported

C23: supported

GNU extensions: supported

See below for additional requirements.

C++ rulesa

C++20, C++23: supported

C++03,  C++11, C++14, C++17: fully supported 

GNU extensions: supported

See below for additional requirements.

COBOL rulesaSee below for additional requirements.
CSS rulesr-
HTML rulesr-
Java rulesr

Java LTS versions 8 to 21, and all intermediate versions: Fully supported. 

See below for additional requirements.

JavaScript rulesrECMAScript 2022 and all previous versions: supported
JCL rulesa-
Kotlin rulesa1.3 to 1.9 supported
PHP rulesr5.x, 7.x, and 8.3: fully supported
PL/I rulesa-
PL/SQL rulesa-
Python rulesr

2.7: supported

3.0 to 3.12: fully supported

RPG rulesa-
Ruby rulesa3.0 to 3.2 supported
Scala rulesa-
Secrets detection rulesr-
T-SQL rulesa-
TypeScript rulesrTypeScript 5.6 and all previous versions: supported
XML rulesr-

The full list of available rules is visible in the Rules Configuration preferences tab found by navigating the UI to Window > Preferences > SonarLint (or Eclipse > Settings… > SonarQube for Mac OS) for access to Rules Configuration. Here you can activate and deactivate rules to match your conventions. SonarLint will also show a code action on each issue to quickly deactivate the corresponding rule.

For more details about languages and new features under consideration for all versions of SonarQube for IDE (including Eclipse), please refer to the SonarQube for IDE roadmap where we list our coming soon and newly released features.

Rule selection

Sonar Rules can individually be turned on or off while running SonarQube for Eclipse in standalone mode; there are two ways to do this:

  • Right-click on the issue and select the Remove rule quick fix in the tooltip.
  • Activate and deactivate rules one by one in the SonarQube Preferences > SonarQube > Rules Configuration menu. A full list of rules organized by language is available.

When your project is bound to SonarQube (Server, Cloud) or SonarQube Community Build using Connected mode, the rule set is managed on the server side as defined by the quality profile. 

Applying rules while in connected mode

Connected mode syncs your SonarQube (Qube, Cloud) or SonarQube Community Build quality profile with the local analysis to suppress issues reported in the IDE. See the Connected mode documentation for more information.

Language-specific requirements

C and C++ analysis

The use of connected mode with SonarCloud or a SonarQube Server is required to analyze C and C++ code in SonarQube for Eclipse. In addition, SonarQube for Eclipse requires a C/C++ Development Tool (CDT); you can check the Eclipse Embedded CDT documentation for more details. 

COBOL

COBOL analysis requires a COBOL IDE based on the Eclipse platform such as the IBM IDz or BMC IDEs. Note that recent versions of SonarQube for Eclipse and our analyzers require a JRE 11+ in order to run, and IBM IDz only supports JRE 11 starting from version 16.

Java and JSP

Analysis of Java code requires the Eclipse sub-project Java development tools (JDT). This includes a Java compiler, incremental builder, editors, wizards, content assist, and all the other features of a first-class Java IDE.

Other rule types

DBD rules

Dataflow bugs are what Sonar calls a series of advanced Python and Java bugs using symbolic execution. This type of issue can cause runtime errors and crashes in Python and Java. If you want to learn more, check out our blog post for a good explanation with an example.

Dataflow Bug Detection (DBD) rules for Python and Java are supported in Commercial Editions of SonarQube Server and by SonarQube Cloud. At this time, SonarQube for Eclipse supports DBD detection for Java and Python when running in connected mode with SonarQube Server Active Versions or SonarQube Cloud.

Injection vulnerabilities

Security vulnerabilities requiring taint engine analysis (injection vulnerabilities) are only available in connected mode because SonarQube for IDE pulls them from SonarQube (Server, Cloud) following a project analysis.

To browse injection vulnerabilities in SonarQube for Eclipse, configure Connected mode with your SonarQube Server or SonarQube Cloud instance. Once a Project Binding is configured, SonarQube for Eclipse will synchronize with the SonarQube (Qube, Cloud) to report the detected injection vulnerabilities.

More information about security-related rules is available in the SonarQube Server and SonarQube Cloud documentation.

Security hotspots

SonarQube for Eclipse does not detect security hotspots on its own, and does not report the hotspots found by SonarQube Cloud. However, SonarQube's Open in IDE feature will open one hotspot at a time in Eclipse and show them in the SonarQube Security Hotspots view window.

Please see the SonarQube for Eclipse documentation on Security hotspots for more details, and the Investigating issues page to learn how the Open in IDE feature works.

Secrets detection

Secrets are pieces of user-specific or system-level credentials that should be protected and accessible to legitimate users only. SonarQube for Eclipse detects exposed Secrets in your source code and language-agnostic config files. When running in connected mode, the SonarQube (Server, Cloud) or SonarQube Community Build quality profiles are applied to locally detected Secrets.


Was this page helpful?

© 2008-2024 SonarSource SA. All rights reserved. SONAR, SONARSOURCE, SONARQUBE, and CLEAN AS YOU CODE are trademarks of SonarSource SA.

Creative Commons License