Install Free
IntelliJ | Team features | Advanced configuration

Advanced configuration

On this page

HTTP configuration

To operate, SonarQube for IntelliJ needs to perform HTTP requests, especially in Connected Mode. While SonarQube for IntelliJ will work out-of-the-box in most situations, some network infrastructure may require a custom configuration.

Manage your configuration

HTTP Client timeouts

SonarQube for IDE supports various timeouts. Below you will find the properties added to control them:

sonarlint.http.connectTimeout

  • Determines the timeout, in minutes, until a new connection is fully established. 
  • Default: 3 min

sonarlint.http.socketTimeout

  • Determines the default socket timeout value, in minutes, for I/O operations. 
  • Default: infinite

sonarlint.http.connectionRequestTimeout

  • The connection lease request timeout, in minutes, is used when requesting a connection from the connection manager. 
  • Default: 3 min

sonarlint.http.responseTimeout

  • Determines the timeout, in minutes, until the arrival of a response from the opposite endpoint. 
  • Default: infinite

Server SSL certificates

SonarQube for IDE manages its own truststore in addition to the OS and Java truststores. When encountering an untrusted certificate, SonarQube for IDE will ask the user if the certificate should be trusted. If the answer is yes, the certificate will be added to the truststore.

TrustStore

sonarlint.ssl.trustStorePath
  • Path to the keystore used by SonarLint to store custom trusted server certificates
  • default: ~/.sonarlint/ssl/truststore.p12
sonarlint.ssl.trustStorePassword
  • Password of the truststore.
  • default: sonarlint
sonarlint.ssl.trustStoreType

Client SSL certificates

Some servers or proxies may also require SonarQube for IDE to authenticate using client-side SSL certificates. This is a rare use case, and at for the moment, there is no UI to configure client-side SSL certificates. To properly authenticate client-side SSL certificates, you must manually create a keystore at the default location, or use the following properties:

KeyStore

sonarlint.ssl.keyStorePath
  • Path to the keystore used by SonarQube for IDE to store client certificates.
  • default: ~/.sonarlint/ssl/keystore.p12
sonarlint.ssl.keyStorePassword
  • Password of the keystore.
  • default: sonarlint
sonarlint.ssl.keyStoreType

Using a custom JRE

By default, SonarQube for IntelliJ uses the JRE provided by your IDE. It’s possible to override this and define a custom JRE as long as it meets SonarQube for IntelliJ’s minimum requirements.

Please read the next section, Passing SonarQube for IDE properties, to add your custom sonarlint.jre.path system property.

Passing SonarQube for IDE properties

In SonarQube for IntelliJ, properties should be added to the IDE JVM options. Please see the JetBrains documentation for more details.


Was this page helpful?

© 2008-2024 SonarSource SA. All rights reserved. SONAR, SONARSOURCE, SONARQUBE, and CLEAN AS YOU CODE are trademarks of SonarSource SA.

Creative Commons License