SONARRUBY-154 Update rule metadata#138
SONARRUBY-154 Update rule metadata#138hashicorp-vault-sonar-prod[bot] wants to merge 1 commit intomasterfrom
Conversation
SummaryAutomated rule metadata update across 16 Ruby rules. Changes include: Documentation formatting: Systematic whitespace cleanup across HTML rule files—removing spaces within Content updates for 2 rules:
Metadata changes:
The update also bumps the What reviewers should knowScope: 16 of 42 rules updated; mostly formatting with two substantial rewrites. Safe to scan quickly unless S1313 or S2068 behavior concerns you. Key files to review:
Content changes: Most HTML edits are trivial spacing (e.g., Non-obvious details: The two rule classification changes (S1313, S2068) may indicate a broader shift in how SonarSource categorizes these rules; they were marked
|
|
There was a problem hiding this comment.
Mostly clean automated update. The formatting-only changes (whitespace inside <li> tags) across the 14 unchanged-content files are safe. The two substantial rewrites (S1313, S2068) are structurally sound and internally consistent with their JSON metadata changes.
One item worth confirming before merge: the S2068.html rewrite silently drops actionable user guidance (see inline comment). The two rule reclassifications below are clearly intentional policy decisions, but worth a quick sanity check:
- S1313:
SECURITY_HOTSPOT→CODE_SMELL(security impactLOW). Hardcoded IP addresses are now a maintenance/operational issue rather than a security finding. The rule will no longer surface in the SonarQube Security Hotspots review workflow; theformer-hotspottag acknowledges this. - S2068:
SECURITY_HOTSPOT→VULNERABILITY(severityBlocker→Major, security impactBLOCKER→MEDIUM). Hard-coded credentials are now raised as real violations rather than hotspots, but at a notably lower severity than before. Thequickfixchange fromunknowntoinfeasibleis accurate.
| <p>This rule flags instances of hard-coded credentials used in database and LDAP connections. It looks for hard-coded credentials in connection | ||
| strings, and for variable names that match any of the patterns from the provided list.</p> |
There was a problem hiding this comment.
The previous version of this file included the following actionable guidance that was dropped in this rewrite:
It's recommended to customize the configuration of this rule with additional credential words such as "oauthToken", "secret", …
This is the only place where users learn the rule is configurable with additional pattern words. If this was intentionally removed from the RSPEC source, it's fine — but if it was accidentally dropped during the rewrite, it should be reinstated here.
- Mark as noise





Rule Metadata Update Summary
./sonar-ruby-plugin/sonarpedia.jsonRule API Version: 2.20.0.5857
This PR was automatically generated to update rule metadata across all supported languages.