Skip to content

Commit 0b6d306

Browse files
committed
DOC-1650 URL slug rebranding update
Part of the rebranding efforts necessitates the update of the URL structure on the Docs website. This change reflects part of that update. A redirect has been added to address links from outside the product.
1 parent c21838b commit 0b6d306

File tree

4 files changed

+11
-11
lines changed

4 files changed

+11
-11
lines changed

CHANGELOG.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -173,8 +173,8 @@
173173

174174
## 3.22
175175

176-
* Add possibility to exclude files from analysis when ***not*** in Connected Mode. [Learn more](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/file-exclusions)
177-
* Add focusing on new code in connected mode [Learn more](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/investigating-issues/#focusing-on-new-code)
176+
* Add possibility to exclude files from analysis when ***not*** in Connected Mode. [Learn more](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/file-exclusions)
177+
* Add focusing on new code in connected mode [Learn more](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/investigating-issues/#focusing-on-new-code)
178178
* Update JS/TS/CSS analyzer 10.5.1 -> [10.6.0](https://github.com/SonarSource/SonarJS/releases/tag/10.6.0.22520), FP fixes, QuickFix for S6326, remove S2814 for TypeScript, recommendation to use Node.js 20
179179
* Update CFamily analyzer 6.48 -> [6.49](https://sonarsource.atlassian.net/issues/?jql=fixVersion%20%3D%2014261%20ORDER%20BY%20created%20ASC), 2 new C++ MISRA 2023 rules
180180
* Update text and secrets analyzer 2.3.0 -> [2.4.0](https://github.com/SonarSource/sonar-text/releases/tag/2.4.0.2120) -> [2.5.0](https://github.com/SonarSource/sonar-text/releases/tag/2.5.0.2293), 42 new cloud app secrets, FP fixes, analysis time logging
@@ -274,7 +274,7 @@
274274

275275
## 3.14
276276

277-
* Local detection of [Security Hotspots](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/security-hotspots/)
277+
* Local detection of [Security Hotspots](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/security-hotspots/)
278278
* Update PHP analyzer 3.25.0 -> [3.26.0](https://github.com/SonarSource/sonar-php/releases/tag/3.26.0.9313) -> [3.27.0](https://github.com/SonarSource/sonar-php/releases/tag/3.27.0.9339) -> [3.27.1](https://github.com/SonarSource/sonar-php/releases/tag/3.27.1.9352), Fix parsing error on namespaces with reserved words
279279
* Update CFamily analyzer 6.40.0 -> [6.41.0](https://sonarsource.atlassian.net/issues/?jql=project%20%3D%2010166%20AND%20fixVersion%20%3D%2013953%20ORDER%20BY%20priority%20DESC%2C%20key%20ASC), 13 new rules on C++20's "std::format"
280280
* Update Java analyzer 7.15.0 -> [7.16.0](https://sonarsource.atlassian.net/projects/SONARJAVA/versions/13922/tab/release-report-all-issues), FP fixes, bugfixes, FN fixes

README.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Out of the box, SonarQube for IDE: VS Code automatically checks your code agains
4949
- [Terraform rules](https://rules.sonarsource.com/terraform)
5050
- [TypeScript rules](https://rules.sonarsource.com/typescript)
5151

52-
The full list of supported languages and rules is available in [our docs](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/rules/).
52+
The full list of supported languages and rules is available in [our docs](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/rules/).
5353

5454
## Requirements
5555

@@ -126,7 +126,7 @@ The support for COBOL analysis is only available together with SonarQube Server
126126

127127
### Jupyter notebooks
128128

129-
SonarQube for IDE: VS Code supports analysis of Python code inside Jupyter notebooks. See the [documentation](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/scan-my-project/#jupyter-notebooks) page for details.
129+
SonarQube for IDE: VS Code supports analysis of Python code inside Jupyter notebooks. See the [documentation](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/scan-my-project/#jupyter-notebooks) page for details.
130130

131131
### Injection vulnerabilities specific requirements
132132

@@ -138,9 +138,9 @@ More information about security-related rules is available in the SonarQube ([Se
138138

139139
### Security Hotspots in SonarQube for IDE: VS Code
140140

141-
Local detection of [Security Hotspots](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/security-hotspots/) is enabled if you are using [Connected Mode](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/team-features/connected-mode/) with SonarQube Server 9.9 or above, or SonarQube Cloud.
141+
Local detection of [Security Hotspots](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/security-hotspots/) is enabled if you are using [Connected Mode](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/team-features/connected-mode/) with SonarQube Server 9.9 or above, or SonarQube Cloud.
142142

143-
Please see the [documentation](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/security-hotspots/) for more details.
143+
Please see the [documentation](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/security-hotspots/) for more details.
144144

145145
### Secrets detection
146146

@@ -152,7 +152,7 @@ You can connect SonarQube for IDE to [SonarQube Server](https://www.sonarsource.
152152

153153
While in Connected Mode, SonarQube for IDE receives notifications from SonarQube (Server, Cloud) about your Quality Gate changes and new issues. Notifications can be enabled or disabled from the UI while creating or editing the connection settings.
154154

155-
When running in Connected Mode, and browsing a [Security Hotspot](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/security-hotspots/), a button will be available offering to open the hotspot in SonarQube for IDE (with SonarQube for IDE already running in VSCode). Limitation: this feature relies on local communication between your web browser and SonarQube for IDE, and consequently is not available in some remote environments such as GitPod, or GitHub CodeSpaces.
155+
When running in Connected Mode, and browsing a [Security Hotspot](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/security-hotspots/), a button will be available offering to open the hotspot in SonarQube for IDE (with SonarQube for IDE already running in VSCode). Limitation: this feature relies on local communication between your web browser and SonarQube for IDE, and consequently is not available in some remote environments such as GitPod, or GitHub CodeSpaces.
156156

157157
Connected Mode will also unlock your analysis of these languages:
158158

package.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -590,7 +590,7 @@
590590
},
591591
{
592592
"view": "SonarLint.SecurityHotspots",
593-
"contents": "Please ensure a connection to [SonarQube Server](command:SonarLint.HelpAndFeedbackLinkClicked?%22sonarQubeProductPage%22) 9.9+ or [SonarQube Cloud](command:SonarLint.HelpAndFeedbackLinkClicked?%22sonarCloudProductPage%22) is set up. Detected Security Hotspots will be displayed here. [Learn More](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/security-hotspots).\n Using the In Whole Folder feature may consume excessive resources depending on the size of your project. Please check the [documentation](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/security-hotspots/#reporting-security-hotspots-in-the-whole-folder) for recommendations to minimize the impact of a full project analysis."
593+
"contents": "Please ensure a connection to [SonarQube Server](command:SonarLint.HelpAndFeedbackLinkClicked?%22sonarQubeProductPage%22) 9.9+ or [SonarQube Cloud](command:SonarLint.HelpAndFeedbackLinkClicked?%22sonarCloudProductPage%22) is set up. Detected Security Hotspots will be displayed here. [Learn More](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/security-hotspots).\n Using the In Whole Folder feature may consume excessive resources depending on the size of your project. Please check the [documentation](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/security-hotspots/#reporting-security-hotspots-in-the-whole-folder) for recommendations to minimize the impact of a full project analysis."
594594
}
595595
],
596596
"walkthroughs": [
@@ -602,7 +602,7 @@
602602
{
603603
"id": "SonarLint.inAction",
604604
"title": "$(rocket) New to SonarQube for VS Code? See it in action",
605-
"description": "SonarQube for VS Code supports analysis of 15+ languages including JS/TS, Java, Python, CSS/HTML, C, C++, C#, and [more](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/rules). SonarQube for VS Code detects issues in all files **open** in the editor. For project-level analysis, check out [SonarQube Cloud](command:SonarLint.HelpAndFeedbackLinkClicked?%22sonarCloudProductPage%22).\n\nThe best way to get started is to see it in action!\n[Open Sample File](command:SonarLint.OpenSample)",
605+
"description": "SonarQube for VS Code supports analysis of 15+ languages including JS/TS, Java, Python, CSS/HTML, C, C++, C#, and [more](https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/rules). SonarQube for VS Code detects issues in all files **open** in the editor. For project-level analysis, check out [SonarQube Cloud](command:SonarLint.HelpAndFeedbackLinkClicked?%22sonarCloudProductPage%22).\n\nThe best way to get started is to see it in action!\n[Open Sample File](command:SonarLint.OpenSample)",
606606
"media": {
607607
"markdown": "walkthrough/empty.md"
608608
},

src/newcode/newCodeDefinitionService.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ export class NewCodeDefinitionService {
5656
.update('focusOnNewCode', !this.focusOnNewCode, VSCode.ConfigurationTarget.Global);
5757
}
5858
if (item.label === `Learn how to deliver clean code with Clean as You Code`) {
59-
VSCode.env.openExternal(VSCode.Uri.parse('https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using-sonarlint/investigating-issues/#focusing-on-new-code'));
59+
VSCode.env.openExternal(VSCode.Uri.parse('https://docs.sonarsource.com/sonarqube-for-ide/vs-code/using/investigating-issues/#focusing-on-new-code'));
6060
}
6161
});
6262
}));

0 commit comments

Comments
 (0)