SonarSource Rules
  • Products

    In-IDE

    Code Quality and Security in your IDE with SonarQube Ide

    IDE extension that lets you fix coding issues before they exist!

    Discover SonarQube for IDE

    SaaS

    Code Quality and Security in the cloud with SonarQube Cloud

    Setup is effortless and analysis is automatic for most languages

    Discover SonarQube Cloud

    Self-Hosted

    Code Quality and Security Self-Hosted with SonarQube Server

    Fast, accurate analysis; enterprise scalability

    Discover SonarQube Server
  • SecretsSecrets
  • ABAPABAP
  • AnsibleAnsible
  • ApexApex
  • AzureResourceManagerAzureResourceManager
  • CC
  • C#C#
  • C++C++
  • CloudFormationCloudFormation
  • COBOLCOBOL
  • CSSCSS
  • DartDart
  • DockerDocker
  • FlexFlex
  • GitHub ActionsGitHub Actions
  • GoGo
  • HTMLHTML
  • JavaJava
  • JavaScriptJavaScript
  • JSONJSON
  • JCLJCL
  • KotlinKotlin
  • KubernetesKubernetes
  • Objective CObjective C
  • PHPPHP
  • PL/IPL/I
  • PL/SQLPL/SQL
  • PythonPython
  • RPGRPG
  • RubyRuby
  • RustRust
  • ScalaScala
  • ShellShell
  • SwiftSwift
  • TerraformTerraform
  • TextText
  • TypeScriptTypeScript
  • T-SQLT-SQL
  • VB.NETVB.NET
  • VB6VB6
  • XMLXML
  • YAMLYAML
Java

Java static code analysis

Unique rules to find Bugs, Vulnerabilities, Security Hotspots, and Code Smells in your JAVA code

  • All rules 733
  • Vulnerability60
  • Bug175
  • Security Hotspot40
  • Code Smell458

  • Quick Fix 65
Filtered: 5 rules found
mockito
    Impact
      Clean code attribute
        1. Mockito argument matchers should be used on all parameters

           Bug
        2. Call to Mockito method "verify", "when" or "given" should be simplified

           Code Smell
        3. Annotated Mockito objects should be initialized

           Bug
        4. Mocking all non-private methods of a class should be avoided

           Code Smell
        5. Assertions should be complete

           Code Smell

        Assertions should be complete

        adaptability - tested
        maintainability
        Code Smell
        • tests
        • assertj
        • mockito

        Why is this an issue?

        It is very easy to write incomplete assertions when using some test frameworks. This rule enforces complete assertions in the following cases:

        • Fest: assertThat is not followed by an assertion invocation
        • AssertJ: assertThat is not followed by an assertion invocation
        • Mockito: verify is not followed by a method invocation
        • Truth: assertXXX is not followed by an assertion invocation

        In such cases, what is intended to be a test doesn’t actually verify anything

        Noncompliant code example

        // Fest
        boolean result = performAction();
        // let's now check that result value is true
        assertThat(result); // Noncompliant; nothing is actually checked, the test passes whether "result" is true or false
        
        // Mockito
        List mockedList = Mockito.mock(List.class);
        mockedList.add("one");
        mockedList.clear();
        // let's check that "add" and "clear" methods are actually called
        Mockito.verify(mockedList); // Noncompliant; nothing is checked here, oups no call is chained to verify()
        

        Compliant solution

        // Fest
        boolean result = performAction();
        // let's now check that result value is true
        assertThat(result).isTrue();
        
        // Mockito
        List mockedList = Mockito.mock(List.class);
        mockedList.add("one");
        mockedList.clear();
        // let's check that "add" and "clear" methods are actually called
        Mockito.verify(mockedList).add("one");
        Mockito.verify(mockedList).clear();
        

        Exceptions

        Variable assignments and return statements are skipped to allow helper methods.

        private BooleanAssert check(String filename, String key) {
          String fileContent = readFileContent(filename);
          performReplacements(fileContent);
          return assertThat(fileContent.contains(key)); // No issue is raised here
        }
        
        @Test
        public void test() {
          check("foo.txt", "key1").isTrue();
          check("bar.txt", "key2").isTrue();
        }
        
          Available In:
        • SonarQube IdeCatch issues on the fly,
          in your IDE
        • SonarQube CloudDetect issues in your GitHub, Azure DevOps Services, Bitbucket Cloud, GitLab repositories
        • SonarQube Community BuildAnalyze code in your
          on-premise CI
          Available Since
          9.1
        • SonarQube ServerAnalyze code in your
          on-premise CI
          Developer Edition
          Available Since
          9.1

        © 2008-2025 SonarSource SA. All rights reserved.

        Privacy Policy | Cookie Policy | Terms of Use