A few extra steps are needed for SonarCloud to analyze your code coverage

Template for a good new topic, formatted with Markdown:

  • ALM used (GitHub, Bitbucket Cloud, Azure DevOps) - BitBucket

  • CI system used (Bitbucket Cloud, Azure DevOps, Travis CI, Circle CI - Jenkins

  • Scanner command used when applicable (private details masked)

    if [ -n "${CHANGE_ID}" ]; then
        ${SCANNER_HOME}/bin/sonar-scanner \
            -Dsonar.pullrequest.key="${CHANGE_ID}" \
            -Dsonar.pullrequest.branch="${CHANGE_BRANCH}" \
            -Dsonar.pullrequest.base="${CHANGE_TARGET}" \
            -Dsonar.qualitygate.wait=true \
            #-Dsonar.verbose=true \
            -Dsonar.qualitygate.timeout=300
    else
        ${SCANNER_HOME}/bin/sonar-scanner \
            -Dsonar.branch.name="${BRANCH_NAME}" \
            -Dsonar.qualitygate.wait=true \
            -Dsonar.qualitygate.timeout=300
    fi
    
  • Languages of the repository
    typescript

  • CI Logs

+ /home/jenkins/agent/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarCloud/bin/sonar-scanner -Dsonar.pullrequest.key=972 -Dsonar.pullrequest.branch=DEVOPS-3035 -Dsonar.pullrequest.base=master -Dsonar.qualitygate.wait=true
INFO: Scanner configuration file: /home/jenkins/agent/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarCloud/conf/sonar-scanner.properties
INFO: Project root configuration file: /home/jenkins/agent/workspace/xxxx-service_PR-972/sonar-project.properties
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.8.1 Eclipse Adoptium (64-bit)
INFO: Linux 5.15.146+ amd64
INFO: User cache: /root/.sonar/cache
INFO: Analyzing on SonarCloud
INFO: Default locale: "en", source code encoding: "UTF-8"
INFO: Load global settings
INFO: Load global settings (done) | time=503ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
INFO: User cache: /root/.sonar/cache
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=452ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=736ms
INFO: Found an active CI vendor: 'Jenkins'
INFO: Load project settings for component key: 'xxxx-service'
INFO: Load project settings for component key: 'xxxx-service' (done) | time=454ms
INFO: Process project properties
INFO: Project key: xxxx-service
INFO: Base dir: /home/jenkins/agent/workspace/xxxx-service_PR-972
INFO: Working dir: /home/jenkins/agent/workspace/xxxx-service_PR-972/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=650ms
INFO: Check ALM binding of project 'xxxx-service'
INFO: Detected project binding: BOUND
INFO: Check ALM binding of project 'xxxx-service' (done) | time=445ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=601ms
INFO: Load branch configuration
INFO: Load branch configuration (done) | time=688ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=528ms
INFO: Load active rules
INFO: Load active rules (done) | time=7021ms
INFO: Organization key: saaslabs
INFO: Pull request 972 for merge into master from DEVOPS-3035
INFO: Preprocessing files...
INFO: 5 languages detected in 409 preprocessed files
INFO: 210 files ignored because of inclusion/exclusion patterns
INFO: 45299 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=786ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=665ms
INFO: SCM collecting changed files in the branch
WARN: Could not find ref: master in refs/heads, refs/remotes/upstream or refs/remotes/origin
INFO: SCM collecting changed files in the branch (done) | time=14ms
INFO: Indexing files...
INFO: Project configuration:
INFO:   Excluded sources: **/build-wrapper-dump.json, src/database/**, database/**
INFO:   Excluded sources for coverage: **/*.spec.tsx, **/*.test.tsx, **/*.spec.ts, **/*.css, **/*.html, **/*.sh, **/*.go, **/*.yaml, **/*.yml, **/*.json, **/*.properties, **/*.xml, **/*.js, src/database/**, database/**, .eslintrc.js
INFO: 409 files indexed
INFO: Quality profile for docker: Docker-SaaS Labs
INFO: Quality profile for js: Sonar way
INFO: Quality profile for json: Sonar way
INFO: Quality profile for ts: Sonar way
INFO: Quality profile for yaml: Sonar way
INFO: ------------- Run sensors on module xxxx-service
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=452ms
INFO: Sensor cache enabled
INFO: Load sensor cache
INFO: Load sensor cache (2 MB) | time=2008ms
INFO: Sensor HTML [web]
INFO: Sensor HTML is restricted to changed files only
INFO: Sensor HTML [web] (done) | time=5ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=2ms
INFO: Sensor IaC CloudFormation Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=66ms
INFO: Sensor IaC Kubernetes Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=86ms
INFO: Sensor IaC AzureResourceManager Sensor [iac]
INFO: Sensor IaC AzureResourceManager Sensor is restricted to changed files only
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=107ms
INFO: Sensor JavaScript/TypeScript analysis [javascript]
INFO: Detected os: Linux arch: amd64 alpine: false. Platform: LINUX_X64
INFO: Using embedded Node.js runtime
INFO: Using Node.js executable: '/root/.sonar/js/node-runtime/node'.
INFO: Memory configuration: OS (16003 MB), Node.js (1024 MB).
INFO: Found 1 tsconfig.json file(s): [/home/jenkins/agent/workspace/xxxx-service_PR-972/tsconfig.json]
INFO: Creating TypeScript program
INFO: TypeScript configuration file /home/jenkins/agent/workspace/xxxx-service_PR-972/tsconfig.json
INFO: 389 source files to be analyzed
INFO: Starting analysis with current program
INFO: Analyzed 388 file(s) with current program
INFO: Found 1 file(s) not part of any tsconfig.json: they will be analyzed without type information
INFO: 389/389 source files have been analyzed
INFO: Hit the cache for 385 out of 389
INFO: Miss the cache for 4 out of 389: FILE_CHANGED [4/389]
INFO: Sensor JavaScript/TypeScript analysis [javascript] (done) | time=19460ms
INFO: Sensor JavaScript inside YAML analysis [javascript]
INFO: No input files found for analysis
INFO: Hit the cache for 0 out of 0
INFO: Miss the cache for 0 out of 0
INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=90ms
INFO: Sensor CSS Rules [javascript]
INFO: Sensor CSS Rules is restricted to changed files only
INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
INFO: Sensor CSS Rules [javascript] (done) | time=2ms
INFO: Sensor JavaScript/TypeScript Coverage [javascript]
INFO: Analysing [/home/jenkins/agent/workspace/xxxx-service_PR-972/coverage/lcov.info]
INFO: Sensor JavaScript/TypeScript Coverage [javascript] (done) | time=127ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: Sensor IaC Docker Sensor is restricted to changed files only
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=43ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=5ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=32ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=17ms
INFO: Sensor TextAndSecretsSensor [text]
INFO: Sensor TextAndSecretsSensor is restricted to changed files only
INFO: Available processors: 4
INFO: Using 4 threads for analysis.
INFO: 4 source files to be analyzed
INFO: 4/4 source files have been analyzed
INFO: Sensor TextAndSecretsSensor [text] (done) | time=526ms
INFO: Sensor JavaSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /home/jenkins/agent/workspace/xxxx-service_PR-972/.scannerwork/ucfg2/java
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.002
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.002
INFO: No UCFGs have been included for analysis.
INFO: java security sensor: Time spent was 00:00:00.019
INFO: java security sensor: Begin: 2024-05-10T15:08:42.161382468Z, End: 2024-05-10T15:08:42.180906590Z, Duration: 00:00:00.019
  Load type hierarchy and UCFGs: Begin: 2024-05-10T15:08:42.163319768Z, End: 2024-05-10T15:08:42.166226305Z, Duration: 00:00:00.002
    Load type hierarchy: Begin: 2024-05-10T15:08:42.163394943Z, End: 2024-05-10T15:08:42.165591673Z, Duration: 00:00:00.002
    Load UCFGs: Begin: 2024-05-10T15:08:42.166012762Z, End: 2024-05-10T15:08:42.166073101Z, Duration: 00:00:00.000
INFO: java security sensor peak memory: 275 MB
INFO: Sensor JavaSecuritySensor [security] (done) | time=25ms
INFO: Sensor CSharpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /home/jenkins/agent/workspace/xxxx-service_PR-972/ucfg2/cs
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: csharp security sensor: Time spent was 00:00:00.001
INFO: csharp security sensor: Begin: 2024-05-10T15:08:42.185061304Z, End: 2024-05-10T15:08:42.186663603Z, Duration: 00:00:00.001
  Load type hierarchy and UCFGs: Begin: 2024-05-10T15:08:42.185337526Z, End: 2024-05-10T15:08:42.186111830Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-05-10T15:08:42.185373904Z, End: 2024-05-10T15:08:42.185703087Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-05-10T15:08:42.185882306Z, End: 2024-05-10T15:08:42.185953854Z, Duration: 00:00:00.000
INFO: csharp security sensor peak memory: 275 MB
INFO: Sensor CSharpSecuritySensor [security] (done) | time=3ms
INFO: Sensor PhpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /home/jenkins/agent/workspace/xxxx-service_PR-972/.scannerwork/ucfg2/php
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: php security sensor: Time spent was 00:00:00.001
INFO: php security sensor: Begin: 2024-05-10T15:08:42.188012913Z, End: 2024-05-10T15:08:42.189348691Z, Duration: 00:00:00.001
  Load type hierarchy and UCFGs: Begin: 2024-05-10T15:08:42.188268023Z, End: 2024-05-10T15:08:42.188866797Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-05-10T15:08:42.188307690Z, End: 2024-05-10T15:08:42.188505151Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-05-10T15:08:42.188680224Z, End: 2024-05-10T15:08:42.188728560Z, Duration: 00:00:00.000
INFO: php security sensor peak memory: 275 MB
INFO: Sensor PhpSecuritySensor [security] (done) | time=3ms
INFO: Sensor PythonSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /home/jenkins/agent/workspace/xxxx-service_PR-972/.scannerwork/ucfg2/python
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: python security sensor: Time spent was 00:00:00.000
INFO: python security sensor: Begin: 2024-05-10T15:08:42.190847444Z, End: 2024-05-10T15:08:42.191822878Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-05-10T15:08:42.190987594Z, End: 2024-05-10T15:08:42.191498337Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-05-10T15:08:42.191017706Z, End: 2024-05-10T15:08:42.191202479Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-05-10T15:08:42.191366524Z, End: 2024-05-10T15:08:42.191409532Z, Duration: 00:00:00.000
INFO: python security sensor peak memory: 275 MB
INFO: Sensor PythonSecuritySensor [security] (done) | time=2ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S6105, S5144, S5696, S5131, S2083, S6096, S2076, S6350, S2631, S5146, S5147, S3649, S6287, S5883, S5334
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /home/jenkins/agent/workspace/xxxx-service_PR-972/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.004
INFO: Load UCFGs: Starting
INFO: Reading UCFGs from: /home/jenkins/agent/workspace/xxxx-service_PR-972/.scannerwork/ucfg2/js
INFO: Load UCFGs: Time spent was 00:00:01.285
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:01.291
INFO: Analyzing 2029 UCFGs to detect vulnerabilities.
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.003
INFO: Compare cache: Starting
INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=2024, typeDefinitionsHashes.count=0}
INFO: Compare cache: Time spent was 00:00:00.001
INFO: Check cache: Time spent was 00:00:00.006
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.161
INFO: Run SCC (Tarjan) on 19492 nodes: Starting
INFO: Run SCC (Tarjan) on 19492 nodes: Time spent was 00:00:00.024
INFO: Tarjan found 19491 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.053
INFO: Variable Type Analysis #1: Time spent was 00:00:00.242
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.188
INFO: Run SCC (Tarjan) on 19492 nodes: Starting
INFO: Run SCC (Tarjan) on 19492 nodes: Time spent was 00:00:00.053
INFO: Tarjan found 19491 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.038
INFO: Variable Type Analysis #2: Time spent was 00:00:00.281
INFO: Create runtime call graph: Time spent was 00:00:00.530
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.089
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.938
INFO: All rules entry points : 390
INFO: Slice call graph: Starting
INFO: Slice call graph: Time spent was 00:00:00.000
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.507
INFO: Taint analysis for js: Starting
INFO: 0 / 2029 UCFGs simulated, memory usage: 143 MB
INFO: 101 / 2029 UCFGs simulated, memory usage: 283 MB
INFO: 211 / 2029 UCFGs simulated, memory usage: 242 MB
INFO: 388 / 2029 UCFGs simulated, memory usage: 357 MB
INFO: 396 / 2029 UCFGs simulated, memory usage: 365 MB
INFO: Taint analysis for js: Time spent was 00:00:03.394
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.005
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.000
INFO: js security sensor: Time spent was 00:00:06.766
INFO: js security sensor: Begin: 2024-05-10T15:08:42.192974883Z, End: 2024-05-10T15:08:48.959783034Z, Duration: 00:00:06.766
  Load type hierarchy and UCFGs: Begin: 2024-05-10T15:08:42.193185887Z, End: 2024-05-10T15:08:43.484599920Z, Duration: 00:00:01.291
    Load type hierarchy: Begin: 2024-05-10T15:08:42.193210688Z, End: 2024-05-10T15:08:42.198196491Z, Duration: 00:00:00.004
    Load UCFGs: Begin: 2024-05-10T15:08:42.198387281Z, End: 2024-05-10T15:08:43.484356993Z, Duration: 00:00:01.285
  Check cache: Begin: 2024-05-10T15:08:43.484727041Z, End: 2024-05-10T15:08:43.490870357Z, Duration: 00:00:00.006
    Load cache: Begin: 2024-05-10T15:08:43.484755480Z, End: 2024-05-10T15:08:43.488615906Z, Duration: 00:00:00.003
    Compare cache: Begin: 2024-05-10T15:08:43.489054526Z, End: 2024-05-10T15:08:43.490729030Z, Duration: 00:00:00.001
  Create runtime call graph: Begin: 2024-05-10T15:08:43.490958412Z, End: 2024-05-10T15:08:44.021074841Z, Duration: 00:00:00.530
    Variable Type Analysis #1: Begin: 2024-05-10T15:08:43.491782004Z, End: 2024-05-10T15:08:43.734761372Z, Duration: 00:00:00.242
      Create runtime type propagation graph: Begin: 2024-05-10T15:08:43.492800276Z, End: 2024-05-10T15:08:43.654788809Z, Duration: 00:00:00.161
      Run SCC (Tarjan) on 19492 nodes: Begin: 2024-05-10T15:08:43.655503416Z, End: 2024-05-10T15:08:43.680439886Z, Duration: 00:00:00.024
      Propagate runtime types to strongly connected components: Begin: 2024-05-10T15:08:43.680766543Z, End: 2024-05-10T15:08:43.734508223Z, Duration: 00:00:00.053
    Variable Type Analysis #2: Begin: 2024-05-10T15:08:43.736731844Z, End: 2024-05-10T15:08:44.018253863Z, Duration: 00:00:00.281
      Create runtime type propagation graph: Begin: 2024-05-10T15:08:43.736830650Z, End: 2024-05-10T15:08:43.925588438Z, Duration: 00:00:00.188
      Run SCC (Tarjan) on 19492 nodes: Begin: 2024-05-10T15:08:43.925883843Z, End: 2024-05-10T15:08:43.979094609Z, Duration: 00:00:00.053
      Propagate runtime types to strongly connected components: Begin: 2024-05-10T15:08:43.979434868Z, End: 2024-05-10T15:08:44.017940888Z, Duration: 00:00:00.038
  Load config: Begin: 2024-05-10T15:08:44.021306900Z, End: 2024-05-10T15:08:44.111199552Z, Duration: 00:00:00.089
  Compute entry points: Begin: 2024-05-10T15:08:44.111418879Z, End: 2024-05-10T15:08:45.049419913Z, Duration: 00:00:00.938
  Slice call graph: Begin: 2024-05-10T15:08:45.049796098Z, End: 2024-05-10T15:08:45.049848746Z, Duration: 00:00:00.000
  Live variable analysis: Begin: 2024-05-10T15:08:45.049955902Z, End: 2024-05-10T15:08:45.557724041Z, Duration: 00:00:00.507
  Taint analysis for js: Begin: 2024-05-10T15:08:45.558241004Z, End: 2024-05-10T15:08:48.952880714Z, Duration: 00:00:03.394
  Report issues: Begin: 2024-05-10T15:08:48.953228191Z, End: 2024-05-10T15:08:48.958527924Z, Duration: 00:00:00.005
  Store cache: Begin: 2024-05-10T15:08:48.958700400Z, End: 2024-05-10T15:08:48.958766644Z, Duration: 00:00:00.000
INFO: js security sensor peak memory: 409 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=6769ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=2ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 4 source files to be analyzed
INFO: SCM Publisher 4/4 source files have been analyzed (done) | time=255ms
INFO: CPD Executor 51 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 338 files
INFO: CPD Executor CPD calculation finished (done) | time=252ms
INFO: SCM writing changed lines
WARN: Could not find ref: master in refs/heads, refs/remotes/upstream or refs/remotes/origin
INFO: SCM writing changed lines (done) | time=4ms
INFO: Analysis report generated in 364ms, dir size=347 KB
INFO: Analysis report compressed in 390ms, zip size=243 KB
INFO: Analysis report uploaded in 2135ms
INFO: ------------- Check Quality Gate status
INFO: Waiting for the analysis report to be processed (max 300s)
INFO: QUALITY GATE STATUS: PASSED - View details on https://sonarcloud.io/dashboard?id=xxx-service&pullRequest=972
INFO: Time spent writing ucfgs 19ms
INFO: Analysis total time: 57.834 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 1:05.197s
INFO: Final Memory: 97M/334M
INFO: ------------------------------------------------------------------------

With Above logs, we could see Sonar-Cli is able to Submit the coverage report to SonarCloud, but when checked the PR analyse, we could see below error

Below is my sonar properties file

sonar.organization=xxxx
sonar.projectKey=xxxx-service
sonar.sourceEncoding=UTF-8

# relative paths to source directories. More details and properties are described
# in https://sonarcloud.io/documentation/project-administration/narrowing-the-focus/
sonar.sources=.
sonar.javascript.lcov.reportPaths=coverage/lcov.info
sonar.coverage.exclusions=**/*.spec.tsx, **/*.test.tsx, **/*.spec.ts, **/*.css, **/*.html, **/*.sh, **/*.go, **/*.yaml, **/*.yml, **/*.json, **/*.properties, **/*.xml, **/*.js, src/database/**, database/**, .eslintrc.js
sonar.exclusions=src/database/**, database/**

Hi,

Welcome to the community!

You’ll need to generate a test coverage report, if you’re not already, and pass it in to analysis. The docs should help.

 
Ann

Hey @ganncamp,

We merged the code to master and coverage is being reported now. But the same is not working for PRs.

Below is the Jenkinsfile configuration.

script {
withSonarQubeEnv(credentialsId: 'sonarcloud', installationName: 'SonarCloud') {
    sh '''
    npm i
    npm run test:coverage
    sed -i "s|SF:|SF:$(pwd)/|g" coverage/lcov.info
    if [ -n "${CHANGE_ID}" ]; then
        ${SCANNER_HOME}/bin/sonar-scanner \
            -Dsonar.pullrequest.key="${CHANGE_ID}" \
            -Dsonar.pullrequest.branch="${CHANGE_BRANCH}" \
            -Dsonar.pullrequest.base="${CHANGE_TARGET}" \
            #-Dsonar.verbose=true \
            -Dsonar.qualitygate.wait=true \
            -Dsonar.qualitygate.timeout=300    
    else
        ${SCANNER_HOME}/bin/sonar-scanner \
            -Dsonar.branch.name="${BRANCH_NAME}" \
            -Dsonar.qualitygate.wait=true \
            -Dsonar.qualitygate.timeout=300
    fi
    '''
    }
}

below if for Master,

Below is for PR to Master, where it should have reported how much coverage would this new code bring in and what would be the Coverage after Merge.

Hi,

Look to the right of the Coverage box. There you’ll find the Duplications box which, for this PR, says “0 New Lines”.

It’s unfortunate that the UI tells you to configure coverage when there are 0 coverable lines, as in your case, but there it is. That said, I still don’t see anything relevant to converge in the Jenkinsfile you shared at the top of your post.

 
Ann

@ganncamp

Pl find sonar properties where coverage is referenced.

sonar.organization=xxxx
sonar.projectKey=xxxx-service
sonar.sourceEncoding=UTF-8

# relative paths to source directories. More details and properties are described
# in https://sonarcloud.io/documentation/project-administration/narrowing-the-focus/
sonar.sources=.
sonar.javascript.lcov.reportPaths=coverage/lcov.info
sonar.coverage.exclusions=**/*.spec.tsx, **/*.test.tsx, **/*.spec.ts, **/*.css, **/*.html, **/*.sh, **/*.go, **/*.yaml, **/*.yml, **/*.json, **/*.properties, **/*.xml, **/*.js, src/database/**, database/**, .eslintrc.js
sonar.exclusions=src/database/**, database/**

Also regarding the duplicates, i’ve fixed it.

script {
    env.GIT_REPO_NAME = env.GIT_URL.replaceFirst(/^.*\/([^\/]+?).git$/, '$1')
    withCredentials([usernamePassword(credentialsId: 'Bitbucket-Sam_PAT', usernameVariable: 'BITBUCKET_USERNAME', passwordVariable: 'BITBUCKET_TOKEN')]) {
    sh '''
    if [ -n "${CHANGE_ID}" ]; then
        echo "Configuring Git"
        AUTHENTICATED_URL="https://x-token-auth:$BITBUCKET_TOKEN@bitbucket.org/saaslabsco/$GIT_REPO_NAME.git"
        git config user.email $BITBUCKET_USERNAME
        git remote set-url origin "$AUTHENTICATED_URL"
        git fetch origin "${CHANGE_TARGET}":refs/remotes/origin/"${CHANGE_TARGET}"
    fi                            
    '''
    }
    withSonarQubeEnv(credentialsId: 'sonarcloud', installationName: 'SonarCloud') {
        sh '''
        npm i
        npm run test:coverage
        sed -i "s|SF:|SF:$(pwd)/|g" coverage/lcov.info
        if [ -n "${CHANGE_ID}" ]; then
            ${SCANNER_HOME}/bin/sonar-scanner \
                -Dsonar.pullrequest.key="${CHANGE_ID}" \
                -Dsonar.pullrequest.branch="${CHANGE_BRANCH}" \
                -Dsonar.pullrequest.base="${CHANGE_TARGET}" \
                #-Dsonar.verbose=true \
                -Dsonar.qualitygate.wait=true \
                -Dsonar.qualitygate.timeout=300    
        else
            ${SCANNER_HOME}/bin/sonar-scanner \
                -Dsonar.branch.name="${BRANCH_NAME}" \
                -Dsonar.qualitygate.wait=true \
                -Dsonar.qualitygate.timeout=300
        fi
        '''
                            }
                        }

Now coverage is being shown in PRs. Thanks