Error after analysis - NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy

  • which versions are you using
  • SonarQube 10.50.89998,
  • Scanner 6.2.0 for .NET
  • how is SonarQube deployed:
    zip
  • what are you trying to achieve
    I am trying to run a scan on my windows pc and send it to the sonarqube server
  • what have you tried so far to achieve this
  • checked all the required Java versions

Just upgraded from SonarQube version 9.9 to 10.5.0.89998 from a zip file. The server is up and running fine in a virtual windows machine. The database has been upgraded manually and I can log in and see the projects.
On my host windows machine I upgraded my scanner from 5.5 to 6.2.0.
The scan works fine, but sending it to the server results in this error:

Error: LinkageError occurred while loading main class org.sonarsource.scanner.cli.Main
java.lang.UnsupportedClassVersionError: org/sonarsource/scanner/cli/Main has been compiled by a more recent version of the Java Runtime (class file version 61.0), this version of the Java Runtime only recognizes class file versions up to 55.0

On the server I have version 17.0.2 of OpenJDK installed:

C:>java --version
openjdk 17.0.2 2022-01-18
OpenJDK Runtime Environment (build 17.0.2+8-86)
OpenJDK 64-Bit Server VM (build 17.0.2+8-86, mixed mode, sharing)

That has not been upgraded durng the SonarQube upgrade process,

What can I do to fix this error?

1 Like

Kind of fixed this.

I forgot I had a java version on my host machine, which turned out to be version 11.
Replaced this with the same version on the server. Rebooted and ran the scan again.
It now completes the scan and sends it to the server, so that’s good.
The scan however finished with and exception:

Exception in thread "Thread-0" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
        at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
        at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
        at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
        at ch.qos.logback.classic.Logger.error(Logger.java:543)
        at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
        at java.base/java.lang.Thread.run(Thread.java:840)
Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
        at java.base/java.net.URLClassLoader.findClass(URLClassLoader.java:445)
        at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
        at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:525)
        ... 6 more

I don’t know if this is bad or not and I cannot find anything Sonar-related about this.
Does anyone know?

1 Like

I have he same issue here. Scan is working but end with stacktrace. I tried Java 17 and Java 21.

SonarQube Server 10.5.0
SonarQube Scanner : 5.0.1.3006

I happen with all scan run with with sonar scanner CLI (I didn’t try with other scanner like maven)

Here is the debug logs

sonar-scanner -X -Dsonar.sourceEncoding=UTF-8 -Dsonar.host.url=**** -Dsonar.token=**** -Dsonar.projectKey=***

14:30:24.238 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
14:30:24.249 INFO: Project root configuration file: NONE
14:30:24.269 INFO: SonarScanner 5.0.1.3006
14:30:24.269 INFO: Java 21.0.2 Eclipse Adoptium (64-bit)
14:30:24.269 INFO: Linux 5.15.133.1-microsoft-standard-WSL2 amd64
14:30:24.385 DEBUG: keyStore is : 
14:30:24.385 DEBUG: keyStore type is : pkcs12
14:30:24.385 DEBUG: keyStore provider is : 
14:30:24.385 DEBUG: init keystore
14:30:24.386 DEBUG: init keymanager of type SunX509
14:30:24.447 DEBUG: Create: /home/*****/.sonar/cache
14:30:24.447 INFO: User cache: /home/*****/.sonar/cache
14:30:24.447 DEBUG: Create: /home/*****/.sonar/cache/_tmp
14:30:24.448 DEBUG: Extract sonar-scanner-api-batch in temp...
14:30:24.450 DEBUG: Get bootstrap index...
14:30:24.451 DEBUG: Download: https://*****.*****.ch/batch/index
14:30:24.669 DEBUG: Get bootstrap completed
14:30:24.672 DEBUG: Create isolated classloader...
14:30:24.684 DEBUG: Start temp cleaning...
14:30:24.694 DEBUG: Temp cleaning done
14:30:24.695 DEBUG: Execution getVersion
14:30:24.708 INFO: Analyzing on SonarQube server 10.5.0.89998
14:30:24.708 INFO: Default locale: "en", source code encoding: "UTF-8"
14:30:24.708 DEBUG: Work directory: *****/container-image-az/.scannerwork
14:30:24.709 DEBUG: Execution execute
14:30:24.941 DEBUG: Enterprise 10.5.0.89998
14:30:25.091 INFO: Load global settings
14:30:25.201 DEBUG: GET 200 https://*****.*****.ch/api/settings/values.protobuf | time=108ms
14:30:25.225 INFO: Load global settings (done) | time=134ms
14:30:25.245 INFO: Server id: 20FC515B-AYKhkMzvVeDeF6JyC9op
14:30:25.251 INFO: User cache: /home/*****/.sonar/cache
14:30:25.260 INFO: Loading required plugins
14:30:25.261 INFO: Load plugins index
14:30:25.280 DEBUG: GET 200 https://*****.*****.ch/api/plugins/installed | time=19ms
14:30:25.308 INFO: Load plugins index (done) | time=47ms
14:30:25.308 INFO: Load/download plugins
14:30:25.364 INFO: Load/download plugins (done) | time=56ms
14:30:25.364 DEBUG: Plugins not loaded because they are optional: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, java, javascript, kotlin, php, pli, plsql, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend]
14:30:25.393 DEBUG: Plugins loaded:
14:30:25.393 DEBUG:   * Text Code Quality and Security 2.10.0.2188 (textenterprise)
14:30:25.394 DEBUG:   * Python Code Quality and Security 4.17.0.14845 (python)
14:30:25.394 DEBUG:   * Clean as You Code 2.3.0.1782 (cayc)
14:30:25.394 DEBUG:   * XML Code Quality and Security 2.10.0.4108 (xml)
14:30:25.394 DEBUG:   * JaCoCo 1.3.0.1538 (jacoco)
14:30:25.394 DEBUG:   * IaC Code Quality and Security 1.27.0.9518 (iac)
14:30:25.394 DEBUG:   * Text Code Quality and Security 2.10.0.2188 (text)
14:30:25.424 INFO: Loaded core extensions: developer-scanner
14:30:25.445 DEBUG: Installed core extension: developer-scanner
14:30:25.532 DEBUG: register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda/0x00007fc7982bc800@17271176 with shutdown hook
14:30:25.612 INFO: Process project properties
14:30:25.613 INFO: Process project properties (done) | time=1ms
14:30:25.619 INFO: Project key: container-image-az
14:30:25.619 INFO: Base dir: *****/container-image-az
14:30:25.619 INFO: Working dir: *****/container-image-az/.scannerwork
14:30:25.619 DEBUG: Project global encoding: UTF-8, default locale: en
14:30:25.628 INFO: Load project settings for component key: 'container-image-az'
14:30:25.667 DEBUG: GET 200 https://*****.*****.ch/api/settings/values.protobuf?component=container-image-az | time=39ms
14:30:25.669 INFO: Load project settings for component key: 'container-image-az' (done) | time=41ms
14:30:25.698 INFO: Load project branches
14:30:25.726 DEBUG: GET 200 https://*****.*****.ch/api/project_branches/list?project=container-image-az | time=26ms
14:30:25.735 INFO: Load project branches (done) | time=36ms
14:30:25.736 INFO: Load branch configuration
14:30:25.737 INFO: Load branch configuration (done) | time=1ms
14:30:25.747 DEBUG: Creating module hierarchy
14:30:25.747 DEBUG:   Init module 'container-image-az'
14:30:25.747 DEBUG:     Base dir: *****/container-image-az
14:30:25.748 DEBUG:     Working dir: *****/container-image-az/.scannerwork
14:30:25.748 DEBUG:     Module global encoding: UTF-8, default locale: en
14:30:25.765 INFO: Load quality profiles
14:30:25.837 DEBUG: GET 200 https://*****.*****.ch/api/qualityprofiles/search.protobuf?project=container-image-az | time=71ms
14:30:25.860 INFO: Load quality profiles (done) | time=95ms
14:30:25.908 INFO: Load active rules
14:30:25.973 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKmpRl9Uq_nMddq7mT_&ps=500&p=1 | time=64ms
14:30:26.161 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm08_VeDeF6JyDLdZ&ps=500&p=1 | time=63ms
14:30:26.232 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnFcrVeDeF6JyDMwX&ps=500&p=1 | time=61ms
14:30:26.252 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhkhxmVeDeF6JyDIEY&ps=500&p=1 | time=17ms
14:30:26.568 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm8spVeDeF6JyDL83&ps=500&p=1 | time=316ms
14:30:26.877 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnCtQVeDeF6JyDMk4&ps=500&p=1 | time=278ms
14:30:26.957 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmvNxVeDeF6JyDKtF&ps=500&p=1 | time=64ms
14:30:27.024 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYZt9VnKqIKl8BABtQvu&ps=500&p=1 | time=63ms
14:30:27.162 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnByFVeDeF6JyDMeX&ps=500&p=1 | time=131ms
14:30:27.215 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=9cf0defe-17f2-4293-9248-103f75ac6f5e&ps=500&p=1 | time=42ms
14:30:27.717 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm7MsVeDeF6JyDLlE&ps=500&p=1 | time=500ms
14:30:27.843 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm7MsVeDeF6JyDLlE&ps=500&p=2 | time=110ms
14:30:27.924 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm4SlVeDeF6JyDLjn&ps=500&p=1 | time=78ms
14:30:27.987 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm2x8VeDeF6JyDLf9&ps=500&p=1 | time=62ms
14:30:28.046 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnL4fVeDeF6JyDNK-&ps=500&p=1 | time=57ms
14:30:28.062 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhkiktVeDeF6JyDI8H&ps=500&p=1 | time=15ms
14:30:28.091 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnIxAVeDeF6JyDM6W&ps=500&p=1 | time=29ms
14:30:28.265 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnKakVeDeF6JyDND8&ps=500&p=1 | time=174ms
14:30:28.320 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm1uIVeDeF6JyDLer&ps=500&p=1 | time=51ms
14:30:28.383 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnGU1VeDeF6JyDMx7&ps=500&p=1 | time=62ms
14:30:28.397 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhkivIVeDeF6JyDJDL&ps=500&p=1 | time=12ms
14:30:28.772 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmyl0VeDeF6JyDLF9&ps=500&p=1 | time=375ms
14:30:29.017 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmwSvVeDeF6JyDKvK&ps=500&p=1 | time=234ms
14:30:29.064 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm3j0VeDeF6JyDLiT&ps=500&p=1 | time=42ms
14:30:29.198 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm9vnVeDeF6JyDMG2&ps=500&p=1 | time=133ms
14:30:29.253 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnD1DVeDeF6JyDMtT&ps=500&p=1 | time=52ms
14:30:29.287 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnA_EVeDeF6JyDMdi&ps=500&p=1 | time=33ms
14:30:29.356 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnHIoVeDeF6JyDM1I&ps=500&p=1 | time=68ms
14:30:29.401 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnLLSVeDeF6JyDNJn&ps=500&p=1 | time=43ms
14:30:29.483 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYZt9W2oqIKl8BABtQxw&ps=500&p=1 | time=80ms
14:30:29.542 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnEnbVeDeF6JyDMuz&ps=500&p=1 | time=51ms
14:30:29.859 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmxZvVeDeF6JyDK5A&ps=500&p=1 | time=316ms
14:30:29.964 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmz97VeDeF6JyDLZS&ps=500&p=1 | time=95ms
14:30:30.145 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm_1JVeDeF6JyDMU4&ps=500&p=1 | time=179ms
14:30:30.233 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnH9rVeDeF6JyDM39&ps=500&p=1 | time=83ms
14:30:30.289 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYvR8P-RlNsVYgEArIcP&ps=500&p=1 | time=55ms
14:30:30.354 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmuC9VeDeF6JyDKpr&ps=500&p=1 | time=57ms
14:30:30.574 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm-r_VeDeF6JyDMK9&ps=500&p=1 | time=219ms
14:30:30.884 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnJcEVeDeF6JyDM6b&ps=500&p=1 | time=306ms
14:30:30.910 INFO: Load active rules (done) | time=5002ms
14:30:30.916 INFO: Load analysis cache
14:30:30.930 DEBUG: GET 404 https://*****.*****.ch/api/analysis_cache/get?project=container-image-az | time=13ms
14:30:30.931 INFO: Load analysis cache (404) | time=15ms
14:30:30.962 DEBUG: GET 200 https://*****.*****.ch/api/languages/list | time=9ms
14:30:30.990 DEBUG: Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes : 
14:30:30.991 DEBUG: Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
14:30:30.991 DEBUG: Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
14:30:30.991 DEBUG: Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
14:30:30.992 DEBUG: Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
14:30:30.992 DEBUG: Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
14:30:30.992 DEBUG: Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
14:30:30.993 DEBUG: Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
14:30:30.993 DEBUG: Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.pks,**/*.pkb
14:30:30.993 DEBUG: Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
14:30:30.993 DEBUG: Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
14:30:30.994 DEBUG: Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
14:30:30.994 DEBUG: Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
14:30:30.994 DEBUG: Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl,**/*.config
14:30:30.994 DEBUG: Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
14:30:30.995 DEBUG: Declared patterns of language Text were converted to sonar.lang.patterns.text : 
14:30:30.995 DEBUG: Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
14:30:30.995 DEBUG: Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation : 
14:30:30.995 DEBUG: Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
14:30:30.995 DEBUG: Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
14:30:30.995 DEBUG: Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp
14:30:30.996 DEBUG: Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
14:30:30.996 DEBUG: Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
14:30:30.996 DEBUG: Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
14:30:30.996 DEBUG: Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
14:30:30.996 DEBUG: Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
14:30:30.996 DEBUG: Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
14:30:30.997 DEBUG: Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
14:30:30.997 DEBUG: Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets : 
14:30:30.997 DEBUG: Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
14:30:30.997 DEBUG: Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
14:30:30.998 DEBUG: Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol : 
14:30:30.998 DEBUG: Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
14:30:30.998 DEBUG: Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
14:30:30.998 DEBUG: Declared patterns of language AzureResourceManager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
14:30:30.999 DEBUG: Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
14:30:30.999 DEBUG: Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
14:30:30.999 DEBUG: Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
14:30:31.013 INFO: Preprocessing files...
14:30:31.024 DEBUG: loading config FileBasedConfig[/home/*****/.config/jgit/config]
14:30:31.026 DEBUG: readpipe [/usr/bin/git, --version],/usr/bin
14:30:31.036 DEBUG: readpipe may return 'git version 2.43.2'
14:30:31.036 DEBUG: remaining output:

14:30:31.036 DEBUG: readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
14:30:31.042 DEBUG: readpipe may return 'file:/etc/gitconfigcore.longpaths'
14:30:31.042 DEBUG: remaining output:

14:30:31.042 DEBUG: true
14:30:31.042 DEBUG: loading config FileBasedConfig[/etc/gitconfig]
14:30:31.043 DEBUG: loading config FileBasedConfig[/home/*****/.config/git/config]
14:30:31.043 DEBUG: loading config UserConfigFile[/home/*****/.gitconfig]
14:30:31.085 DEBUG: 10 non excluded files in this Git repository
14:30:31.107 INFO: 3 languages detected in 7 preprocessed files
14:30:31.107 INFO: 0 files ignored because of scm ignore settings
14:30:31.110 INFO: Loading plugins for detected languages
14:30:31.110 DEBUG: Detected languages: [json, yaml, docker]
14:30:31.110 INFO: Load/download plugins
14:30:31.133 INFO: Load/download plugins (done) | time=23ms
14:30:31.134 DEBUG: Optional language-specific plugins not loaded: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, java, kotlin, php, pli, plsql, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, securitycsharpfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend]
14:30:31.167 DEBUG: Plugins loaded:
14:30:31.168 DEBUG:   * Vulnerability Analysis 10.5.0.30668 (security)
14:30:31.168 DEBUG:   * Vulnerability Rules for JS 10.5.0.30668 (securityjsfrontend)
14:30:31.168 DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 10.13.2.25981 (javascript)
14:30:31.294 INFO: Inconsistent constructor declaration on bean with name 'org.sonarsource.scanner.api.internal.IsolatedClassloader@5bd03f44-org.sonar.scanner.issue.IssueFilters': single autowire-marked constructor flagged as optional - this constructor is effectively required since there is no default constructor to fall back to: public org.sonar.scanner.issue.IssueFilters(org.sonar.api.batch.fs.internal.DefaultInputProject)
14:30:31.308 INFO: Load project repositories
14:30:31.346 DEBUG: GET 200 https://*****.*****.ch/batch/project.protobuf?key=container-image-az | time=38ms
14:30:31.356 INFO: Load project repositories (done) | time=48ms
14:30:31.372 DEBUG: Available languages:
14:30:31.372 DEBUG:   * JavaScript => "js"
14:30:31.372 DEBUG:   * TypeScript => "ts"
14:30:31.372 DEBUG:   * CSS => "css"
14:30:31.372 DEBUG:   * Python => "py"
14:30:31.372 DEBUG:   * XML => "xml"
14:30:31.372 DEBUG:   * Terraform => "terraform"
14:30:31.372 DEBUG:   * CloudFormation => "cloudformation"
14:30:31.372 DEBUG:   * Kubernetes => "kubernetes"
14:30:31.372 DEBUG:   * Docker => "docker"
14:30:31.372 DEBUG:   * AzureResourceManager => "azureresourcemanager"
14:30:31.372 DEBUG:   * YAML => "yaml"
14:30:31.372 DEBUG:   * JSON => "json"
14:30:31.372 DEBUG:   * Text => "text"
14:30:31.372 DEBUG:   * Secrets => "secrets"
14:30:31.380 INFO: Indexing files...
14:30:31.380 INFO: Project configuration:
14:30:31.383 DEBUG: 'catalog-info.yaml' indexed with language 'yaml'
14:30:31.385 DEBUG: 'renovate.json' indexed with language 'json'
14:30:31.386 DEBUG: 'README.md' indexed with no language
14:30:31.386 DEBUG: 'Jenkinsfile' indexed with no language
14:30:31.386 DEBUG: 'docs/index.md' indexed with no language
14:30:31.387 DEBUG: 'Dockerfile' indexed with language 'docker'
14:30:31.387 DEBUG: 'mkdocs.yml' indexed with language 'yaml'
14:30:31.388 INFO: 7 files indexed
14:30:31.389 INFO: Quality profile for docker: Sonar way
14:30:31.389 INFO: Quality profile for json: Sonar way
14:30:31.389 INFO: Quality profile for yaml: Sonar way
14:30:31.389 INFO: ------------- Run sensors on module container-image-az
14:30:31.437 INFO: Load metrics repository
14:30:31.457 DEBUG: GET 200 https://*****.*****.ch/api/metrics/search?ps=500&p=1 | time=19ms
14:30:31.466 INFO: Load metrics repository (done) | time=29ms
14:30:31.918 DEBUG: Added 308 checks for language='ts', repository='typescript'
14:30:31.925 DEBUG: Added 15 checks for language='ts', repository='tssecurity'
14:30:31.929 DEBUG: Added 307 checks for language='js', repository='javascript'
14:30:31.935 DEBUG: Added 15 checks for language='js', repository='jssecurity'
14:30:31.994 DEBUG: 'Import external issues report' skipped because one of the required properties is missing
14:30:31.995 DEBUG: 'Python Sensor' skipped because there is no related file in current project
14:30:31.995 DEBUG: 'Cobertura Sensor for Python coverage' skipped because there is no related file in current project
14:30:31.995 DEBUG: 'PythonXUnitSensor' skipped because there is no related file in current project
14:30:31.996 DEBUG: 'Import of Pylint issues' skipped because there is no related file in current project
14:30:31.996 DEBUG: 'Import of Bandit issues' skipped because there is no related file in current project
14:30:31.996 DEBUG: 'Import of Flake8 issues' skipped because there is no related file in current project
14:30:31.996 DEBUG: 'Import of Mypy issues' skipped because there is no related file in current project
14:30:31.997 DEBUG: 'Import of Ruff issues' skipped because there is no related file in current project
14:30:31.997 DEBUG: 'XML Sensor' skipped because there is no related file in current project
14:30:31.997 DEBUG: 'IaC Terraform Sensor' skipped because there is no related file in current project
14:30:31.998 DEBUG: 'JavaScript/TypeScript analysis' skipped because there is no related file in current project
14:30:31.998 DEBUG: 'JavaScript inside HTML analysis' skipped because there is no related file in current project
14:30:31.999 DEBUG: 'JavaScript/TypeScript Coverage' skipped because there is no related file in current project
14:30:31.999 DEBUG: 'Import of ESLint issues' skipped because one of the required properties is missing
14:30:31.999 DEBUG: 'Import of TSLint issues' skipped because one of the required properties is missing
14:30:31.999 DEBUG: 'CSS Metrics' skipped because there is no related file in current project
14:30:32.000 DEBUG: 'Import of stylelint issues' skipped because one of the required properties is missing
14:30:32.002 DEBUG: 'Generic Test Executions Report' skipped because one of the required properties is missing
14:30:32.002 DEBUG: Sensors : JaCoCo XML Report Importer -> IaC CloudFormation Sensor -> IaC Kubernetes Sensor -> IaC AzureResourceManager Sensor -> JavaScript inside YAML analysis -> CSS Rules -> IaC Docker Sensor -> Serverless configuration file sensor -> AWS SAM template file sensor -> AWS SAM Inline template file sensor -> EnterpriseSecretsSensor -> TextAndSecretsSensor -> JavaSecuritySensor -> CSharpSecuritySensor -> PhpSecuritySensor -> PythonSecuritySensor -> JsSecuritySensor
14:30:32.004 INFO: Sensor JaCoCo XML Report Importer [jacoco]
14:30:32.005 INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
14:30:32.006 INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
14:30:32.006 INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3ms
14:30:32.006 INFO: Sensor IaC CloudFormation Sensor [iac]
14:30:32.020 DEBUG: 'mkdocs.yml' generated metadata with charset 'UTF-8'
14:30:32.021 DEBUG: File without identifier 'AWSTemplateFormatVersion': mkdocs.yml
14:30:32.022 DEBUG: 'renovate.json' generated metadata with charset 'UTF-8'
14:30:32.023 DEBUG: File without identifier 'AWSTemplateFormatVersion': renovate.json
14:30:32.024 DEBUG: 'catalog-info.yaml' generated metadata with charset 'UTF-8'
14:30:32.024 DEBUG: File without identifier 'AWSTemplateFormatVersion': catalog-info.yaml
14:30:32.030 INFO: 0 source files to be analyzed
14:30:32.039 INFO: 0/0 source files have been analyzed
14:30:32.039 INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=33ms
14:30:32.039 INFO: Sensor IaC Kubernetes Sensor [iac]
14:30:32.041 DEBUG: Checking conditions for enabling Helm analysis: isNotSonarLintContext=true, isHelmActivationFlagTrue=true, isHelmEvaluatorExecutableAvailable=true
14:30:32.041 DEBUG: Initializing Helm processor
14:30:32.092 DEBUG: File without Kubernetes identifier: mkdocs.yml
14:30:32.093 INFO: 1 source file to be analyzed
14:30:32.148 INFO: 1/1 source file has been analyzed
14:30:32.148 DEBUG: Kubernetes Parsing Statistics: Pure Kubernetes files count: 1, parsed: 1, not parsed: 0; Helm files count: 0, parsed: 0, not parsed: 0
14:30:32.148 INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=109ms
14:30:32.148 INFO: Sensor IaC AzureResourceManager Sensor [iac]
14:30:32.148 DEBUG: File without identifier 'https://schema.management.azure.com/schemas/': renovate.json
14:30:32.149 INFO: 0 source files to be analyzed
14:30:32.230 INFO: 0/0 source files have been analyzed
14:30:32.230 INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=82ms
14:30:32.230 INFO: Sensor JavaScript inside YAML analysis [javascript]
14:30:32.239 INFO: No input files found for analysis
14:30:32.240 INFO: Hit the cache for 0 out of 0
14:30:32.241 INFO: Miss the cache for 0 out of 0
14:30:32.241 INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=11ms
14:30:32.241 INFO: Sensor CSS Rules [javascript]
14:30:32.242 INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
14:30:32.242 INFO: Sensor CSS Rules [javascript] (done) | time=1ms
14:30:32.242 INFO: Sensor IaC Docker Sensor [iac]
14:30:32.243 INFO: 1 source file to be analyzed
14:30:32.277 DEBUG: 'Dockerfile' generated metadata with charset 'UTF-8'
14:30:32.332 INFO: 1/1 source file has been analyzed
14:30:32.332 INFO: Sensor IaC Docker Sensor [iac] (done) | time=90ms
14:30:32.332 INFO: Sensor Serverless configuration file sensor [security]
14:30:32.333 INFO: 0 Serverless function entries were found in the project
14:30:32.334 INFO: 0 Serverless function handlers were kept as entrypoints
14:30:32.334 INFO: Sensor Serverless configuration file sensor [security] (done) | time=2ms
14:30:32.334 INFO: Sensor AWS SAM template file sensor [security]
14:30:32.336 DEBUG: 0 SAM template configuration files were found in the project. 0 SAM function entries were found in total. 0 were kept as potential entrypoints.
14:30:32.336 INFO: Sensor AWS SAM template file sensor [security] (done) | time=2ms
14:30:32.336 INFO: Sensor AWS SAM Inline template file sensor [security]
14:30:32.338 DEBUG: 0 SAM Inline template configuration files were found in the project. 0 SAM Inline function entries were found in total. 0 were kept as potential entrypoints.
14:30:32.338 INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=2ms
14:30:32.338 INFO: Sensor EnterpriseSecretsSensor [textenterprise]
14:30:32.338 INFO: Available processors: 4
14:30:32.338 INFO: Using 4 threads for analysis.
14:30:32.342 INFO: Sensor EnterpriseSecretsSensor [textenterprise] (done) | time=4ms
14:30:32.342 INFO: Sensor TextAndSecretsSensor [text]
14:30:32.342 INFO: Available processors: 4
14:30:32.342 INFO: Using 4 threads for analysis.
14:30:32.768 DEBUG: Analyzing only language associated files, "sonar.text.inclusions.activate" property is deactivated
14:30:32.800 INFO: 4 source files to be analyzed
14:30:32.849 INFO: 4/4 source files have been analyzed
14:30:32.850 INFO: Sensor TextAndSecretsSensor [text] (done) | time=507ms
14:30:32.850 INFO: Sensor JavaSecuritySensor [security]
14:30:32.851 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
14:30:32.852 INFO: Load type hierarchy and UCFGs: Starting
14:30:32.852 INFO: Load type hierarchy: Starting
14:30:32.852 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/java
14:30:32.852 INFO: Read 0 type definitions
14:30:32.854 INFO: Load type hierarchy: Time spent was 00:00:00.001
14:30:32.854 INFO: Load UCFGs: Starting
14:30:32.854 INFO: Load UCFGs: Time spent was 00:00:00.000
14:30:32.854 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001
14:30:32.854 INFO: No UCFGs have been included for analysis.
14:30:32.855 INFO: java security sensor: Time spent was 00:00:00.004
14:30:32.865 INFO: Sensor JavaSecuritySensor [security] (done) | time=15ms
14:30:32.865 INFO: Sensor CSharpSecuritySensor [security]
14:30:32.866 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
14:30:32.866 INFO: Load type hierarchy and UCFGs: Starting
14:30:32.866 INFO: Load type hierarchy: Starting
14:30:32.866 INFO: Reading type hierarchy from: *****/container-image-az/ucfg2/cs
14:30:32.866 INFO: Read 0 type definitions
14:30:32.866 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:30:32.866 INFO: Load UCFGs: Starting
14:30:32.866 INFO: Load UCFGs: Time spent was 00:00:00.000
14:30:32.866 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:30:32.866 INFO: No UCFGs have been included for analysis.
14:30:32.866 INFO: csharp security sensor: Time spent was 00:00:00.001
14:30:32.867 INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
14:30:32.867 INFO: Sensor PhpSecuritySensor [security]
14:30:32.867 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
14:30:32.867 INFO: Load type hierarchy and UCFGs: Starting
14:30:32.867 INFO: Load type hierarchy: Starting
14:30:32.867 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/php
14:30:32.867 INFO: Read 0 type definitions
14:30:32.867 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:30:32.867 INFO: Load UCFGs: Starting
14:30:32.867 INFO: Load UCFGs: Time spent was 00:00:00.000
14:30:32.867 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:30:32.868 INFO: No UCFGs have been included for analysis.
14:30:32.868 INFO: php security sensor: Time spent was 00:00:00.000
14:30:32.868 INFO: Sensor PhpSecuritySensor [security] (done) | time=1ms
14:30:32.868 INFO: Sensor PythonSecuritySensor [security]
14:30:32.868 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
14:30:32.868 INFO: Load type hierarchy and UCFGs: Starting
14:30:32.868 INFO: Load type hierarchy: Starting
14:30:32.868 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/python
14:30:32.869 INFO: Read 0 type definitions
14:30:32.869 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:30:32.869 INFO: Load UCFGs: Starting
14:30:32.869 INFO: Load UCFGs: Time spent was 00:00:00.000
14:30:32.869 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:30:32.869 INFO: No UCFGs have been included for analysis.
14:30:32.869 INFO: python security sensor: Time spent was 00:00:00.001
14:30:32.869 INFO: Sensor PythonSecuritySensor [security] (done) | time=1ms
14:30:32.870 INFO: Sensor JsSecuritySensor [security]
14:30:32.870 INFO: Enabled taint analysis rules: S5131, S5144, S5146, S6287, S5883, S5696, S6096, S6105, S5334, S2083, S3649, S2631, S5147, S6350, S2076
14:30:32.870 INFO: Load type hierarchy and UCFGs: Starting
14:30:32.870 INFO: Load type hierarchy: Starting
14:30:32.870 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/js
14:30:32.870 INFO: Read 0 type definitions
14:30:32.870 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:30:32.870 INFO: Load UCFGs: Starting
14:30:32.870 INFO: Load UCFGs: Time spent was 00:00:00.000
14:30:32.871 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:30:32.871 INFO: No UCFGs have been included for analysis.
14:30:32.871 INFO: js security sensor: Time spent was 00:00:00.001
14:30:32.871 INFO: Sensor JsSecuritySensor [security] (done) | time=1ms
14:30:32.876 INFO: ------------- Run sensors on project
14:30:32.903 DEBUG: 'Generic Coverage Report' skipped because one of the required properties is missing
14:30:32.903 DEBUG: 'Import external issues report from SARIF file.' skipped because one of the required properties is missing
14:30:32.903 DEBUG: 'Java CPD Block Indexer' skipped because there is no related file in current project
14:30:32.903 DEBUG: Sensors : Zero Coverage Sensor
14:30:32.904 INFO: Sensor Zero Coverage Sensor
14:30:32.904 INFO: Sensor Zero Coverage Sensor (done) | time=0ms
14:30:32.914 INFO: CPD Executor Calculating CPD for 0 files
14:30:32.914 INFO: CPD Executor CPD calculation finished (done) | time=0ms
14:30:32.922 INFO: SCM revision ID '2cd61f3d4141a858440381d598fbb4639896ba19'
14:30:32.974 INFO: Load New Code definition
14:30:32.991 DEBUG: GET 200 https://*****.*****.ch/api/new_code_periods/show.protobuf?project=container-image-az&branch=main | time=17ms
14:30:32.993 INFO: Load New Code definition (done) | time=19ms
14:30:32.994 WARN: New Code reference branch is set to the branch being analyzed. Skipping the computation of New Code
14:30:32.997 INFO: Analysis report generated in 79ms, dir size=242.3 kB
14:30:33.011 INFO: Analysis report compressed in 13ms, zip size=32.0 kB
14:30:33.011 INFO: Analysis report generated in *****/container-image-az/.scannerwork/scanner-report
14:30:33.011 DEBUG: Upload report
14:30:33.049 DEBUG: POST 200 https://*****.*****.ch/api/ce/submit?projectKey=container-image-az | time=37ms
14:30:33.051 INFO: Analysis report uploaded in 39ms
14:30:33.052 DEBUG: Report metadata written to *****/container-image-az/.scannerwork/report-task.txt
14:30:33.052 INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://*****.*****.ch/dashboard?id=container-image-az
14:30:33.052 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
14:30:33.052 INFO: More about the report processing at https://*****.*****.ch/api/ce/task?id=cd33db22-691e-42a1-8ba4-fc412de175db
14:30:33.056 DEBUG: Post-jobs : 
14:30:33.062 INFO: Analysis total time: 7.636 s
14:30:33.063 INFO: ------------------------------------------------------------------------
14:30:33.064 INFO: EXECUTION SUCCESS
14:30:33.064 INFO: ------------------------------------------------------------------------
14:30:33.064 INFO: Total time: 8.844s
14:30:33.127 INFO: Final Memory: 23M/80M
14:30:33.127 INFO: ------------------------------------------------------------------------
Exception in thread "Thread-0" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
        at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
        at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
        at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
        at ch.qos.logback.classic.Logger.error(Logger.java:543)
        at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
        at java.base/java.lang.Thread.run(Thread.java:1583)
Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
        at java.base/java.net.URLClassLoader.findClass(URLClassLoader.java:445)
        at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
        at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:526)
        ... 6 more

Like you see it dosn’t fail the build but it’s very confusing for users…

Any idea ?

1 Like

Hi @Colin sorry to ping you directly, but something you might be interested

Seems I’m not the only one facing this issue with SonarQube scanner on both JDK 17 and 21

Thanks for your support

Hi,

also noticed this behaviour with Sonar Maven plugin 3.11 and Sonarqube 10.5.0 Enterprise.
Maven Build and Sonarqube run both on Windows.

Gilbert

3 Likes

Hi all,

I have nothing helpful offer, but I wanted to let you know that this has been flagged for the team. And thanks for the reports!

 
Ann

4 Likes

I noticed the same issue:
sonar:3.11.0.3922
Java 21.0.2 Eclipse Adoptium (64-bit)
Sonar server 10.5.0.89998

Exception in thread "Thread-1" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
	at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
	at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
	at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
	at ch.qos.logback.classic.Logger.error(Logger.java:543)
	at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
	at java.base/java.lang.Thread.run(Thread.java:1583)
Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
	at java.base/java.net.URLClassLoader.findClass(URLClassLoader.java:445)
	at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
	at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:526)

After upgrading to 10.5 we are seeing the following error in our builds.
It occurs after analysis is successfull.

##[error]Exception in thread "Thread-1" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
##[error]at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
at ch.qos.logback.classic.Logger.error(Logger.java:543)
at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
at java.base/java.lang.Thread.run(Unknown Source)
...

SonarScanner for MSBuild 5.15
SonarQube version v10.5 (89998)

Build agents capabilities
java C:\Program Files\Eclipse Adoptium\jre-21.0.1.12-hotspot
java_21_x64 C:\Program Files\Eclipse Adoptium\jre-21.0.1.12-hotspot\

I was getting the same issue with Oracle JDK 22, but after I switch on the OpenJDK 22.0.1 everything works normally.

All I’ve done is downloading OpenJDK from here and adding absolute path to the jdk-22.0.1\bin in System Environment Variable named ‘Path’.

P.S. I’m talking about Windows system.

1 Like

Welcome :slight_smile:

Your Sonarqube server in version 10.5.0 runs with Java 17 and the scanner runs with Java 22.0.1,
or both on Java 22.0.1 ?
Which scanner do you use, Sonar Maven plugin, Sonar CLI scanner or … ?

Gilbert

Hi,
Do we have any update on this issue?

Facing similar problems after upgrading from 10.4 to 10.5.
Java on both SonarQube Server and Azure Pipeline agents are using Azul Zulu OpenJDK 17.0.8.1+1.
All running on Windows System.

We’re facing the same issue after upgrading to 10.5
JRE version on clients are 17.0.2 and 21.0.3.

Same issue here.
I have updated SonarQube to 10.5 and I am using the Azure DevOps plugin.
I have made tests both with JDK 17 and JDK 21 (via the jdkversion: JAVA_HOME_XX_X64 option) and the scanner throws the same errors in both cases.

Same issue here: after upgrading to 10.5 Azure DevOps plugin with JDK 17. All running on Linux.

Hey all.

Thanks for the reports. The issue is tracked at SONAR-22152.

Since it doesn’t cause an analysis failure, barring any other issues (feel free to report them), we are targeting a fix in SonarQube v10.6.

If it is causing other issues, please let us know.

4 Likes

It seems this error causes the .coverage file to not be processed by SonarQube. since 10.5, we’ll lost all code coverage report in Sonar (0%) while they appear correctly on out DevOps side.

Not just a cosmetic error.

@Pierrick I’d be really surprised if these two are linked. Can you create a new thread, and make sure you’ve checked the logs about importing code coverage?

I have the same error in sonarqube/sonarqube-10.5.0 helm chart version

I check java version in sonarqube2-sonarqube-0 pod container.

$ java --version
openjdk 17.0.11 2024-04-16
OpenJDK Runtime Environment Temurin-17.0.11+9 (build 17.0.11+9)
OpenJDK 64-Bit Server VM Temurin-17.0.11+9 (build 17.0.11+9, mixed mode, sharing)

And I run this command in my repo

/home/zti/Desktop/sonar-scanner-cli-5.0.1.3006-linux/sonar-scanner-5.0.1.3006-linux/bin/sonar-scanner -X -Dsonar.host.url=<my_sonarqube_url> -Dsonar.token=<my-token>

then I got this error :-

15:23:08.362 INFO: Total time: 14.512s
15:23:08.375 INFO: Final Memory: 18M/136M
15:23:08.375 INFO: ------------------------------------------------------------------------
Exception in thread "Thread-1" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
	at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
	at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
	at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
	at ch.qos.logback.classic.Logger.error(Logger.java:543)
	at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
	at java.base/java.lang.Thread.run(Unknown Source)
Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
	at java.base/java.net.URLClassLoader.findClass(Unknown Source)
	at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
	at java.base/java.lang.ClassLoader.loadClass(Unknown Source)

Here code is successfully scanned, but the GitLab pipeline failed. So how do solve this error?

hello !!
i got the same error, it doesn’t cause an analysis failure in local but in github actions it does !