java.lang.IllegalArgumentException: Invalid version format - Jenkins-SonarScanner plugin

Must-share information (formatted with Markdown):

  • which versions are you using (SonarQube, Scanner, Plugin, and any relevant extension)
  • what are you trying to achieve
  • what have you tried so far to achieve this

SonarQube Version - sonarqube-8.6.0.39681
Sonar Scanner Version - sonar-scanner-4.5.0.2216-linux
Jenkins version - Jenkins 2.263.1
SonarQube Scanner for Jenkins -Plugin- Version 2.13

It was working fine earlier. Jenkins gets Sonar Quality Gates result and will be shown in the Job Page of Jenkins.
Now i updated the SonarQube Scanner for Jenkins plugin and after that Sonar Quality Gate is not showing in the web page of jenkins. In the jenkins error log , the following exception is throwing each time i open the job in jenkins.

2021-01-09 10:49:45.175+0000 [id=21]	INFO	hudson.WebAppMain$3#run: Jenkins is fully up and running
2021-01-09 10:51:40.763+0000 [id=61]	WARNING	h.p.s.client.SQProjectResolver#resolve: Error fetching project information
java.lang.IllegalArgumentException: Invalid version format: <!doctype html><html lang="en"><head><meta http-equiv="content-type" content="text/html; charset=UTF-8" charset="UTF-8"/></div><script>window.baseUrl = '';
    window.serverStatus = 'UP';
    window.instance = 'SonarQube';
    window.official = true;</script><script type="module" src="/js/vendors-main.m.38e7274b.chunk.js"></script><script nomodule src="/js/vendors-main.1607330783916.chunk.js"></script><script type="module" src="/js/main.m.8194591b.js"></script><script nomodule src="/js/main.1607330783916.js"></script></body></html>
	at hudson.plugins.sonar.utils.Version.<init>(Version.java:33)
	at hudson.plugins.sonar.client.SQProjectResolver.lambda$resolve$1(SQProjectResolver.java:66)
	at com.google.common.cache.LocalCache$LocalManualCache$1.load(LocalCache.java:4767)
	at com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3568)
	at com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2350)
	at com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2313)
	at com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2228)
Caused: com.google.common.util.concurrent.UncheckedExecutionException
	at com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2234)
	at com.google.common.cache.LocalCache.get(LocalCache.java:3965)
	at com.google.common.cache.LocalCache$LocalManualCache.get(LocalCache.java:4764)
	at hudson.plugins.sonar.client.SQProjectResolver.resolve(SQProjectResolver.java:66)
	at hudson.plugins.sonar.action.SonarCacheAction.get(SonarCacheAction.java:77)
	at hudson.plugins.sonar.action.SonarCacheAction.get(SonarCacheAction.java:52)
	at hudson.plugins.sonar.action.SonarProjectActionFactory.createProjectPage(SonarProjectActionFactory.java:118)
	at hudson.plugins.sonar.action.SonarProjectActionFactory.createFor(SonarProjectActionFactory.java:83)
	at hudson.plugins.sonar.action.SonarProjectActionFactory.createFor(SonarProjectActionFactory.java:42)
	at hudson.model.Actionable.createFor(Actionable.java:114)
	at hudson.model.Actionable.getAllActions(Actionable.java:100)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.apache.commons.jexl.util.PropertyExecutor.execute(PropertyExecutor.java:125)
	at org.apache.commons.jexl.util.introspection.UberspectImpl$VelGetterImpl.invoke(UberspectImpl.java:314)
	at org.apache.commons.jexl.parser.ASTArrayAccess.evaluateExpr(ASTArrayAccess.java:185)
	at org.apache.commons.jexl.parser.ASTIdentifier.execute(ASTIdentifier.java:75)
	at org.apache.commons.jexl.parser.ASTReference.execute(ASTReference.java:83)
	at org.apache.commons.jexl.parser.ASTReference.value(ASTReference.java:57)
	at org.apache.commons.jexl.parser.ASTElvisNode.value(ASTElvisNode.java:37)
	at org.apache.commons.jexl.parser.ASTExpression.value(ASTExpression.java:54)
	at org.apache.commons.jexl.parser.ASTElvisNode.value(ASTElvisNode.java:40)
	at org.apache.commons.jexl.parser.ASTExpression.value(ASTExpression.java:54)
	at org.apache.commons.jexl.parser.ASTExpressionExpression.value(ASTExpressionExpression.java:56)
	at org.apache.commons.jexl.ExpressionImpl.evaluate(ExpressionImpl.java:80)
	at hudson.ExpressionFactory2$JexlExpression.evaluate(ExpressionFactory2.java:74)
	at org.apache.commons.jelly.expression.ExpressionSupport.evaluateRecurse(ExpressionSupport.java:61)
	at org.apache.commons.jelly.expression.ExpressionSupport.evaluateAsIterator(ExpressionSupport.java:94)
	at org.apache.commons.jelly.tags.core.ForEachTag.doTag(ForEachTag.java:89)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.CallTagLibScript.run(CallTagLibScript.java:120)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.JellyViewScript.run(JellyViewScript.java:95)
	at org.kohsuke.stapler.jelly.IncludeTag.doTag(IncludeTag.java:147)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.JellyViewScript.run(JellyViewScript.java:95)
	at org.kohsuke.stapler.jelly.IncludeTag.doTag(IncludeTag.java:147)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.CallTagLibScript$1.run(CallTagLibScript.java:99)
	at org.apache.commons.jelly.tags.define.InvokeBodyTag.doTag(InvokeBodyTag.java:91)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.kohsuke.stapler.jelly.ReallyStaticTagLibrary$1.run(ReallyStaticTagLibrary.java:100)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.CallTagLibScript.run(CallTagLibScript.java:120)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.CallTagLibScript$1.run(CallTagLibScript.java:99)
	at org.apache.commons.jelly.tags.define.InvokeBodyTag.doTag(InvokeBodyTag.java:91)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$1.run(CoreTagLibrary.java:98)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.CallTagLibScript.run(CallTagLibScript.java:120)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.JellyViewScript.run(JellyViewScript.java:95)
	at org.kohsuke.stapler.jelly.IncludeTag.doTag(IncludeTag.java:147)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.CallTagLibScript$1.run(CallTagLibScript.java:99)
	at org.apache.commons.jelly.tags.define.InvokeBodyTag.doTag(InvokeBodyTag.java:91)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.ReallyStaticTagLibrary$1.run(ReallyStaticTagLibrary.java:100)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$1.run(CoreTagLibrary.java:98)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.ReallyStaticTagLibrary$1.run(ReallyStaticTagLibrary.java:100)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.ReallyStaticTagLibrary$1.run(ReallyStaticTagLibrary.java:100)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.ReallyStaticTagLibrary$1.run(ReallyStaticTagLibrary.java:100)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.kohsuke.stapler.jelly.CallTagLibScript$1.run(CallTagLibScript.java:99)
	at org.apache.commons.jelly.tags.define.InvokeBodyTag.doTag(InvokeBodyTag.java:91)
	at org.apache.commons.jelly.impl.TagScript.run(TagScript.java:269)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.CallTagLibScript.run(CallTagLibScript.java:120)
	at org.apache.commons.jelly.impl.ScriptBlock.run(ScriptBlock.java:95)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.CallTagLibScript.run(CallTagLibScript.java:120)
	at org.apache.commons.jelly.tags.core.CoreTagLibrary$2.run(CoreTagLibrary.java:105)
	at org.kohsuke.stapler.jelly.JellyViewScript.run(JellyViewScript.java:95)
	at org.kohsuke.stapler.jelly.DefaultScriptInvoker.invokeScript(DefaultScriptInvoker.java:64)
	at org.kohsuke.stapler.jelly.DefaultScriptInvoker.invokeScript(DefaultScriptInvoker.java:54)
	at org.kohsuke.stapler.jelly.ScriptInvoker.execute(ScriptInvoker.java:56)
	at org.kohsuke.stapler.jelly.ScriptInvoker.execute(ScriptInvoker.java:43)
	at org.kohsuke.stapler.Facet.handleIndexRequest(Facet.java:284)
	at org.kohsuke.stapler.jelly.JellyFacet.handleIndexRequest(JellyFacet.java:100)
	at org.kohsuke.stapler.IndexViewDispatcher.dispatch(IndexViewDispatcher.java:32)
	at org.kohsuke.stapler.Stapler.tryInvoke(Stapler.java:766)
	at org.kohsuke.stapler.Stapler.invoke(Stapler.java:898)
	at org.kohsuke.stapler.MetaClass$4.doDispatch(MetaClass.java:281)
	at org.kohsuke.stapler.NameBasedDispatcher.dispatch(NameBasedDispatcher.java:58)
	at org.kohsuke.stapler.Stapler.tryInvoke(Stapler.java:766)
	at org.kohsuke.stapler.Stapler.invoke(Stapler.java:898)
	at org.kohsuke.stapler.Stapler.invoke(Stapler.java:694)
	at org.kohsuke.stapler.Stapler.service(Stapler.java:240)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:790)
	at org.eclipse.jetty.servlet.ServletHolder.handle(ServletHolder.java:763)
	at org.eclipse.jetty.servlet.ServletHandler$ChainEnd.doFilter(ServletHandler.java:1633)
	at hudson.util.PluginServletFilter$1.doFilter(PluginServletFilter.java:154)
	at jenkins.security.ResourceDomainFilter.doFilter(ResourceDomainFilter.java:76)
	at hudson.util.PluginServletFilter$1.doFilter(PluginServletFilter.java:151)
	at jenkins.telemetry.impl.UserLanguages$AcceptLanguageFilter.doFilter(UserLanguages.java:129)
	at hudson.util.PluginServletFilter$1.doFilter(PluginServletFilter.java:151)
	at hudson.util.PluginServletFilter.doFilter(PluginServletFilter.java:157)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at hudson.security.csrf.CrumbFilter.doFilter(CrumbFilter.java:159)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:84)
	at hudson.security.UnwrapSecurityExceptionFilter.doFilter(UnwrapSecurityExceptionFilter.java:51)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at jenkins.security.ExceptionTranslationFilter.doFilter(ExceptionTranslationFilter.java:119)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at org.acegisecurity.providers.anonymous.AnonymousProcessingFilter.doFilter(AnonymousProcessingFilter.java:125)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at org.acegisecurity.ui.rememberme.RememberMeProcessingFilter.doFilter(RememberMeProcessingFilter.java:142)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at org.acegisecurity.ui.AbstractProcessingFilter.doFilter(AbstractProcessingFilter.java:271)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at jenkins.security.BasicHeaderProcessor.doFilter(BasicHeaderProcessor.java:93)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at org.acegisecurity.context.HttpSessionContextIntegrationFilter.doFilter(HttpSessionContextIntegrationFilter.java:249)
	at hudson.security.HttpSessionContextIntegrationFilter2.doFilter(HttpSessionContextIntegrationFilter2.java:67)
	at hudson.security.ChainedServletFilter$1.doFilter(ChainedServletFilter.java:87)
	at hudson.security.ChainedServletFilter.doFilter(ChainedServletFilter.java:90)
	at hudson.security.HudsonFilter.doFilter(HudsonFilter.java:171)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at org.kohsuke.stapler.compression.CompressionFilter.doFilter(CompressionFilter.java:51)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at hudson.util.CharacterEncodingFilter.doFilter(CharacterEncodingFilter.java:82)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at org.kohsuke.stapler.DiagnosticThreadNameFilter.doFilter(DiagnosticThreadNameFilter.java:30)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at jenkins.security.SuspiciousRequestFilter.doFilter(SuspiciousRequestFilter.java:36)
	at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193)
	at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1609)
	at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:561)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143)
	at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:578)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:235)
	at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1612)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:233)
	at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1434)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:188)
	at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:501)
	at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1582)
	at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:186)
	at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1349)
	at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141)
	at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127)
	at org.eclipse.jetty.server.Server.handle(Server.java:516)
	at org.eclipse.jetty.server.HttpChannel.lambda$handle$1(HttpChannel.java:383)
	at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:556)
	at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:375)
	at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:273)
	at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311)
	at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105)
	at org.eclipse.jetty.io.ChannelEndPoint$1.run(ChannelEndPoint.java:104)
	at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:336)
	at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:313)
	at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:171)
	at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:129)
	at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:375)
	at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:773)
	at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:905)
	at java.lang.Thread.run(Thread.java:748)

Hi,

Welcome to the community!

Can you double-check the SonarQube URL you’ve configured and make sure it’s correct?

 
Ann

While running job, analysis is happening in SonarQube and i can see the result in SonarQube project web page.
This was working fine earlier, the only change i made was updating sonar scanner plugin of jenkins.

Please see the attached images

Hi,

I asked you to double check your SQ URL because the result you’re getting looks like a web page.

I believe you should see in your analysis log the URL that was being requested. Maybe double-check that against the URL that was being requested before you started seeing this error?

 
Ann

This is the access log of sonarqube

192.168.10.7 - - [13/Jan/2021:20:57:02 +0530] "GET //api/server/version HTTP/1.1" 200 - "-" "Scanner for Jenkins" "AXb66rMnzCTGGqyzAAA7"
192.168.10.7 - - [13/Jan/2021:20:57:11 +0530] "GET //api/server/version HTTP/1.1" 200 - "-" "Scanner for Jenkins" "AXb66rMnzCTGGqyzAAA8"
192.168.10.7 - - [13/Jan/2021:20:57:22 +0530] "GET /batch/index HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAAA9"
192.168.10.7 - - [13/Jan/2021:20:57:24 +0530] "GET /api/settings/values.protobuf HTTP/1.1" 200 4898 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAAA+"
192.168.10.7 - - [13/Jan/2021:20:57:24 +0530] "GET /api/plugins/installed HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAAA/"
192.168.10.7 - - [13/Jan/2021:20:57:27 +0530] "GET /api/settings/values.protobuf?component=XXXXX HTTP/1.1" 200 4910 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABA"
192.168.10.7 - - [13/Jan/2021:20:57:28 +0530] "GET /api/qualityprofiles/search.protobuf?project=XXXXX HTTP/1.1" 200 1585 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABB"
192.168.10.7 - - [13/Jan/2021:20:57:28 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnJrzW4X-syppMSV4&ps=500&p=1 HTTP/1.1" 200 5409 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABC"
192.168.10.7 - - [13/Jan/2021:20:57:29 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnJzDW4X-syppMSXU&ps=500&p=1 HTTP/1.1" 200 7859 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABD"
192.168.10.7 - - [13/Jan/2021:20:57:29 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnJ6KW4X-syppMSX0&ps=500&p=1 HTTP/1.1" 200 11 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABE"
192.168.10.7 - - [13/Jan/2021:20:57:29 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnKBcW4X-syppMSaW&ps=500&p=1 HTTP/1.1" 200 6195 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABF"
192.168.10.7 - - [13/Jan/2021:20:57:29 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnJ6pW4X-syppMSY8&ps=500&p=1 HTTP/1.1" 200 8114 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABG"
192.168.10.7 - - [13/Jan/2021:20:57:29 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnKJtW4X-syppMSex&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABH"
192.168.10.7 - - [13/Jan/2021:20:57:29 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnKZkW4X-syppMStt&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABI"
192.168.10.7 - - [13/Jan/2021:20:57:30 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnKgbW4X-syppMSw0&ps=500&p=1 HTTP/1.1" 200 7766 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABJ"
192.168.10.7 - - [13/Jan/2021:20:57:30 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnKnZW4X-syppMS5G&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABK"
192.168.10.7 - - [13/Jan/2021:20:57:31 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnKx1W4X-syppMTKc&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABL"
192.168.10.7 - - [13/Jan/2021:20:57:31 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnK56W4X-syppMTR-&ps=500&p=1 HTTP/1.1" 200 6983 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABM"
192.168.10.7 - - [13/Jan/2021:20:57:31 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnLBeW4X-syppMTUQ&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABN"
192.168.10.7 - - [13/Jan/2021:20:57:31 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnK_mW4X-syppMTSl&ps=500&p=1 HTTP/1.1" 200 906 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABO"
192.168.10.7 - - [13/Jan/2021:20:57:31 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnLJQW4X-syppMTZF&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABP"
192.168.10.7 - - [13/Jan/2021:20:57:31 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnLXaW4X-syppMTg0&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABQ"
192.168.10.7 - - [13/Jan/2021:20:57:32 +0530] "GET /api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXbmnLdJW4X-syppMTl6&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABR"
192.168.10.7 - - [13/Jan/2021:20:57:33 +0530] "GET /api/metrics/search?f=name,description,direction,qualitative,custom&ps=500&p=1 HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABS"
192.168.10.7 - - [13/Jan/2021:20:57:36 +0530] "GET /batch/project.protobuf?key=XXXXX HTTP/1.1" 200 - "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABT"
192.168.10.7 - - [13/Jan/2021:20:58:02 +0530] "POST /api/ce/submit?projectKey=XXXXX&projectName=XXXXX HTTP/1.1" 200 44 "-" "ScannerCLI/4.5.0.2216" "AXb66rMnzCTGGqyzAABU"
192.168.10.7 - - [13/Jan/2021:20:59:24 +0530] "GET //api/server/version HTTP/1.1" 200 - "-" "Scanner for Jenkins" "AXb66rMnzCTGGqyzAABV"

Hi,

I was asking about the analysis log.

 
Ann

192.168.10.7 - - [13/Jan/2021:21:37:19 +0530] “GET //api/server/version HTTP/1.1” 200 - “-” “Scanner for Jenkins” “AXb8ZWZHIDbDc9E2AAAB”

Where can i get that from, please guide me?

access.log (129.1 KB) ce.log (18.6 KB) es.log (11.1 KB) sonar-20210113.log (6.0 KB) web.log (18.8 KB)

Please see the logs from $SONAR_HOME/logs

Hi,

This is from the analysis log & it what I was looking for.

How are you analyzing? Specifically, what’s the analysis command that appears in your analysis / Jenkins log? In fact, posting that Jenkins log here in its entirety would be helpful. I’m wondering if you’re doing Maven analysis & using a very old version of that analyzer…

 
Ann

No changes for http://192.168.10.7/java/XXXXX/trunk since the previous build
Run condition [Strings match] enabling prebuild for step [Execute shell]
Run condition [Strings match] enabling prebuild for step [[Deploy war/ear to a container]]
Run condition [Strings match] enabling prebuild for step [[Deploy war/ear to a container]]
No emails were triggered.
[XXXXX] $ /opt/sonarqube/sonar-scanner/bin/sonar-scanner -Dsonar.host.url=http://192.168.10.7:9000/ ******** -Dsonar.projectName=XXXXX -Dsonar.projectVersion=1.0 -Dsonar.binaries=target/classes -Dsonar.projectKey=XXXXX -Dsonar.java.binaries=/var/lib/jenkins/workspace/XXXXX -Dsonar.sources=/var/lib/jenkins/workspace/XXXXX -Dsonar.projectBaseDir=/var/lib/jenkins/workspace/XXXXX
INFO: Scanner configuration file: /opt/sonarqube/sonar-scanner-4.5.0.2216-linux/conf/sonar-scanner.properties
INFO: Project root configuration file: NONE
INFO: SonarScanner 4.5.0.2216
INFO: Java 11.0.3 AdoptOpenJDK (64-bit)
INFO: Linux 3.10.0-1160.11.1.el7.x86_64 amd64
INFO: User cache: /var/lib/jenkins/.sonar/cache
INFO: Scanner configuration file: /opt/sonarqube/sonar-scanner-4.5.0.2216-linux/conf/sonar-scanner.properties
INFO: Project root configuration file: NONE
INFO: Analyzing on SonarQube server 8.6.0
INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)

INFO: Load global settings
INFO: Load global settings (done) | time=182ms
INFO: Server id: 92D88F0A-AXb9D4A4TOPGFaK2pvJC
INFO: User cache: /var/lib/jenkins/.sonar/cache
INFO: Load/download plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=121ms
INFO: Load/download plugins (done) | time=411ms

INFO: Process project properties
INFO: Process project properties (done) | time=13ms
INFO: Execute project builders
INFO: Execute project builders (done) | time=2ms
INFO: Project key: XXXXX
INFO: Base dir: /var/lib/jenkins/workspace/XXXXX
INFO: Working dir: /var/lib/jenkins/workspace/XXXXX/.scannerwork

INFO: Load project settings for component key: 'XXXXX'
INFO: Load project settings for component key: 'XXXXX' (done) | time=33ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=124ms
INFO: Auto-configuring with CI 'Jenkins'
INFO: Load active rules

INFO: Load active rules (done) | time=1991ms
INFO: Indexing files...
INFO: Project configuration:
INFO:   Included sources: **/*.java

INFO: 181 files indexed
INFO: 88 files ignored because of inclusion/exclusion patterns
INFO: Quality profile for java: Sonar way
INFO: ------------- Run sensors on module XXXXX
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=87ms

INFO: Sensor JavaSquidSensor [java]
INFO: Configured Java source version (sonar.java.source): none
INFO: JavaClasspath initialization
WARN: Bytecode of dependencies was not provided for analysis of source files, you might end up with less precise results. Bytecode can be provided using sonar.java.libraries property.
INFO: JavaClasspath initialization (done) | time=17ms
INFO: JavaTestClasspath initialization
INFO: JavaTestClasspath initialization (done) | time=1ms
INFO: Java Main Files AST scan
INFO: 181 source files to be analyzed
INFO: Load project repositories
INFO: Load project repositories (done) | time=58ms

INFO: 27/181 files analyzed, current file: XXXXXMessagingSystem/src/main/java/com/XXXXX/common/util/mail/SentMail.java

INFO: 139/181 files analyzed, current file: XXXXXWeb/src/main/java/com/XXXXX/controller/office/OfficeWebController.java

INFO: Java Main Files AST scan (done) | time=23224ms
INFO: Java Test Files AST scan
INFO: 0 source files to be analyzed
INFO: Java Test Files AST scan (done) | time=1ms
INFO: Java Generated Files AST scan
INFO: 0 source files to be analyzed
INFO: Java Generated Files AST scan (done) | time=0ms
INFO: Sensor JavaSquidSensor [java] (done) | time=23543ms
INFO: Sensor CSS Rules [cssfamily]
INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
INFO: Sensor CSS Rules [cssfamily] (done) | time=2ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 181/181 source files have been analyzed
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=6ms
INFO: Sensor C# Properties [csharp]
INFO: Sensor C# Properties [csharp] (done) | time=0ms
INFO: Sensor SurefireSensor [java]
INFO: parsing [/var/lib/jenkins/workspace/XXXXX/target/surefire-reports]
INFO: Sensor SurefireSensor [java] (done) | time=2ms
INFO: Sensor JavaXmlSensor [java]
INFO: 0/0 source files have been analyzed
INFO: Sensor JavaXmlSensor [java] (done) | time=4ms
INFO: Sensor HTML [web]
INFO: Sensor HTML [web] (done) | time=6ms
INFO: Sensor VB.NET Properties [vbnet]
INFO: 0/0 source files have been analyzed
INFO: Sensor VB.NET Properties [vbnet] (done) | time=66ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=105ms
INFO: Sensor Java CPD Block Indexer

INFO: Sensor Java CPD Block Indexer (done) | time=882ms
INFO: CPD Executor 51 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 130 files
INFO: CPD Executor CPD calculation finished (done) | time=106ms
INFO: Analysis report generated in 178ms, dir size=916 KB

INFO: Analysis report compressed in 660ms, zip size=514 KB
INFO: Analysis report uploaded in 336ms
INFO: ANALYSIS SUCCESSFUL, you can browse http://192.168.10.7:9000/dashboard?id=XXXXX
INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
INFO: More about the report processing at http://192.168.10.7:9000/api/ce/task?id=AXb9QgESTOPGFaK2pz__

INFO: Analysis total time: 33.414 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 35.958s
INFO: Final Memory: 17M/64M
INFO: ------------------------------------------------------------------------
Parsing POMs
Established TCP socket on 39624
[XXXXX] $ /usr/java/latest/bin/java -cp /var/lib/jenkins/plugins/maven-plugin/WEB-INF/lib/maven35-agent-1.13.jar:/opt/maven/boot/plexus-classworlds-2.6.0.jar:/opt/maven/conf/logging jenkins.maven3.agent.Maven35Main /opt/maven /var/cache/jenkins/war/WEB-INF/lib/remoting-4.5.jar /var/lib/jenkins/plugins/maven-plugin/WEB-INF/lib/maven35-interceptor-1.13.jar /var/lib/jenkins/plugins/maven-plugin/WEB-INF/lib/maven3-interceptor-commons-1.13.jar 39624

Hi,

Thanks for your analysis log. It looks like analysis is succeeding now? Or is this an old log?

 
Ann

Ann,
Analysis is succeeding but the result is not showing in the Jenkins page.
Earlier the result is showing in the project home page of jenkins under the heading SonarQube Quality Gate.

After i updated the sonar scanner plugin in jenkins it is not showing.

Hi,

I’ve referred this internally.

 
Ann

I removed jenkins from the server and reinstalled with plugins that are needed only. Now issue resolved and is working fine. Ealier ther is having lots of other plugins. Most probably after updating sonar scanner plugin it may have conflict with some other plugin.

Anyway system is working fine

Thanks,
Babu

2 Likes

@ganncamp
I was able to reproduce this problem. It happens if either the baseURL in SonarQube or the (SonarQube) serverURL in Jenkins ends with an ‘/’.

Error occurs if for example the URL is set to “http://sonar.example.com/” but not if it is “http://sonar.example.com”.

2 Likes

Thanks for the followup @Ruby_Paasche!

I’m seeing this same problem spamming my logs but have already confirmed that my URL does not end in / on either SonarQube baseURL or Jenkins serverURL configuration. The error message is happening repeatedly even when jobs are not running in Jenkins as if it were a polling process.

It appears that, if your configuration ever had an extra / at the end, changing your Jenkins config doesn’t fix the issue. It still appears to try to access things using the old config value:

Caused: java.lang.IllegalStateException: Unable to parse response from https://sonarqube.mycompany.com//api/ce/task?id=AX42xakve_XGiZvNqmsw:

I cannot find anywhere in my configuration of either Jenkins or Sonar that has a slash at the end, yet Jenkins continues to try to use this address. Is this information perhaps cached on individual job configurations?

Hey there.

Can you check how sonar.core.serverBaseURL is defined in your global Administration?