Sonar Scanner parsing coverage file, but coverage shows 0% in Sonar Cloud

I am using GitLab as my SCM and CI tool and the circlecihq/gitlab-sonar-scanner docker image to run sonar scanner as part of my build of a Python project. I am able to get Sonar results in Sonar Cloud, but the code coverage is still at 0%. I can see the coverage report being generated, I can see sonar scanner parsing the XML file, but I cannot see the results in Sonar Cloud. Can anyone help me figure this out?

I have included the sonar scanner output, the sonar-project.properties file, and the generated coverage.xml document below.

Sonar scanner output

    $ gitlab-sonar-scanner -Dsonar.login=$SONAR_USER_TOKEN
    INFO: Scanner configuration file: NONE
    INFO: Project root configuration file:  <REDACTED>/sonar-project.properties
    INFO: SonarQube Scanner 3.3.0.1492
    INFO: Java 1.8.0_201 Oracle Corporation (64-bit)
    INFO: Linux 4.14.114-105.126.amzn2.x86_64 amd64
    INFO: User cache: /root/.sonar/cache
    INFO: SonarQube server 8.0.0
    INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
    INFO: Load global settings
    INFO: Load global settings (done) | time=592ms
    INFO: Server id:  <REDACTED>
    INFO: User cache: /root/.sonar/cache
    INFO: Load/download plugins
    INFO: Load plugins index
    INFO: Load plugins index (done) | time=140ms
    INFO: Load/download plugins (done) | time=22317ms
    INFO: Loaded core extensions: developer-scanner
    INFO: Process project properties
    INFO: Execute project builders
    INFO: Execute project builders (done) | time=12ms
    INFO: Project key: grade-prime-fraud-policy
    INFO: Base dir:  <REDACTED>
    INFO: Working dir:  <REDACTED>/.scannerwork
    INFO: Load project settings for component key: ' <REDACTED>'
    INFO: Load project settings for component key: ' <REDACTED>' (done) | time=124ms
    INFO: Load project branches
    INFO: Load project branches (done) | time=108ms
    INFO: Load project pull requests
    INFO: Load project pull requests (done) | time=100ms
    INFO: Load branch configuration
    INFO: Load branch configuration (done) | time=2ms
    INFO: Load quality profiles
    INFO: Load quality profiles (done) | time=152ms
    INFO: Detected Gitlab CI
    INFO: Load active rules
    INFO: Load active rules (done) | time=3122ms
    INFO: Organization key: westcreek
    INFO: Indexing files...
    INFO: Project configuration:
    INFO: 4 files indexed
    INFO: 0 files ignored because of scm ignore settings
    INFO: Quality profile for py: Sonar way
    INFO: ------------- Run sensors on module  <REDACTED>
    INFO: Load metrics repository
    INFO: Load metrics repository (done) | time=108ms
    INFO: Sensor JavaXmlSensor [java]
    INFO: Sensor JavaXmlSensor [java] (done) | time=2ms
    INFO: Sensor HTML [web]
    INFO: Sensor HTML [web] (done) | time=16ms
    INFO: Sensor Python Squid Sensor [python]
    INFO: Load project repositories
    INFO: Load project repositories (done) | time=116ms
    INFO: Sensor Python Squid Sensor [python] (done) | time=860ms
    INFO: Sensor Cobertura Sensor for Python coverage [python]
    INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=97ms
    INFO: Sensor PythonXUnitSensor [python]
    INFO: Sensor PythonXUnitSensor [python] (done) | time=73ms
    INFO: Sensor JaCoCo XML Report Importer [jacoco]
    INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=5ms
    INFO: Sensor JavaSecuritySensor [security]
    INFO: Reading type hierarchy from: <REDACTED>/.scannerwork/ucfg2/java
    INFO: Read 0 type definitions
    INFO: Reading UCFGs from:  <REDACTED>/.scannerwork/ucfg2/java
    INFO: No UCFGs have been included for analysis.
    INFO: Sensor JavaSecuritySensor [security] (done) | time=10ms
    INFO: Sensor CSharpSecuritySensor [security]
    INFO: Reading type hierarchy from: <REDACTED>/ucfg_cs2
    INFO: Read 0 type definitions
    INFO: Reading UCFGs from: <REDACTED>/ucfg_cs2
    INFO: No UCFGs have been included for analysis.
    INFO: Sensor CSharpSecuritySensor [security] (done) | time=3ms
    INFO: Sensor PhpSecuritySensor [security]
    INFO: Reading type hierarchy from: <REDACTED>/.scannerwork/ucfg2/php
    INFO: Read 0 type definitions
    INFO: Reading UCFGs from: <REDACTED>/.scannerwork/ucfg2/php
    INFO: No UCFGs have been included for analysis.
    INFO: Sensor PhpSecuritySensor [security] (done) | time=2ms
    INFO: ------------- Run sensors on project
    INFO: Sensor Zero Coverage Sensor
    INFO: Sensor Zero Coverage Sensor (done) | time=20ms
    WARN: Forced reloading of SCM data for all files.
    INFO: SCM provider for this project is: git
    INFO: 4 files to be analyzed
    WARN: Shallow clone detected, no blame information will be provided. You can convert to non-shallow with 'git fetch --unshallow'.
    INFO: 0/4 files analyzed
    WARN: Missing blame information for the following files:
    WARN:   * app.py
    WARN:   * fraud/__init__.py
    WARN:   * tests/fraud_policy_test.py
    WARN:   * fraud/actor_handler.py
    WARN: This may lead to missing/broken features in SonarQube
    INFO: 1 file had no CPD blocks
    INFO: Calculating CPD for 2 files
    INFO: CPD calculation finished
    INFO: Analysis report generated in 144ms, dir size=150 KB
    INFO: Analysis report compressed in 25ms, zip size=32 KB
    INFO: Analysis report uploaded in 202ms
    INFO: ANALYSIS SUCCESSFUL, you can browse https://sonarcloud.io/dashboard?id= <REDACTED>
    INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
    INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id= <REDACTED>-tQ
    INFO: Analysis total time: 11.219 s
    INFO: ------------------------------------------------------------------------
    INFO: EXECUTION SUCCESS
    INFO: ------------------------------------------------------------------------
    INFO: Total time: 38.022s
    INFO: Final Memory: 33M/338M
    INFO: ------------------------------------------------------------------------

Sonar properties file:

    sonar.projectKey=<REDACTED>
    # sonar.exclusions=tests/
    sonar.language=python

    sonar.sources=./app.py, ./fraud/
    sonar.tests=./tests
    sonar.python.coverage.reportPaths=venv/coverage.xml

    sonar.gitlab.project_id=<REDACTED>

    # adding to skip shallow clone
    sonar.scm.forceReloadAll=true

    # Metadeta 
    sonar.organization=<REDACTED>

Coverage.xml file

    <?xml version="1.0" ?>
    <coverage branch-rate="0" branches-covered="0" branches-valid="0" complexity="0" line-rate="0.9048" lines-covered="38" lines-valid="42" timestamp="1566181527451" version="4.5.4">
    	<!-- Generated by coverage.py: https://coverage.readthedocs.io -->
    	<!-- Based on https://raw.githubusercontent.com/cobertura/web/master/htdocs/xml/coverage-04.dtd -->
    	<sources/>
    	<packages>
    		<package branch-rate="0" complexity="0" line-rate="0.9048" name=".redacted..tox.py3.lib.python3.7.site-packages.fraud">
    			<classes>
    				<class branch-rate="0" complexity="0" filename="redacted/.tox/py3/lib/python3.7/site-packages/fraud/__init__.py" line-rate="1" name="__init__.py">
    					<methods/>
    					<lines>
    						<line hits="1" number="2"/>
    						<line hits="1" number="8"/>
    					</lines>
    				</class>
    				<class branch-rate="0" complexity="0" filename="/redacted/.tox/py3/lib/python3.7/site-packages/fraud/actor_handler.py" line-rate="0.9" name="actor_handler.py">
    					<methods/>
    					<lines>
    						<line hits="1" number="2"/>
    						<line hits="1" number="3"/>
    						<line hits="1" number="4"/>
    						<line hits="1" number="7"/>
    						<line hits="1" number="12"/>
    						<line hits="1" number="13"/>
    						<line hits="1" number="14"/>
    						<line hits="1" number="16"/>
    						<line hits="1" number="22"/>
    						<line hits="1" number="23"/>
    						<line hits="1" number="24"/>
    						<line hits="1" number="27"/>
    						<line hits="1" number="28"/>
    						<line hits="1" number="30"/>
    						<line hits="1" number="32"/>
    						<line hits="1" number="33"/>
    						<line hits="1" number="34"/>
    						<line hits="1" number="35"/>
    						<line hits="1" number="36"/>
    						<line hits="0" number="37"/>
    						<line hits="0" number="38"/>
    						<line hits="0" number="39"/>
    						<line hits="1" number="40"/>
    						<line hits="1" number="42"/>
    						<line hits="1" number="48"/>
    						<line hits="1" number="49"/>
    						<line hits="1" number="50"/>
    						<line hits="1" number="51"/>
    						<line hits="1" number="52"/>
    						<line hits="1" number="55"/>
    						<line hits="1" number="61"/>
    						<line hits="1" number="62"/>
    						<line hits="1" number="64"/>
    						<line hits="1" number="65"/>
    						<line hits="1" number="66"/>
    						<line hits="1" number="68"/>
    						<line hits="1" number="70"/>
    						<line hits="1" number="72"/>
    						<line hits="0" number="74"/>
    						<line hits="1" number="75"/>
    					</lines>
    				</class>
    			</classes>
    		</package>
    	</packages>
    </coverage>
2 Likes

Hello,

Please attach the debug log of the analysis to give more visibility on the paths involved. Adding the -X parameter will trigger debug mode.
In your xml file you have absolute paths like /redacted/.tox/py3/lib/python3.7/site-packages/fraud/actor_handler.py, I would like to check if your working directory is part of this path.

Alex.

1 Like

Thank you for your response. Current XML, sonar-project.properties, will post debug output in next post due to character limit.

XML File

<?xml version="1.0" ?>
<coverage branch-rate="0" branches-covered="0" branches-valid="0" complexity="0" line-rate="0.9623" lines-covered="51" lines-valid="53" timestamp="1566315722686" version="4.5.4">
	<!-- Generated by coverage.py: https://coverage.readthedocs.io -->
	<!-- Based on https://raw.githubusercontent.com/cobertura/web/master/htdocs/xml/coverage-04.dtd -->
	<sources/>
	<packages>
		<package branch-rate="0" complexity="0" line-rate="0.9623" name=".builds.westcreek.grade.grade-prime-decision-reasons-matching..tox.py3.lib.python3.7.site-packages.drm">
			<classes>
				<class branch-rate="0" complexity="0" filename="/builds/westcreek/grade/grade-prime-decision-reasons-matching/.tox/py3/lib/python3.7/site-packages/drm/__init__.py" line-rate="1" name="__init__.py">
					<methods/>
					<lines>
						<line hits="1" number="2"/>
						<line hits="1" number="8"/>
					</lines>
				</class>
				<class branch-rate="0" complexity="0" filename="/builds/westcreek/grade/grade-prime-decision-reasons-matching/.tox/py3/lib/python3.7/site-packages/drm/actor_handler.py" line-rate="0.9608" name="actor_handler.py">
					<methods/>
					<lines>
						<line hits="1" number="4"/>
						<line hits="1" number="6"/>
						<line hits="1" number="7"/>
						<line hits="1" number="10"/>
						<line hits="1" number="15"/>
						<line hits="1" number="16"/>
						<line hits="1" number="18"/>
						<line hits="1" number="20"/>
						<line hits="1" number="24"/>
						<line hits="1" number="25"/>
						<line hits="1" number="26"/>
						<line hits="1" number="27"/>
						<line hits="1" number="32"/>
						<line hits="1" number="34"/>
						<line hits="1" number="38"/>
						<line hits="1" number="39"/>
						<line hits="1" number="42"/>
						<line hits="1" number="43"/>
						<line hits="1" number="46"/>
						<line hits="1" number="48"/>
						<line hits="1" number="49"/>
						<line hits="1" number="50"/>
						<line hits="1" number="51"/>
						<line hits="1" number="52"/>
						<line hits="1" number="54"/>
						<line hits="1" number="55"/>
						<line hits="1" number="57"/>
						<line hits="1" number="58"/>
						<line hits="1" number="61"/>
						<line hits="0" number="64"/>
						<line hits="0" number="66"/>
						<line hits="1" number="67"/>
						<line hits="1" number="69"/>
						<line hits="1" number="70"/>
						<line hits="1" number="72"/>
						<line hits="1" number="74"/>
						<line hits="1" number="77"/>
						<line hits="1" number="79"/>
						<line hits="1" number="80"/>
						<line hits="1" number="81"/>
						<line hits="1" number="82"/>
						<line hits="1" number="83"/>
						<line hits="1" number="85"/>
						<line hits="1" number="86"/>
						<line hits="1" number="89"/>
						<line hits="1" number="90"/>
						<line hits="1" number="92"/>
						<line hits="1" number="93"/>
						<line hits="1" number="95"/>
						<line hits="1" number="97"/>
						<line hits="1" number="98"/>
					</lines>
				</class>
			</classes>
		</package>
	</packages>
</coverage>

Sonar-project.properties

sonar.projectKey=grade-prime-decision-reasons-matching
# sonar.exclusions=tests/
sonar.language=python

sonar.sources=./app.py, ./setup.py, ./drm/
sonar.tests=./tests

sonar.gitlab.project_id=git@gitlab.com:westcreek/grade/grade-prime-decision-reasons-matching.git

# adding to skip shallow clone
sonar.scm.forceReloadAll=true
sonar.python.coverage.reportPaths=tests/coverage.xml

# Metadeta 
sonar.organization=ORG_NAME

Analysis run in debug mode

$ gitlab-sonar-scanner -X -Dsonar.login=$SONAR_USER_TOKEN
15:42:34.949 INFO: Scanner configuration file: NONE
15:42:34.953 INFO: Project root configuration file: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/sonar-project.properties
15:42:34.989 INFO: SonarQube Scanner 3.3.0.1492
15:42:34.990 INFO: Java 1.8.0_201 Oracle Corporation (64-bit)
15:42:34.990 INFO: Linux 4.14.114-105.126.amzn2.x86_64 amd64
15:42:35.224 DEBUG: keyStore is : 
15:42:35.224 DEBUG: keyStore type is : jks
15:42:35.224 DEBUG: keyStore provider is : 
15:42:35.224 DEBUG: init keystore
15:42:35.225 DEBUG: init keymanager of type SunX509
15:42:35.386 DEBUG: Create: /root/.sonar/cache
15:42:35.387 INFO: User cache: /root/.sonar/cache
15:42:35.387 DEBUG: Create: /root/.sonar/cache/_tmp
15:42:35.391 DEBUG: Extract sonar-scanner-api-batch in temp...
15:42:35.403 DEBUG: Get bootstrap index...
15:42:35.403 DEBUG: Download: https://sonarcloud.io/batch/index
15:42:36.143 DEBUG: Get bootstrap completed
15:42:36.155 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.184-all.jar to /root/.sonar/cache/_tmp/fileCache5541027444062162592.tmp
15:42:37.757 DEBUG: Create isolated classloader...
15:42:37.769 DEBUG: Start temp cleaning...
15:42:37.786 DEBUG: Temp cleaning done
15:42:37.787 DEBUG: Execution getVersion
15:42:37.789 INFO: SonarQube server 8.0.0
15:42:37.790 INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
15:42:37.791 DEBUG: Work directory: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork
15:42:37.792 DEBUG: Execution execute
15:42:38.068 DEBUG: SonarCloud 8.0.0.184
15:42:38.224 INFO: Load global settings
15:42:38.777 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=551ms
15:42:38.812 INFO: Load global settings (done) | time=588ms
15:42:38.819 INFO: Server id: 74E9293D-AWHW8ct9-T_TB3XqouNu
15:42:38.825 DEBUG: Create : /root/.sonar/_tmp
15:42:38.826 INFO: User cache: /root/.sonar/cache
15:42:38.829 INFO: Load/download plugins
15:42:38.829 INFO: Load plugins index
15:42:38.923 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=94ms
15:42:38.972 INFO: Load plugins index (done) | time=143ms
15:42:38.974 DEBUG: Download plugin 'scmgit' to '/root/.sonar/_tmp/fileCache6575009554289063591.tmp'
15:42:39.066 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=92ms
15:42:39.684 DEBUG: Unpacking plugin scmgit
15:42:40.279 DEBUG: Download plugin 'jacoco' to '/root/.sonar/_tmp/fileCache972996714595031088.tmp'
15:42:40.370 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=91ms
15:42:40.371 DEBUG: Unpacking plugin jacoco
15:42:40.376 DEBUG: Download plugin 'license' to '/root/.sonar/_tmp/fileCache6208688563110029947.tmp'
15:42:40.468 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=92ms
15:42:40.469 DEBUG: Unpacking plugin license
15:42:40.474 DEBUG: Download plugin 'scmmercurial' to '/root/.sonar/_tmp/fileCache966613447221381387.tmp'
15:42:40.565 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=91ms
15:42:40.566 DEBUG: Unpacking plugin scmmercurial
15:42:40.571 DEBUG: Download plugin 'abap' to '/root/.sonar/_tmp/fileCache669182250182168181.tmp'
15:42:40.665 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=93ms
15:42:40.679 DEBUG: Unpacking plugin abap
15:42:40.898 DEBUG: Download plugin 'sonarapex' to '/root/.sonar/_tmp/fileCache6783985847746683947.tmp'
15:42:40.992 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=94ms
15:42:41.087 DEBUG: Unpacking plugin sonarapex
15:42:41.785 DEBUG: Download plugin 'csharp' to '/root/.sonar/_tmp/fileCache654304936167808997.tmp'
15:42:41.880 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=95ms
15:42:41.995 DEBUG: Unpacking plugin csharp
15:42:42.514 DEBUG: Download plugin 'cpp' to '/root/.sonar/_tmp/fileCache5307948139700630134.tmp'
15:42:42.607 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=93ms
15:42:44.106 DEBUG: Unpacking plugin cpp
15:42:45.482 DEBUG: Download plugin 'cobol' to '/root/.sonar/_tmp/fileCache5210966972151266407.tmp'
15:42:45.575 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=93ms
15:42:45.605 DEBUG: Unpacking plugin cobol
15:42:46.052 DEBUG: Download plugin 'cssfamily' to '/root/.sonar/_tmp/fileCache7886688555365147350.tmp'
15:42:46.148 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=96ms
15:42:46.539 DEBUG: Unpacking plugin cssfamily
15:42:46.978 DEBUG: Download plugin 'flex' to '/root/.sonar/_tmp/fileCache1209687988601885992.tmp'
15:42:47.071 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=93ms
15:42:47.082 DEBUG: Unpacking plugin flex
15:42:47.292 DEBUG: Download plugin 'go' to '/root/.sonar/_tmp/fileCache1334865076385617659.tmp'
15:42:47.386 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=94ms
15:42:47.590 DEBUG: Unpacking plugin go
15:42:48.329 DEBUG: Download plugin 'web' to '/root/.sonar/_tmp/fileCache3694913466915668942.tmp'
15:42:48.423 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=94ms
15:42:48.437 DEBUG: Unpacking plugin web
15:42:48.666 DEBUG: Download plugin 'javascript' to '/root/.sonar/_tmp/fileCache3663694973899113907.tmp'
15:42:48.759 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=93ms
15:42:49.053 DEBUG: Unpacking plugin javascript
15:42:49.685 DEBUG: Download plugin 'java' to '/root/.sonar/_tmp/fileCache8464038004680219452.tmp'
15:42:49.776 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=91ms
15:42:49.901 DEBUG: Unpacking plugin java
15:42:50.987 DEBUG: Download plugin 'kotlin' to '/root/.sonar/_tmp/fileCache6090074809164184984.tmp'
15:42:51.081 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=94ms
15:42:51.199 DEBUG: Unpacking plugin kotlin
15:42:52.221 DEBUG: Download plugin 'php' to '/root/.sonar/_tmp/fileCache6199917392076673395.tmp'
15:42:52.314 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=93ms
15:42:52.350 DEBUG: Unpacking plugin php
15:42:53.028 DEBUG: Download plugin 'plsql' to '/root/.sonar/_tmp/fileCache6266698968824981243.tmp'
15:42:53.124 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=96ms
15:42:53.139 DEBUG: Unpacking plugin plsql
15:42:53.443 DEBUG: Download plugin 'python' to '/root/.sonar/_tmp/fileCache3560950481738609656.tmp'
15:42:53.538 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=95ms
15:42:53.563 DEBUG: Unpacking plugin python
15:42:53.942 DEBUG: Download plugin 'ruby' to '/root/.sonar/_tmp/fileCache2768295948525172303.tmp'
15:42:54.033 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=91ms
15:42:54.148 DEBUG: Unpacking plugin ruby
15:42:55.595 DEBUG: Download plugin 'sonarscala' to '/root/.sonar/_tmp/fileCache7173122131276317989.tmp'
15:42:55.687 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=92ms
15:42:55.984 DEBUG: Unpacking plugin sonarscala
15:42:57.029 DEBUG: Download plugin 'swift' to '/root/.sonar/_tmp/fileCache9049217456402334299.tmp'
15:42:57.120 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=91ms
15:42:57.143 DEBUG: Unpacking plugin swift
15:42:57.457 DEBUG: Download plugin 'typescript' to '/root/.sonar/_tmp/fileCache8777883117990911003.tmp'
15:42:57.554 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=typescript&acceptCompressions=pack200 | time=97ms
15:42:57.677 DEBUG: Unpacking plugin typescript
15:42:57.853 DEBUG: Download plugin 'tsql' to '/root/.sonar/_tmp/fileCache7972525881854758082.tmp'
15:42:57.946 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=92ms
15:42:57.959 DEBUG: Unpacking plugin tsql
15:42:58.265 DEBUG: Download plugin 'vbnet' to '/root/.sonar/_tmp/fileCache1278079508716546667.tmp'
15:42:58.358 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=93ms
15:42:58.398 DEBUG: Unpacking plugin vbnet
15:42:58.855 DEBUG: Download plugin 'xml' to '/root/.sonar/_tmp/fileCache1813191938301877368.tmp'
15:42:58.947 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=92ms
15:42:58.963 DEBUG: Unpacking plugin xml
15:42:59.258 DEBUG: Download plugin 'security' to '/root/.sonar/_tmp/fileCache2518598921617288994.tmp'
15:42:59.351 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=93ms
15:42:59.381 DEBUG: Unpacking plugin security
15:42:59.765 DEBUG: Download plugin 'securitycsharpfrontend' to '/root/.sonar/_tmp/fileCache8557738922707622173.tmp'
15:42:59.859 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=94ms
15:43:00.066 DEBUG: Unpacking plugin securitycsharpfrontend
15:43:00.235 DEBUG: Download plugin 'securityjavafrontend' to '/root/.sonar/_tmp/fileCache861055465145997826.tmp'
15:43:00.326 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=91ms
15:43:00.424 DEBUG: Unpacking plugin securityjavafrontend
15:43:00.516 DEBUG: Download plugin 'securityphpfrontend' to '/root/.sonar/_tmp/fileCache6469941289390241648.tmp'
15:43:00.610 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=94ms
15:43:00.714 DEBUG: Unpacking plugin securityphpfrontend
15:43:00.826 INFO: Load/download plugins (done) | time=21997ms
15:43:01.227 DEBUG: Plugins:
15:43:01.227 DEBUG:   * SonarCSS 1.1.1.1010 (cssfamily)
15:43:01.227 DEBUG:   * SonarPLSQL 3.4.1.2576 (plsql)
15:43:01.227 DEBUG:   * SonarScala 1.6.0.719 (sonarscala)
15:43:01.227 DEBUG:   * SonarC# 7.15.0.8572 (csharp)
15:43:01.228 DEBUG:   * Vulnerability Analysis 7.9.0.5105 (security)
15:43:01.228 DEBUG:   * SonarJava 5.13.1.18282 (java)
15:43:01.228 DEBUG:   * SonarHTML 3.1.0.1615 (web)
15:43:01.228 DEBUG:   * SonarFlex 2.5.1.1831 (flex)
15:43:01.228 DEBUG:   * SonarXML 2.0.1.2020 (xml)
15:43:01.228 DEBUG:   * SonarTS 1.9.0.3766 (typescript)
15:43:01.228 DEBUG:   * SonarVB 7.15.0.8572 (vbnet)
15:43:01.229 DEBUG:   * SonarSwift 4.1.0.3087 (swift)
15:43:01.229 DEBUG:   * SonarCFamily 6.3.0.11371 (cpp)
15:43:01.229 DEBUG:   * SonarPython 1.14.1.3143 (python)
15:43:01.229 DEBUG:   * JaCoCo 1.0.2.475 (jacoco)
15:43:01.229 DEBUG:   * Mercurial 1.1.2 (scmmercurial)
15:43:01.229 DEBUG:   * SonarGo 1.1.1.2000 (go)
15:43:01.230 DEBUG:   * SonarKotlin 1.6.0.719 (kotlin)
15:43:01.230 DEBUG:   * SonarTSQL 1.4.0.3334 (tsql)
15:43:01.230 DEBUG:   * SonarApex 1.6.0.719 (sonarapex)
15:43:01.230 DEBUG:   * SonarJS 5.2.1.7778 (javascript)
15:43:01.230 DEBUG:   * SonarRuby 1.6.0.719 (ruby)
15:43:01.230 DEBUG:   * Vulnerability Rules for C# 7.9.0.5105 (securitycsharpfrontend)
15:43:01.230 DEBUG:   * Vulnerability Rules for Java 7.9.0.5105 (securityjavafrontend)
15:43:01.231 DEBUG:   * License for SonarLint 8.0.0.184 (license)
15:43:01.231 DEBUG:   * SonarCOBOL 4.4.0.3403 (cobol)
15:43:01.231 DEBUG:   * Git 1.10.0.1730 (scmgit)
15:43:01.231 DEBUG:   * SonarPHP 3.2.0.4868 (php)
15:43:01.231 DEBUG:   * SonarABAP 3.8.0.2034 (abap)
15:43:01.231 DEBUG:   * Vulnerability Rules for PHP 7.9.0.5105 (securityphpfrontend)
15:43:01.267 INFO: Loaded core extensions: developer-scanner
15:43:01.296 DEBUG: Installed core extension: developer-scanner
15:43:02.295 INFO: Process project properties
15:43:02.308 DEBUG: Process project properties (done) | time=12ms
15:43:02.308 INFO: Execute project builders
15:43:02.309 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
15:43:02.315 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
15:43:02.319 INFO: Execute project builders (done) | time=11ms
15:43:02.326 INFO: Project key: grade-prime-decision-reasons-matching
15:43:02.326 INFO: Base dir: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching
15:43:02.326 INFO: Working dir: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork
15:43:02.326 DEBUG: Project global encoding: UTF-8, default locale: en_US
15:43:02.329 DEBUG: Creating module hierarchy
15:43:02.329 DEBUG:   Init module 'grade-prime-decision-reasons-matching'
15:43:02.331 DEBUG:     Base dir: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching
15:43:02.331 DEBUG:     Working dir: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork
15:43:02.331 DEBUG:     Module global encoding: UTF-8, default locale: en_US
15:43:02.338 INFO: Load project settings for component key: 'grade-prime-decision-reasons-matching'
15:43:02.456 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=grade-prime-decision-reasons-matching | time=118ms
15:43:02.458 INFO: Load project settings for component key: 'grade-prime-decision-reasons-matching' (done) | time=120ms
15:43:02.476 INFO: Load project branches
15:43:02.575 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=grade-prime-decision-reasons-matching | time=99ms
15:43:02.590 INFO: Load project branches (done) | time=114ms
15:43:02.592 INFO: Load project pull requests
15:43:02.687 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=grade-prime-decision-reasons-matching | time=94ms
15:43:02.691 INFO: Load project pull requests (done) | time=99ms
15:43:02.691 INFO: Load branch configuration
15:43:02.694 INFO: Load branch configuration (done) | time=3ms
15:43:02.757 DEBUG: Available languages:
15:43:02.757 DEBUG:   * CSS => "css"
15:43:02.758 DEBUG:   * PL/SQL => "plsql"
15:43:02.758 DEBUG:   * Scala => "scala"
15:43:02.758 DEBUG:   * C# => "cs"
15:43:02.764 DEBUG:   * Java => "java"
15:43:02.764 DEBUG:   * HTML => "web"
15:43:02.764 DEBUG:   * JSP => "jsp"
15:43:02.764 DEBUG:   * Flex => "flex"
15:43:02.765 DEBUG:   * XML => "xml"
15:43:02.765 DEBUG:   * TypeScript => "ts"
15:43:02.765 DEBUG:   * VB.NET => "vbnet"
15:43:02.765 DEBUG:   * Swift => "swift"
15:43:02.766 DEBUG:   * C => "c"
15:43:02.766 DEBUG:   * C++ => "cpp"
15:43:02.766 DEBUG:   * Objective-C => "objc"
15:43:02.767 DEBUG:   * Python => "py"
15:43:02.768 DEBUG:   * Go => "go"
15:43:02.768 DEBUG:   * Kotlin => "kotlin"
15:43:02.768 DEBUG:   * T-SQL => "tsql"
15:43:02.769 DEBUG:   * Apex => "apex"
15:43:02.769 DEBUG:   * JavaScript => "js"
15:43:02.770 DEBUG:   * Ruby => "ruby"
15:43:02.770 DEBUG:   * COBOL => "cobol"
15:43:02.770 DEBUG:   * PHP => "php"
15:43:02.771 DEBUG:   * ABAP => "abap"
15:43:02.779 INFO: Load quality profiles
15:43:02.907 DEBUG: GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=grade-prime-decision-reasons-matching&organization=ORG_NAME| time=126ms
15:43:02.951 INFO: Load quality profiles (done) | time=172ms
15:43:02.971 INFO: Detected Gitlab CI
15:43:02.978 INFO: Load active rules
15:43:03.078 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdO&ps=500&p=1 | time=98ms
15:43:03.281 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhda&ps=500&p=1 | time=101ms
15:43:03.386 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWii9xOF49IDsqfZBjs2&ps=500&p=1 | time=97ms
15:43:03.507 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdN&ps=500&p=1 | time=121ms
15:43:03.646 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdM&ps=500&p=1 | time=107ms
15:43:03.764 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdH&ps=500&p=1 | time=101ms
15:43:03.886 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdK&ps=500&p=1 | time=115ms
15:43:04.049 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdL&ps=500&p=1 | time=141ms
15:43:04.215 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdE&ps=500&p=1 | time=104ms
15:43:04.324 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdG&ps=500&p=1 | time=107ms
15:43:04.423 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdJ&ps=500&p=1 | time=95ms
15:43:04.535 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdR&ps=500&p=1 | time=111ms
15:43:04.669 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdQ&ps=500&p=1 | time=121ms
15:43:04.801 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdZ&ps=500&p=1 | time=128ms
15:43:04.941 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdc&ps=500&p=1 | time=122ms
15:43:05.045 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdb&ps=500&p=1 | time=98ms
15:43:05.144 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdV&ps=500&p=1 | time=98ms
15:43:05.252 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdP&ps=500&p=1 | time=106ms
15:43:05.352 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdT&ps=500&p=1 | time=97ms
15:43:05.485 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdI&ps=500&p=1 | time=131ms
15:43:05.607 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhc_&ps=500&p=1 | time=109ms
15:43:05.730 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdX&ps=500&p=1 | time=117ms
15:43:05.839 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdU&ps=500&p=1 | time=102ms
15:43:05.954 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdS&ps=500&p=1 | time=113ms
15:43:06.075 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWfrrnG6qDdpA2vNWhdW&ps=500&p=1 | time=115ms
15:43:06.092 INFO: Load active rules (done) | time=3115ms
15:43:06.139 INFO: Organization key: ORG_NAME
15:43:06.214 DEBUG: Declared extensions of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss
15:43:06.215 DEBUG: Declared extensions of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb
15:43:06.215 DEBUG: Declared extensions of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
15:43:06.215 DEBUG: Declared extensions of language C# were converted to sonar.lang.patterns.cs : **/*.cs
15:43:06.216 DEBUG: Declared extensions of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
15:43:06.219 DEBUG: Declared extensions of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml
15:43:06.219 DEBUG: Declared extensions of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
15:43:06.219 DEBUG: Declared extensions of language Flex were converted to sonar.lang.patterns.flex : **/*.as
15:43:06.220 DEBUG: Declared extensions of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl
15:43:06.220 DEBUG: Declared extensions of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx
15:43:06.221 DEBUG: Declared extensions of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
15:43:06.224 DEBUG: Declared extensions of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
15:43:06.224 DEBUG: Declared extensions of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
15:43:06.225 DEBUG: Declared extensions of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp
15:43:06.226 DEBUG: Declared extensions of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
15:43:06.226 DEBUG: Declared extensions of language Python were converted to sonar.lang.patterns.py : **/*.py
15:43:06.226 DEBUG: Declared extensions of language Go were converted to sonar.lang.patterns.go : **/*.go
15:43:06.226 DEBUG: Declared extensions of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt
15:43:06.227 DEBUG: Declared extensions of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
15:43:06.227 DEBUG: Declared extensions of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
15:43:06.230 DEBUG: Declared extensions of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.vue
15:43:06.230 DEBUG: Declared extensions of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
15:43:06.230 DEBUG: Declared extensions of language COBOL were converted to sonar.lang.patterns.cobol : 
15:43:06.231 DEBUG: Declared extensions of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
15:43:06.231 DEBUG: Declared extensions of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
15:43:06.234 DEBUG: Will ignore generated code
15:43:06.238 DEBUG: Will ignore generated code
15:43:06.244 INFO: Indexing files...
15:43:06.248 INFO: Project configuration:
15:43:06.277 DEBUG: readpipe [git, --version],/usr/bin
15:43:06.311 DEBUG: readpipe may return 'git version 2.20.1'
15:43:06.311 DEBUG: remaining output:

15:43:06.313 DEBUG: readpipe [git, config, --system, --edit],/usr/bin
15:43:06.316 DEBUG: readpipe may return '/etc/gitconfig'
15:43:06.317 DEBUG: remaining output:

Analysis in debug mode continued:

15:43:06.395 DEBUG: 21 non excluded files in this Git repository
15:43:06.423 DEBUG: 'app.py' indexed with language 'py'
15:43:06.427 DEBUG: 'setup.py' indexed with language 'py'
15:43:06.434 DEBUG: 'drm/__init__.py' indexed with language 'py'
15:43:06.439 DEBUG: 'drm/actor_handler.py' indexed with language 'py'
15:43:06.446 DEBUG: 'tests/drm_test.py' indexed as test with language 'py'
15:43:06.450 DEBUG: File '/builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/tests/coverage.xml' is excluded by the scm ignore settings.
15:43:06.451 INFO: 5 files indexed
15:43:06.452 INFO: 0 files ignored because of scm ignore settings
15:43:06.454 INFO: Quality profile for py: Sonar way
15:43:06.454 INFO: ------------- Run sensors on module grade-prime-decision-reasons-matching
15:43:06.773 INFO: Load metrics repository
15:43:06.868 DEBUG: GET 200 https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative,custom&ps=500&p=1 | time=95ms
15:43:06.887 INFO: Load metrics repository (done) | time=114ms
15:43:11.461 DEBUG: 'JavaSquidSensor' skipped because there is no related file in current project
15:43:11.461 DEBUG: 'CobolSquidSensor' skipped because there is no related file in current project
15:43:11.465 DEBUG: 'Import external issues report' skipped because one of the required properties is missing
15:43:11.465 DEBUG: 'SonarCSS Metrics' skipped because there is no related file in current project
15:43:11.465 DEBUG: 'SonarCSS Rules' skipped because there is no related file in current project
15:43:11.466 DEBUG: 'Import of stylelint issues' skipped because there is no related file in current project
15:43:11.468 DEBUG: 'PL/SQL Sensor' skipped because there is no related file in current project
15:43:11.468 DEBUG: 'Scala Sensor' skipped because there is no related file in current project
15:43:11.469 DEBUG: 'Scoverage sensor for Scala coverage' skipped because one of the required properties is missing
15:43:11.470 DEBUG: 'Import of Scalastyle issues' skipped because there is no related file in current project
15:43:11.470 DEBUG: 'Import of Scapegoat issues' skipped because there is no related file in current project
15:43:11.470 DEBUG: 'C# Properties' skipped because there is no related file in current project
15:43:11.472 DEBUG: 'Import of Checkstyle issues' skipped because there is no related file in current project
15:43:11.472 DEBUG: 'Import of PMD issues' skipped because one of the required properties is missing
15:43:11.473 DEBUG: 'Import of SpotBugs issues' skipped because there is no related file in current project
15:43:11.473 DEBUG: 'SurefireSensor' skipped because there is no related file in current project
15:43:11.473 DEBUG: 'JaCoCoSensor' skipped because there is no related file in current project
15:43:11.474 DEBUG: 'Flex' skipped because there is no related file in current project
15:43:11.475 DEBUG: 'Flex Cobertura' skipped because there is no related file in current project
15:43:11.476 DEBUG: 'XML Sensor' skipped because there is no related file in current project
15:43:11.476 DEBUG: 'SonarTS' skipped because there is no related file in current project
15:43:11.477 DEBUG: 'SonarTS Coverage' skipped because there is no related file in current project
15:43:11.478 DEBUG: 'Import of TSLint issues' skipped because one of the required properties is missing
15:43:11.478 DEBUG: 'VB.NET Properties' skipped because there is no related file in current project
15:43:11.479 DEBUG: 'SonarSwift' skipped because there is no related file in current project
15:43:11.480 DEBUG: 'Import of SwiftLint issues' skipped because there is no related file in current project
15:43:11.481 DEBUG: 'gcov' skipped because there is no related file in current project
15:43:11.482 DEBUG: 'llvm-cov' skipped because there is no related file in current project
15:43:11.482 DEBUG: 'cppunit' skipped because there is no related file in current project
15:43:11.483 DEBUG: 'VisualStudioCoverage' skipped because there is no related file in current project
15:43:11.484 DEBUG: 'bullseye' skipped because there is no related file in current project
15:43:11.485 DEBUG: 'PylintSensor' skipped because there is no related rule activated in the quality profile
15:43:11.485 DEBUG: 'PylintImportSensor' skipped because there is no related rule activated in the quality profile
15:43:11.486 DEBUG: 'Import of Bandit issues' skipped because one of the required properties is missing
15:43:11.486 DEBUG: 'SonarGo' skipped because there is no related file in current project
15:43:11.487 DEBUG: 'Go Unit Test Report' skipped because there is no related file in current project
15:43:11.488 DEBUG: 'Import of go vet issues' skipped because there is no related file in current project
15:43:11.488 DEBUG: 'Import of Golint issues' skipped because there is no related file in current project
15:43:11.489 DEBUG: 'Import of GoMetaLinter issues' skipped because there is no related file in current project
15:43:11.489 DEBUG: 'Kotlin Sensor' skipped because there is no related file in current project
15:43:11.491 DEBUG: 'Import of detekt issues' skipped because there is no related file in current project
15:43:11.491 DEBUG: 'Import of Android Lint issues' skipped because one of the required properties is missing
15:43:11.492 DEBUG: 'T-SQL Sensor' skipped because there is no related file in current project
15:43:11.493 DEBUG: 'Apex Sensor' skipped because there is no related file in current project
15:43:11.493 DEBUG: 'Test coverage Sensor for Apex' skipped because there is no related file in current project
15:43:11.494 DEBUG: 'Import of PMD issues' skipped because one of the required properties is missing
15:43:11.494 DEBUG: 'SonarJS' skipped because there is no related file in current project
15:43:11.494 DEBUG: 'ESLint-based SonarJS' skipped because there is no related file in current project
15:43:11.495 DEBUG: 'SonarJS Coverage' skipped because there is no related file in current project
15:43:11.495 DEBUG: 'Import of ESLint issues' skipped because one of the required properties is missing
15:43:11.496 DEBUG: 'Ruby Sensor' skipped because there is no related file in current project
15:43:11.497 DEBUG: 'Import of RuboCop issues' skipped because one of the required properties is missing
15:43:11.498 DEBUG: 'SimpleCov Sensor for Ruby coverage' skipped because there is no related file in current project
15:43:11.498 DEBUG: 'PHP sensor' skipped because there is no related file in current project
15:43:11.498 DEBUG: 'Analyzer for "php.ini" files' skipped because there is no related file in current project
15:43:11.499 DEBUG: 'AbapSquidSensor' skipped because there is no related file in current project
15:43:11.505 DEBUG: 'Generic Coverage Report' skipped because one of the required properties is missing
15:43:11.505 DEBUG: 'Generic Test Executions Report' skipped because one of the required properties is missing
15:43:11.505 DEBUG: 'C#' skipped because there is no related file in current project
15:43:11.505 DEBUG: 'C# Tests Coverage Report Import' skipped because there is no related file in current project
15:43:11.506 DEBUG: '[Deprecated] C# Integration Tests Coverage Report Import' skipped because there is no related file in current project
15:43:11.507 DEBUG: 'C# Unit Test Results Import' skipped because there is no related file in current project
15:43:11.508 DEBUG: 'VB.NET' skipped because there is no related file in current project
15:43:11.508 DEBUG: 'VB.NET Tests Coverage Report Import' skipped because there is no related file in current project
15:43:11.508 DEBUG: '[Deprecated] VB.NET Integration Tests Coverage Report Import' skipped because there is no related file in current project
15:43:11.509 DEBUG: 'VB.NET Unit Test Results Import' skipped because there is no related file in current project
15:43:11.509 DEBUG: 'CFamily' skipped because there is no related file in current project
15:43:11.510 DEBUG: Sensors : JavaXmlSensor -> HTML -> Python Squid Sensor -> Cobertura Sensor for Python coverage -> PythonXUnitSensor -> JaCoCo XML Report Importer -> JavaSecuritySensor -> CSharpSecuritySensor -> PhpSecuritySensor
15:43:11.511 INFO: Sensor JavaXmlSensor [java]
15:43:11.512 INFO: Sensor JavaXmlSensor [java] (done) | time=1ms
15:43:11.512 INFO: Sensor HTML [web]
15:43:11.530 INFO: Sensor HTML [web] (done) | time=18ms
15:43:11.531 INFO: Sensor Python Squid Sensor [python]
15:43:11.945 INFO: Load project repositories
15:43:12.245 DEBUG: GET 200 https://sonarcloud.io/batch/project.protobuf?key=grade-prime-decision-reasons-matching | time=300ms
15:43:12.254 INFO: Load project repositories (done) | time=309ms
15:43:12.254 DEBUG: 'app.py' generated metadata with charset 'UTF-8'
15:43:12.419 DEBUG: 'drm/actor_handler.py' generated metadata with charset 'UTF-8'
15:43:12.576 DEBUG: 'setup.py' generated metadata with charset 'UTF-8'
15:43:12.608 DEBUG: 'drm/__init__.py' generated metadata with charset 'UTF-8'
15:43:12.613 DEBUG: Not enough content in 'drm/__init__.py' to have CPD blocks, it will not be part of the duplication detection
15:43:12.617 INFO: Sensor Python Squid Sensor [python] (done) | time=1087ms
15:43:12.618 INFO: Sensor Cobertura Sensor for Python coverage [python]
15:43:12.620 DEBUG: Using pattern 'tests/coverage.xml' to find reports
15:43:12.719 INFO: Python test coverage
15:43:12.722 INFO: Parsing report '/builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/tests/coverage.xml'
15:43:12.742 INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=124ms
15:43:12.743 INFO: Sensor PythonXUnitSensor [python]
15:43:12.743 DEBUG: Using pattern 'xunit-reports/xunit-result-*.xml' to find reports
15:43:12.815 DEBUG: No report was found for sonar.python.xunit.reportPath using default pattern xunit-reports/xunit-result-*.xml
15:43:12.816 INFO: Sensor PythonXUnitSensor [python] (done) | time=73ms
15:43:12.817 INFO: Sensor JaCoCo XML Report Importer [jacoco]
15:43:12.825 DEBUG: No reports found
15:43:12.825 INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=9ms
15:43:12.826 INFO: Sensor JavaSecuritySensor [security]
15:43:12.827 INFO: Reading type hierarchy from: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork/ucfg2/java
15:43:12.827 INFO: Read 0 type definitions
15:43:12.831 INFO: Reading UCFGs from: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork/ucfg2/java
15:43:12.832 INFO: No UCFGs have been included for analysis.
15:43:12.833 INFO: Sensor JavaSecuritySensor [security] (done) | time=6ms
15:43:12.833 INFO: Sensor CSharpSecuritySensor [security]
15:43:12.833 INFO: Reading type hierarchy from: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/ucfg_cs2
15:43:12.834 INFO: Read 0 type definitions
15:43:12.834 INFO: Reading UCFGs from: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/ucfg_cs2
15:43:12.834 INFO: No UCFGs have been included for analysis.
15:43:12.835 INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
15:43:12.835 INFO: Sensor PhpSecuritySensor [security]
15:43:12.835 INFO: Reading type hierarchy from: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork/ucfg2/php
15:43:12.836 INFO: Read 0 type definitions
15:43:12.836 INFO: Reading UCFGs from: /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork/ucfg2/php
15:43:12.836 INFO: No UCFGs have been included for analysis.
15:43:12.837 INFO: Sensor PhpSecuritySensor [security] (done) | time=2ms
15:43:12.842 INFO: ------------- Run sensors on project
15:43:12.851 DEBUG: 'Java CPD Block Indexer' skipped because there is no related file in current project
15:43:12.853 DEBUG: Sensors : Zero Coverage Sensor
15:43:12.854 INFO: Sensor Zero Coverage Sensor
15:43:12.880 INFO: Sensor Zero Coverage Sensor (done) | time=26ms
15:43:12.882 WARN: Forced reloading of SCM data for all files.
15:43:12.908 DEBUG: 'tests/drm_test.py' generated metadata as test  with charset 'UTF-8'
15:43:12.909 INFO: SCM provider for this project is: git
15:43:12.910 INFO: 5 files to be analyzed
15:43:12.924 DEBUG: Blame file drm/actor_handler.py
15:43:12.926 DEBUG: Blame file tests/drm_test.py
15:43:13.130 DEBUG: Blame file drm/__init__.py
15:43:13.150 DEBUG: Blame file setup.py
15:43:13.157 DEBUG: Blame file app.py
15:43:13.237 INFO: 5/5 files analyzed
15:43:13.243 INFO: 1 file had no CPD blocks
15:43:13.252 INFO: Calculating CPD for 3 files
15:43:13.252 DEBUG: Detection of duplications for /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/drm/actor_handler.py
15:43:13.268 DEBUG: Detection of duplications for /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/setup.py
15:43:13.269 DEBUG: Detection of duplications for /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/app.py
15:43:13.270 INFO: CPD calculation finished
15:43:13.442 INFO: Analysis report generated in 168ms, dir size=203 KB
15:43:13.468 INFO: Analysis report compressed in 25ms, zip size=38 KB
15:43:13.469 INFO: Analysis report generated in /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork/scanner-report
15:43:13.469 DEBUG: Upload report
15:43:13.666 DEBUG: POST 200 https://sonarcloud.io/api/ce/submit?organization=westcreek&projectKey=grade-prime-decision-reasons-matching | time=196ms
15:43:13.669 INFO: Analysis report uploaded in 200ms
15:43:13.670 INFO: ANALYSIS SUCCESSFUL, you can browse https://sonarcloud.io/dashboard?id=grade-prime-decision-reasons-matching
15:43:13.671 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
15:43:13.671 INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AWyvskzNubB2nFeSS8gz
15:43:13.672 DEBUG: Report metadata written to /builds/ORG_NAME/grade/grade-prime-decision-reasons-matching/.scannerwork/report-task.txt
15:43:13.675 DEBUG: Post-jobs : 
15:43:13.677 INFO: Analysis total time: 12.408 s
15:43:13.681 INFO: ------------------------------------------------------------------------
15:43:13.681 INFO: EXECUTION SUCCESS
15:43:13.681 INFO: ------------------------------------------------------------------------
15:43:13.682 INFO: Total time: 38.757s
15:43:13.922 INFO: Final Memory: 35M/354M
15:43:13.922 INFO: ------------------------------------------------------------------------

Hi,
I have the same issue.

I see this line in debug logs (both mine and yours). Is it what’s causing the issue?

What the property is it complaining about? @Alexandre_Frigout

1 Like

I think based on this issue discussion here coverage 0% in sonarqube is due to both JaCoCo & SonarQube have its own exlusions area. Thus, we need to specify both exclusions in Jacoco & SonarQube, as explained on my workaround in the github issue above.

Can you assist me to know how you generated the coverage.xml file for this sonar scan. I am little new to this area and facing same issue . My source code is cobol where i need to run the coverage and shows in cloud dashboard.
Any help will be highly appreciated.

For my problem, @Alexandre_Frigout was correct: the absolute files paths were causing Sonar to show no coverage. It was because the tests were running in a virtual environment. As temporary workaround, I am using sed in the pipeline to remove the absolute path.

2 Likes

Thanks for the response.
I am using cobol as source code and want to know to generate the coverage xml and what changes has to be done in property file to read the coverage.xml and report the coverage percentage on the dashboard.

I had this problem too and also had to use sed as a workround (thanks @munson!) - see here. Interestingly I was also testing python code that was installed under site-packages rather than running the tests against the checked-out code directly.

See the Test Coverage & Execution section in our documentation. The property to configure test coverage for Scoverage should be sonar.scala.coverage.reportPaths.