Sonarcloud cannot read coverage report for nodejs project

Hello, I am using sonarcloud for a test project but I can’t find a way to get the coverage report. Here I have the sonarcloud config file with all the code (I set both sonar.javascript.lcov.reportPaths and sonar.testExecutionReportPaths according to tutorials), but the project page doesn’t show coverage at all. Am I doing something wrong? Thank you for your help.

Cheers

Hello @daniele123321,
Please attach the analysis logs in debug mode so we can have a look at what the coverage sensor logs.
Alex.

Thank you for your response. I cannot find anywhere the analysis logs, I already put sonar.log.level=debug in the .sonarcloud.properties file, but the only “logs” I can see are under administration > background tasks > show sonarscanner context (I included it below, but they don’t seem to contain anything relevant).
Are these logs only accessible when running sonarqube locally? I’m using only the website.

SonarCloud plugins:

  • SonarCSS 1.2.1.1602 (cssfamily)
  • PL/SQL Code Quality and Security 3.5.0.3437 (plsql)
  • Scala Code Quality and Security 1.8.1.1804 (sonarscala)
  • C# Code Quality and Security 8.14.0.22654 (csharp)
  • Vulnerability Analysis 8.6.0-M1.5425 (security)
  • Java Code Quality and Security 6.9.0.23563 (java)
  • HTML Code Quality and Security 3.3.0.2534 (web)
  • Flex Code Quality and Security 2.6.0.2294 (flex)
  • SonarXML 2.0.1.2020 (xml)
  • VB.NET Code Quality and Security 8.14.0.22654 (vbnet)
  • Swift Code Quality and Security 4.3.0.4687 (swift)
  • CFamily Code Quality and Security 6.14.0.23970 (cpp)
  • Python Code Quality and Security 3.1.0.7619 (python)
  • Go Code Quality and Security 1.8.1.1804 (go)
  • JaCoCo 1.1.0.898 (jacoco)
  • Kotlin Code Quality and Security 1.8.1.1804 (kotlin)
  • Mercurial 1.1.2 (scmmercurial)
  • T-SQL Code Quality and Security 1.5.0.3958 (tsql)
  • Apex Code Quality and Security 1.8.1.1804 (sonarapex)
  • JavaScript/TypeScript Code Quality and Security 6.7.0.14237 (javascript)
  • Ruby Code Quality and Security 1.8.1.1804 (ruby)
  • Vulnerability Rules for C# 8.6.0-M1.5425 (securitycsharpfrontend)
  • Vulnerability Rules for Java 8.6.0-M1.5425 (securityjavafrontend)
  • License for SonarLint 8.0.0.14515 (license)
  • Vulnerability Rules for JS 8.6.0-M1.5425 (securityjsfrontend)
  • COBOL Code Quality 4.6.0.4639 (cobol)
  • Vulnerability Rules for Python 8.6.0-M1.5425 (securitypythonfrontend)
  • Git 1.12.1.2064 (scmgit)
  • PHP Code Quality and Security 3.12.0.6710 (php)
  • ABAP Code Quality and Security 3.9.0.2739 (abap)
  • Vulnerability Rules for PHP 8.6.0-M1.5425 (securityphpfrontend)
    Global server settings:
  • email.from=noreply@sonarcloud.io
  • email.fromName=SonarCloud
  • email.prefix=[SonarCloud]
  • sonar.auth.bitbucket.enabled=true
  • sonar.auth.microsoft.enabled=true
  • sonar.core.id=1BD809FA-AWHW8ct9-T_TB3XqouNu
  • sonar.core.serverBaseURL=https://sonarcloud.io
  • sonar.core.startTime=2020-11-17T10:58:35+0100
  • sonar.dbcleaner.weeksBeforeDeletingAllSnapshots=480
  • sonar.dbcleaner.weeksBeforeKeepingOnlyOneSnapshotByMonth=4
  • sonar.dbcleaner.weeksBeforeKeepingOnlyOneSnapshotByWeek=1
  • sonar.feature_flag.bbc_code_reports.enabled=true
  • sonar.lf.enableGravatar=true
  • sonar.lf.logoWidthPx=105
  • sonar.organizations.anyoneCanCreate=true
  • sonar.organizations.createPersonalOrg=true
  • sonar.plsql.file.suffixes=sql,tab,pkb
  • sonar.tsql.file.suffixes=.tsql
    Project server settings:
  • sonar.autoscan.enabled=true
    Project scanner properties:
  • sonar.analysisUuid=AXXagCoqbzAwuilCumVp
  • sonar.coverage.exclusions=**/*
  • sonar.exclusions=/*.cs,/.c,**/.h,/*.cc,/.cpp,**/.cxx,/*.c++,/.hh,**/.hpp,/*.hxx,/.h++,**/.ipp,/*.m,/.java,**/.jav,/*sql,/tab,/*pkb,/.vb
  • sonar.host.url=https://sonarcloud.io/
  • sonar.java.binaries=/tmp/clone16472405942814524072
  • sonar.login=******
  • sonar.organization=se2team8
  • sonar.password=******
  • sonar.projectBaseDir=/tmp/clone16472405942814524072
  • sonar.projectKey=s269731_PULSeBS-Team8
  • sonar.scanner.app=ScannerCLI
  • sonar.scanner.appVersion=4.4.0.2170
  • sonar.scm.provider=git
  • sonar.sourceEncoding=UTF-8
  • sonar.sources=./server/src,./client/src
  • sonar.test.exclusions=/*.cs,/.c,**/.h,/*.cc,/.cpp,**/.cxx,/*.c++,/.hh,**/.hpp,/*.hxx,/.h++,**/.ipp,/*.m,/.java,**/.jav,/*sql,/tab,/*pkb,/.vb
  • sonar.working.directory=/tmp/clone16472405942814524072/.scannerwork

@daniele123321
Where is the analysis ran from ? The analysis logs should be located there.
Alex.

It’s ran automatically by Sonarcloud, I don’t manually trigger the analysis.

@daniele123321 as you can read in the automatic scan documentation limitations, coverage informations is not supported for the moment. This is why you do not see your coverage data in SonarCloud.

Thank you for your help, I managed to solve this issue by disabling automatic scanning.