Sonarqube 9.9 sonar.typescript.lcov.reportPaths doesn't support wildcards

Must-share information (formatted with Markdown):

  • which versions are you using (SonarQube, Scanner, Plugin, and any relevant extension)
    SonarQube extension for Azure DevOps 5.18.4
    SonarScanner 4.8.1.3023
    Java 11.0.20.1 Ubuntu (64-bit)
    Linux 5.15.0-1041-azure amd64
    Analyzing on SonarQube server 9.9.0.65466

  • how is SonarQube deployed: zip, Docker, Helm
    azure pipeline extension

  • what are you trying to achieve
    scan angular project

  • what have you tried so far to achieve this
    To verify the issue, I added 3 paths

sonar.typescript.lcov.reportPaths=
  $(Build.SourcesDirectory)/coverageReporter/drop${TEST_RESULTS_FOLDER}/**/coverage.lcov,
  $(Build.SourcesDirectory)/coverageReporter/drop/user/build/_w/ut/ut/coverage/libs/features/fingerprint-plot/coverageReporter/coverage.lcov,
   **/*.lcov

And the log said:

INFO: Sensor JavaScript/TypeScript Coverage [javascript]
INFO: No LCOV files were found using **/*.lcov
INFO: No LCOV files were found using /azp/_work/1/s/coverageReporter/drop/**/coverage.lcov
INFO: Analysing [/azp/_work/1/s/coverageReporter/drop/user/build/_w/ut/ut/coverage/libs/features/fingerprint-plot/coverageReporter/coverage.lcov]

So only the exact path works
Do not share screenshots of logs – share the text itself (bonus points for being well-formatted)!

Hey there.

You should be able to use wildcards with sonar.javascript.lcov.reportPaths – which is now the only valid analysis parameter to pass Javascript/Typescript coverage reports. This was added with Support wildcards for coverage report paths · Issue #578 · SonarSource/SonarJS · GitHub.

I tried again, but it doesn’t work
image

If it supports wildcards, both paths should work, right?

I changed report file name and tried ‘*/lcov.info’ as well. It didn’t work either

Hey there.

I’m a bit stumped. Could you share your full analysis logs of this run with all three options specified in DEBUG mode (sonar.verbose=true)

thanks for your response. Here is the log:

17:10:15.003 INFO: Sensor JavaScript/TypeScript Coverage [javascript]
17:10:15.003 DEBUG: Property sonar.typescript.lcov.reportPaths is used.
17:10:15.004 DEBUG: Using ‘/azp/_work/1/s/coverageReporter/drop/user/build/_w/ut/ut/coverage/libs/features/fingerprint-plot/coverageReporter/coverage.lcov’ to resolve LCOV files
17:10:15.004 DEBUG: Using ‘**/*.lcov’ to resolve LCOV files
17:10:15.385 INFO: No LCOV files were found using **/*.lcov
17:10:15.385 DEBUG: Using ‘/azp/_work/1/s/coverageReporter/drop/**/coverage.lcov’ to resolve LCOV files
17:10:15.649 INFO: No LCOV files were found using /azp/_work/1/s/coverageReporter/drop/**/coverage.lcov
17:10:15.649 INFO: Analysing [/azp/_work/1/s/coverageReporter/drop/user/build/_w/ut/ut/coverage/libs/features/fingerprint-plot/coverageReporter/coverage.lcov]

In the project, we have two lcov files:

  • ‘/azp/_work/1/s/coverageReporter/drop/user/build/_w/ut/ut/coverageReporter/coverage.lcov’

  • ‘/azp/_work/1/s/coverageReporter/drop/user/build/_w/ut/ut/coverage/libs/features/fingerprint-plot/coverageReporter/coverage.lcov’

Hey there.

As previously mentioned, can you share the full analysis logs?

 ##[section]Starting: SonarQubeAnalyze
 ==============================================================================
 Task         : Run Code Analysis
 Description  : Run scanner and upload the results to the SonarQube server.
 Version      : 5.18.4
 Author       : sonarsource
 Help         : Version: 5.18.4. This task is not needed for Maven and Gradle projects since the scanner should be run as part of the build.

[More Information](http://redirect.sonarsource.com/doc/install-configure-scanner-tfs-ts.html)
 ==============================================================================
 [command]/azp/_work/_tasks/SonarQubeAnalyze_6d01813a-9589-4b15-8491-8164aeb38055/5.18.4/sonar-scanner/bin/sonar-scanner
 INFO: Scanner configuration file: /azp/_work/_tasks/SonarQubeAnalyze_6d01813a-9589-4b15-8491-8164aeb38055/5.18.4/sonar-scanner/conf/sonar-scanner.properties
 INFO: Project root configuration file: /azp/_work/1/s/xxxViz.View.Viewer/sonar-project.properties
 17:08:27.376 INFO: SonarScanner 4.8.1.3023
 17:08:27.392 INFO: Java 11.0.20.1 Ubuntu (64-bit)
 17:08:27.392 INFO: Linux 5.15.0-1041-azure amd64
 17:08:27.539 DEBUG: keyStore is :
 17:08:27.540 DEBUG: keyStore type is : pkcs12
 17:08:27.540 DEBUG: keyStore provider is :
 17:08:27.540 DEBUG: init keystore
 17:08:27.541 DEBUG: init keymanager of type SunX509
 17:08:27.643 DEBUG: Create: /root/.sonar/cache
 17:08:27.644 INFO: User cache: /root/.sonar/cache
 17:08:27.644 DEBUG: Create: /root/.sonar/cache/_tmp
 17:08:27.646 DEBUG: Extract sonar-scanner-api-batch in temp...
 17:08:27.649 DEBUG: Get bootstrap index...
 17:08:27.649 DEBUG: Download: https://sonarqube.xxx.com/batch/index
 17:08:27.899 DEBUG: Get bootstrap completed
 17:08:27.903 DEBUG: Download https://sonarqube.xxx.com/batch/file?name=scanner-enterprise-9.9.0.65466-all.jar to /root/.sonar/cache/_tmp/fileCache2030828349897899217.tmp
 17:08:28.679 DEBUG: Create isolated classloader...
 17:08:28.688 DEBUG: Start temp cleaning...
 17:08:28.692 DEBUG: Temp cleaning done
 17:08:28.692 DEBUG: Execution getVersion
 17:08:28.712 INFO: Analyzing on SonarQube server 9.9.0.65466
 17:08:28.712 INFO: Default locale: "en_US", source code encoding: "US-ASCII" (analysis is platform dependent)
 17:08:28.713 DEBUG: Work directory: /azp/_work/1/s/xxxViz.View.Viewer/.scannerwork
 17:08:28.714 DEBUG: Execution execute
 17:08:29.026 DEBUG: Enterprise 9.9.0.65466
 17:08:29.283 INFO: Load global settings
 17:08:29.407 DEBUG: GET 200 https://sonarqube.xxx.com/api/settings/values.protobuf | time=122ms
 17:08:29.454 INFO: Load global settings (done) | time=171ms
 17:08:29.458 INFO: Server id: 5E4F19DE-AWbT5RFoZ6kmvKAgcGVB
 17:08:29.467 DEBUG: Create : /root/.sonar/_tmp
 17:08:29.467 INFO: User cache: /root/.sonar/cache
 17:08:29.471 INFO: Load/download plugins
 17:08:29.471 INFO: Load plugins index
 17:08:29.485 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/installed | time=13ms
 17:08:29.528 INFO: Load plugins index (done) | time=57ms
 17:08:29.529 DEBUG: Download plugin 'abap' to '/root/.sonar/_tmp/fileCache7840959567986938433.tmp'
 17:08:29.542 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=abap | time=13ms
 17:08:29.574 DEBUG: Download plugin 'sonarapex' to '/root/.sonar/_tmp/fileCache10856158104301649932.tmp'
 17:08:29.586 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=sonarapex | time=11ms
 17:08:29.651 DEBUG: Download plugin 'authaad' to '/root/.sonar/_tmp/fileCache11233253380575825825.tmp'
 17:08:29.664 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=authaad | time=13ms
 17:08:29.690 DEBUG: Download plugin 'csharp' to '/root/.sonar/_tmp/fileCache16366921511018404708.tmp'
 17:08:29.706 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=csharp | time=16ms
 17:08:29.759 DEBUG: Download plugin 'cpp' to '/root/.sonar/_tmp/fileCache10486802496815163523.tmp'
 17:08:29.771 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=cpp | time=12ms
 17:08:30.232 DEBUG: Download plugin 'cobol' to '/root/.sonar/_tmp/fileCache9808084466333890111.tmp'
 17:08:30.245 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=cobol | time=13ms
 17:08:30.290 DEBUG: Download plugin 'scmcvs' to '/root/.sonar/_tmp/fileCache5610907844290718972.tmp'
 17:08:30.302 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=scmcvs | time=11ms
 17:08:30.308 DEBUG: Download plugin 'checkstyle' to '/root/.sonar/_tmp/fileCache9714775028502962386.tmp'
 17:08:30.319 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=checkstyle | time=11ms
 17:08:30.455 DEBUG: Download plugin 'coldfusion' to '/root/.sonar/_tmp/fileCache211604461045300821.tmp'
 17:08:30.468 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=coldfusion | time=13ms
 17:08:30.566 DEBUG: Download plugin 'config' to '/root/.sonar/_tmp/fileCache306385463272514559.tmp'
 17:08:30.579 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=config | time=12ms
 17:08:30.581 DEBUG: Download plugin 'dbd' to '/root/.sonar/_tmp/fileCache1272481982503221548.tmp'
 17:08:30.592 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=dbd | time=10ms
 17:08:30.613 DEBUG: Download plugin 'dbdjavafrontend' to '/root/.sonar/_tmp/fileCache6568084330586261993.tmp'
 17:08:30.624 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=dbdjavafrontend | time=11ms
 17:08:30.642 DEBUG: Download plugin 'dbdpythonfrontend' to '/root/.sonar/_tmp/fileCache11706860739006658679.tmp'
 17:08:30.654 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=dbdpythonfrontend | time=10ms
 17:08:30.670 DEBUG: Download plugin 'findbugs' to '/root/.sonar/_tmp/fileCache13574796837929357741.tmp'
 17:08:30.681 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=findbugs | time=11ms
 17:08:30.818 DEBUG: Download plugin 'flex' to '/root/.sonar/_tmp/fileCache15073253544689115293.tmp'
 17:08:30.831 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=flex | time=13ms
 17:08:30.843 DEBUG: Download plugin 'flutter' to '/root/.sonar/_tmp/fileCache8700536308377906664.tmp'
 17:08:30.856 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=flutter | time=12ms
 17:08:30.901 DEBUG: Download plugin 'go' to '/root/.sonar/_tmp/fileCache7873595477674381323.tmp'
 17:08:30.913 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=go | time=12ms
 17:08:30.962 DEBUG: Download plugin 'groovy' to '/root/.sonar/_tmp/fileCache16813405335724833726.tmp'
 17:08:30.974 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=groovy | time=12ms
 17:08:31.059 DEBUG: Download plugin 'web' to '/root/.sonar/_tmp/fileCache923981421571357246.tmp'
 17:08:31.071 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=web | time=12ms
 17:08:31.078 DEBUG: Download plugin 'iac' to '/root/.sonar/_tmp/fileCache506050727024839370.tmp'
 17:08:31.090 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=iac | time=12ms
 17:08:31.102 DEBUG: Download plugin 'jacoco' to '/root/.sonar/_tmp/fileCache7179240493689120231.tmp'
 17:08:31.114 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=jacoco | time=11ms
 17:08:31.116 DEBUG: Download plugin 'java' to '/root/.sonar/_tmp/fileCache10301367048883221369.tmp'
 17:08:31.129 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=java | time=13ms
 17:08:31.272 DEBUG: Download plugin 'javascript' to '/root/.sonar/_tmp/fileCache7815543044784797746.tmp'
 17:08:31.284 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=javascript | time=12ms
 17:08:31.457 DEBUG: Download plugin 'kotlin' to '/root/.sonar/_tmp/fileCache15979306076085864597.tmp'
 17:08:31.470 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=kotlin | time=13ms
 17:08:31.751 DEBUG: Download plugin 'php' to '/root/.sonar/_tmp/fileCache6289268848758802193.tmp'
 17:08:31.763 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=php | time=12ms
 17:08:31.807 DEBUG: Download plugin 'pli' to '/root/.sonar/_tmp/fileCache9009211874702129501.tmp'
 17:08:31.844 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=pli | time=37ms
 17:08:31.886 DEBUG: Download plugin 'plsql' to '/root/.sonar/_tmp/fileCache5647940404121525545.tmp'
 17:08:31.896 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=plsql | time=10ms
 17:08:31.955 DEBUG: Download plugin 'python' to '/root/.sonar/_tmp/fileCache1031197009437163560.tmp'
 17:08:31.966 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=python | time=11ms
 17:08:32.071 DEBUG: Download plugin 'rpg' to '/root/.sonar/_tmp/fileCache12305600768634232559.tmp'
 17:08:32.084 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=rpg | time=12ms
 17:08:32.104 DEBUG: Download plugin 'ruby' to '/root/.sonar/_tmp/fileCache9677210977263701478.tmp'
 17:08:32.115 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=ruby | time=11ms
 17:08:32.257 DEBUG: Download plugin 'sonarscala' to '/root/.sonar/_tmp/fileCache18254752750058715934.tmp'
 17:08:32.269 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=sonarscala | time=12ms
 17:08:32.380 DEBUG: Download plugin 'sonargraphintegration' to '/root/.sonar/_tmp/fileCache16963953084407966617.tmp'
 17:08:32.393 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=sonargraphintegration | time=12ms
 17:08:32.407 DEBUG: Download plugin 'swift' to '/root/.sonar/_tmp/fileCache6432054645678495236.tmp'
 17:08:32.418 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=swift | time=11ms
 17:08:32.436 DEBUG: Download plugin 'tsql' to '/root/.sonar/_tmp/fileCache16249519914986578712.tmp'
 17:08:32.447 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=tsql | time=11ms
 17:08:32.467 DEBUG: Download plugin 'text' to '/root/.sonar/_tmp/fileCache3056377298696546292.tmp'
 17:08:32.480 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=text | time=13ms
 17:08:32.483 DEBUG: Download plugin 'vbnet' to '/root/.sonar/_tmp/fileCache12389279799988518463.tmp'
 17:08:32.493 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=vbnet | time=10ms
 17:08:32.527 DEBUG: Download plugin 'vb' to '/root/.sonar/_tmp/fileCache8848394624541407846.tmp'
 17:08:32.538 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=vb | time=11ms
 17:08:32.555 DEBUG: Download plugin 'security' to '/root/.sonar/_tmp/fileCache2451620268757692849.tmp'
 17:08:32.565 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=security | time=10ms
 17:08:32.659 DEBUG: Download plugin 'securitycsharpfrontend' to '/root/.sonar/_tmp/fileCache13663697337019988365.tmp'
 17:08:32.671 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=securitycsharpfrontend | time=12ms
 17:08:32.681 DEBUG: Download plugin 'securityjsfrontend' to '/root/.sonar/_tmp/fileCache10245569840615750674.tmp'
 17:08:32.692 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=securityjsfrontend | time=11ms
 17:08:32.698 DEBUG: Download plugin 'securityjavafrontend' to '/root/.sonar/_tmp/fileCache18216246825408179119.tmp'
 17:08:32.709 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=securityjavafrontend | time=10ms
 17:08:32.783 DEBUG: Download plugin 'securityphpfrontend' to '/root/.sonar/_tmp/fileCache18212341594463970993.tmp'
 17:08:32.795 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=securityphpfrontend | time=12ms
 17:08:32.816 DEBUG: Download plugin 'securitypythonfrontend' to '/root/.sonar/_tmp/fileCache2665319871087884931.tmp'
 17:08:32.827 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=securitypythonfrontend | time=11ms
 17:08:32.848 DEBUG: Download plugin 'xml' to '/root/.sonar/_tmp/fileCache5668911363965389547.tmp'
 17:08:32.860 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=xml | time=12ms
 17:08:32.880 DEBUG: Download plugin 'jdepend' to '/root/.sonar/_tmp/fileCache6008538954323713288.tmp'
 17:08:32.891 DEBUG: GET 200 https://sonarqube.xxx.com/api/plugins/download?plugin=jdepend | time=11ms
 17:08:32.894 INFO: Load/download plugins (done) | time=3423ms
 17:08:33.800 DEBUG: Plugins:
 17:08:33.801 DEBUG:   * CVS 1.1.1 (scmcvs)
 17:08:33.801 DEBUG:   * IaC Code Quality and Security 1.11.0.2847 (iac)
 17:08:33.801 DEBUG:   * PL/SQL Code Quality and Security 3.8.0.4948 (plsql)
 17:08:33.801 DEBUG:   * Scala Code Quality and Security 1.11.0.3905 (sonarscala)
 17:08:33.801 DEBUG:   * C# Code Quality and Security 8.51.0.59060 (csharp)
 17:08:33.801 DEBUG:   * Vulnerability Analysis 9.9.0.19083 (security)
 17:08:33.801 DEBUG:   * Java Code Quality and Security 7.16.0.30901 (java)
 17:08:33.801 DEBUG:   * Sonargraph Integration 7.0.0 (sonargraphintegration)
 17:08:33.801 DEBUG:   * HTML Code Quality and Security 3.7.1.3306 (web)
 17:08:33.801 DEBUG:   * Flex Code Quality and Security 2.8.0.3166 (flex)
 17:08:33.802 DEBUG:   * XML Code Quality and Security 2.7.0.3820 (xml)
 17:08:33.802 DEBUG:   * Text Code Quality and Security 2.0.1.611 (text)
 17:08:33.802 DEBUG:   * Checkstyle 10.6.0 (checkstyle)
 17:08:33.802 DEBUG:   * VB.NET Code Quality and Security 8.51.0.59060 (vbnet)
 17:08:33.802 DEBUG:   * ColdFusion 2.2.0 (coldfusion)
 17:08:33.802 DEBUG:   * Swift Code Quality and Security 4.8.0.5759 (swift)
 17:08:33.802 DEBUG:   * CFamily Code Quality and Security 6.41.0.60884 (cpp)
 17:08:33.802 DEBUG:   * Python Code Quality and Security 3.24.0.10784 (python)
 17:08:33.802 DEBUG:   * Dataflow Bug Detection Rules for Python 1.10.0.3046 (dbdpythonfrontend)
 17:08:33.802 DEBUG:   * Dataflow Bug Detection 1.10.0.3046 (dbd)
 17:08:33.802 DEBUG:   * Go Code Quality and Security 1.11.0.3905 (go)
 17:08:33.802 DEBUG:   * JaCoCo 1.3.0.1538 (jacoco)
 17:08:33.803 DEBUG:   * Kotlin Code Quality and Security 2.12.0.1956 (kotlin)
 17:08:33.803 DEBUG:   * RPG Code Quality 3.3.0.3147 (rpg)
 17:08:33.803 DEBUG:   * Azure Active Directory (AAD) Authentication Plug-in for SonarQube 1.3.2 (authaad)
 17:08:33.803 DEBUG:   * jDepend 1.1.1 (jdepend)
 17:08:33.803 DEBUG:   * Dataflow Bug Detection Rules for Java 1.10.0.3046 (dbdjavafrontend)
 17:08:33.803 DEBUG:   * PL/I Code Quality and Security 1.12.0.3443 (pli)
 17:08:33.803 DEBUG:   * T-SQL Code Quality and Security 1.7.0.5449 (tsql)
 17:08:33.803 DEBUG:   * VB6 Code Quality and Security 2.9.0.3341 (vb)
 17:08:33.803 DEBUG:   * Apex Code Quality and Security 1.11.0.3905 (sonarapex)
 17:08:33.803 DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 9.13.0.20537 (javascript)
 17:08:33.803 DEBUG:   * Ruby Code Quality and Security 1.11.0.3905 (ruby)
 17:08:33.803 DEBUG:   * Vulnerability Rules for C# 9.9.0.19083 (securitycsharpfrontend)
 17:08:33.803 DEBUG:   * Vulnerability Rules for Java 9.9.0.19083 (securityjavafrontend)
 17:08:33.804 DEBUG:   * Findbugs 4.2.2 (findbugs)
 17:08:33.804 DEBUG:   * Flutter 0.4.0 (flutter)
 17:08:33.804 DEBUG:   * Vulnerability Rules for JS 9.9.0.19083 (securityjsfrontend)
 17:08:33.804 DEBUG:   * Groovy 1.8 (groovy)
 17:08:33.804 DEBUG:   * COBOL Code Quality 5.2.0.5949 (cobol)
 17:08:33.804 DEBUG:   * Vulnerability Rules for Python 9.9.0.19083 (securitypythonfrontend)
 17:08:33.804 DEBUG:   * PHP Code Quality and Security 3.27.1.9352 (php)
 17:08:33.804 DEBUG:   * ABAP Code Quality and Security 3.11.0.4030 (abap)
 17:08:33.804 DEBUG:   * Configuration detection fot Code Quality and Security 1.2.0.267 (config)
 17:08:33.804 DEBUG:   * Vulnerability Rules for PHP 9.9.0.19083 (securityphpfrontend)
 17:08:33.871 INFO: Loaded core extensions: developer-scanner
 17:08:33.885 DEBUG: Installed core extension: developer-scanner
 17:08:34.476 INFO: Process project properties
 17:08:34.485 INFO: Process project properties (done) | time=10ms
 17:08:34.487 INFO: Execute project builders
 17:08:34.488 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
 17:08:34.489 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
 17:08:34.489 INFO: Execute project builders (done) | time=2ms
 17:08:34.492 INFO: Project key: DrillOpsTownxxxViz-xxxViz.View.Viewer
 17:08:34.492 INFO: Base dir: /azp/_work/1/s/xxxViz.View.Viewer
 17:08:34.492 INFO: Working dir: /azp/_work/1/s/xxxViz.View.Viewer/.scannerwork
 17:08:34.492 DEBUG: Project global encoding: US-ASCII, default locale: en_US
 17:08:34.502 INFO: Load project settings for component key: 'DrillOpsTownxxxViz-xxxViz.View.Viewer'
 17:08:34.536 DEBUG: GET 200 https://sonarqube.xxx.com/api/settings/values.protobuf?component=DrillOpsTownxxxViz-xxxViz.View.Viewer | time=34ms
 17:08:34.539 INFO: Load project settings for component key: 'DrillOpsTownxxxViz-xxxViz.View.Viewer' (done) | time=36ms
 17:08:34.625 INFO: Load project branches
 17:08:34.726 DEBUG: GET 200 https://sonarqube.xxx.com/api/project_branches/list?project=DrillOpsTownxxxViz-xxxViz.View.Viewer | time=101ms
 17:08:34.733 INFO: Load project branches (done) | time=108ms
 17:08:34.733 INFO: Load branch configuration
 17:08:34.735 INFO: Found manual configuration of branch/PR analysis. Skipping automatic configuration.
 17:08:34.736 INFO: Load branch configuration (done) | time=3ms
 17:08:34.746 DEBUG: Creating module hierarchy
 17:08:34.746 DEBUG:   Init module 'DrillOpsTownxxxViz-xxxViz.View.Viewer'
 17:08:34.747 DEBUG:     Base dir: /azp/_work/1/s/xxxViz.View.Viewer
 17:08:34.747 DEBUG:     Working dir: /azp/_work/1/s/xxxViz.View.Viewer/.scannerwork
 17:08:34.747 DEBUG:     Module global encoding: US-ASCII, default locale: en_US
 17:08:34.777 DEBUG: Available languages:
 17:08:34.777 DEBUG:   * Terraform => "terraform"
 17:08:34.777 DEBUG:   * CloudFormation => "cloudformation"
 17:08:34.778 DEBUG:   * Kubernetes => "kubernetes"
 17:08:34.778 DEBUG:   * Docker => "docker"
 17:08:34.778 DEBUG:   * PL/SQL => "plsql"
 17:08:34.778 DEBUG:   * Scala => "scala"
 17:08:34.778 DEBUG:   * C# => "cs"
 17:08:34.778 DEBUG:   * Java => "java"
 17:08:34.778 DEBUG:   * HTML => "web"
 17:08:34.778 DEBUG:   * JSP => "jsp"
 17:08:34.778 DEBUG:   * Flex => "flex"
 17:08:34.778 DEBUG:   * XML => "xml"
 17:08:34.778 DEBUG:   * Text => "text"
 17:08:34.778 DEBUG:   * Secrets => "secrets"
 17:08:34.778 DEBUG:   * VB.NET => "vbnet"
 17:08:34.778 DEBUG:   * ColdFusion => "cf"
 17:08:34.778 DEBUG:   * Swift => "swift"
 17:08:34.778 DEBUG:   * C => "c"
 17:08:34.779 DEBUG:   * C++ => "cpp"
 17:08:34.779 DEBUG:   * Objective-C => "objc"
 17:08:34.779 DEBUG:   * Python => "py"
 17:08:34.779 DEBUG:   * Go => "go"
 17:08:34.779 DEBUG:   * Kotlin => "kotlin"
 17:08:34.779 DEBUG:   * RPG => "rpg"
 17:08:34.779 DEBUG:   * PL/I => "pli"
 17:08:34.779 DEBUG:   * T-SQL => "tsql"
 17:08:34.779 DEBUG:   * Vb => "vb"
 17:08:34.779 DEBUG:   * Apex => "apex"
 17:08:34.779 DEBUG:   * JavaScript => "js"
 17:08:34.779 DEBUG:   * TypeScript => "ts"
 17:08:34.779 DEBUG:   * CSS => "css"
 17:08:34.779 DEBUG:   * Ruby => "ruby"
 17:08:34.779 DEBUG:   * Dart => "dart"
 17:08:34.779 DEBUG:   * Groovy => "grvy"
 17:08:34.779 DEBUG:   * COBOL => "cobol"
 17:08:34.779 DEBUG:   * PHP => "php"
 17:08:34.780 DEBUG:   * ABAP => "abap"
 17:08:34.780 DEBUG:   * YAML => "yaml"
 17:08:34.780 DEBUG:   * JSON => "json"
 17:08:34.829 INFO: Auto-configuring with CI 'Azure DevOps'
 17:08:34.832 INFO: Load quality profiles
 17:08:34.885 DEBUG: GET 200 https://sonarqube.xxx.com/api/qualityprofiles/search.protobuf?project=DrillOpsTownxxxViz-xxxViz.View.Viewer | time=53ms
 17:08:34.944 INFO: Load quality profiles (done) | time=112ms
 17:08:34.950 INFO: Load active rules
 17:08:34.973 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1juA18PVmD7Xan3Kq&ps=500&p=1 | time=23ms
 17:08:35.095 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWzFmckUBdRoS_pgBPnX&ps=500&p=1 | time=25ms
 17:08:35.128 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWzFmc-fBdRoS_pgBPoN&ps=500&p=1 | time=25ms
 17:08:35.154 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOd-F3do8icJ97E7D1&ps=500&p=1 | time=21ms
 17:08:35.223 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_ZgzqyBdPmqJIIOM9h&ps=500&p=1 | time=66ms
 17:08:35.324 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_Zg0GoBdPmqJIIONCR&ps=500&p=1 | time=68ms
 17:08:35.369 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWzFmd_qBdRoS_pgBPqa&ps=500&p=1 | time=25ms
 17:08:35.393 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1omTg8PVmD7Xan3Z1&ps=500&p=1 | time=20ms
 17:08:35.434 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOW_BSQhmKXAMahyV4&ps=500&p=1 | time=40ms
 17:08:35.499 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYjsRb0gmtj7PqtO6Huq&ps=500&p=1 | time=57ms
 17:08:35.617 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_Zgy-jBdPmqJIIOMyV&ps=500&p=1 | time=106ms
 17:08:35.667 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_Zgy-jBdPmqJIIOMyV&ps=500&p=2 | time=31ms
 17:08:35.694 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBJusNlYlWzrFOlIFqD&ps=500&p=1 | time=25ms
 17:08:35.722 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_ZgzURBdPmqJIIOM37&ps=500&p=1 | time=26ms
 17:08:35.749 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_ZgzOLBdPmqJIIOM28&ps=500&p=1 | time=25ms
 17:08:35.762 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1qiid8PVmD7Xan3s-&ps=500&p=1 | time=12ms
 17:08:35.782 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1qiip8PVmD7Xan3tC&ps=500&p=1 | time=20ms
 17:08:35.835 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOXBHCQhmKXAMahyaf&ps=500&p=1 | time=53ms
 17:08:35.866 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1sXgB8PVmD7Xan3uV&ps=500&p=1 | time=26ms
 17:08:35.902 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOeCQ8do8icJ97E7wM&ps=500&p=1 | time=35ms
 17:08:35.934 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOXBi8QhmKXAMahyho&ps=500&p=1 | time=30ms
 17:08:35.948 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1sXl18PVmD7Xan3ux&ps=500&p=1 | time=12ms
 17:08:36.019 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYlK8gKCmtj7PqtO6g6H&ps=500&p=1 | time=71ms
 17:08:36.082 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYnQomZAHWg0K3IB8XkK&ps=500&p=1 | time=53ms
 17:08:36.120 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AXIly39ydycH7biad0HV&ps=500&p=1 | time=32ms
 17:08:36.145 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWNBdzwX9xS_4TkyHXSS&ps=500&p=1 | time=22ms
 17:08:36.182 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWzFmf3oBdRoS_pgBPuN&ps=500&p=1 | time=36ms
 17:08:36.208 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOW91XQhmKXAMahyQy&ps=500&p=1 | time=23ms
 17:08:36.230 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOW-3lQhmKXAMahyT4&ps=500&p=1 | time=21ms
 17:08:36.260 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOW-x_QhmKXAMahyS-&ps=500&p=1 | time=29ms
 17:08:36.285 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOW-sSQhmKXAMahyR2&ps=500&p=1 | time=22ms
 17:08:36.306 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa1yxuq8PVmD7Xan4AX&ps=500&p=1 | time=19ms
 17:08:36.331 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWzFmgimBdRoS_pgBPvm&ps=500&p=1 | time=24ms
 17:08:36.395 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_ZgyjcBdPmqJIIOMq1&ps=500&p=1 | time=63ms
 17:08:36.443 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOXAelQhmKXAMahyYx&ps=500&p=1 | time=41ms
 17:08:36.508 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_Zgzz0BdPmqJIIOM_g&ps=500&p=1 | time=62ms
 17:08:36.546 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYa11g218PVmD7Xan4I2&ps=500&p=1 | time=33ms
 17:08:36.580 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOXBN0QhmKXAMahycA&ps=500&p=1 | time=32ms
 17:08:36.639 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AWBOXBX9QhmKXAMahye3&ps=500&p=1 | time=57ms
 17:08:36.717 DEBUG: GET 200 https://sonarqube.xxx.com/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AV_Zg0M_BdPmqJIIONDV&ps=500&p=1 | time=73ms
 17:08:36.740 INFO: Load active rules (done) | time=1789ms
 17:08:36.745 INFO: Load analysis cache
 17:08:37.176 DEBUG: GET 200 https://sonarqube.xxx.com/api/analysis_cache/get?project=DrillOpsTownxxxViz-xxxViz.View.Viewer&branch=fixed-dashboard | time=430ms
 17:08:37.620 INFO: Load analysis cache | time=875ms
 17:08:37.657 INFO: Branch name: fixed-dashboard
 17:08:37.676 INFO: Load project repositories
 17:08:39.270 DEBUG: GET 200 https://sonarqube.xxx.com/batch/project.protobuf?key=DrillOpsTownxxxViz-xxxViz.View.Viewer&branch=fixed-dashboard | time=1593ms
 17:08:39.282 INFO: Load project repositories (done) | time=1606ms
 17:08:39.304 DEBUG: Declared extensions of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
 17:08:39.304 DEBUG: Declared extensions of language CloudFormation were converted to sonar.lang.patterns.cloudformation :
 17:08:39.305 DEBUG: Declared extensions of language Kubernetes were converted to sonar.lang.patterns.kubernetes :
 17:08:39.305 DEBUG: Declared extensions of language Docker were converted to sonar.lang.patterns.docker :
 17:08:39.305 DEBUG: Declared extensions of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.pks,**/*.pkb
 17:08:39.305 DEBUG: Declared extensions of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
 17:08:39.305 DEBUG: Declared extensions of language C# were converted to sonar.lang.patterns.cs : **/*.cs
 17:08:39.305 DEBUG: Declared extensions of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
 17:08:39.306 DEBUG: Declared extensions of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
 17:08:39.306 DEBUG: Declared extensions of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
 17:08:39.306 DEBUG: Declared extensions of language Flex were converted to sonar.lang.patterns.flex : **/*.as
 17:08:39.307 DEBUG: Declared extensions of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl
 17:08:39.307 DEBUG: Declared extensions of language Text were converted to sonar.lang.patterns.text :
 17:08:39.307 DEBUG: Declared extensions of language Secrets were converted to sonar.lang.patterns.secrets :
 17:08:39.307 DEBUG: Declared extensions of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
 17:08:39.307 DEBUG: Declared extensions of language ColdFusion were converted to sonar.lang.patterns.cf : **/*.cfc,**/*.cfm
 17:08:39.308 DEBUG: Declared extensions of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
 17:08:39.308 DEBUG: Declared extensions of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
 17:08:39.308 DEBUG: Declared extensions of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp
 17:08:39.308 DEBUG: Declared extensions of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
 17:08:39.309 DEBUG: Declared extensions of language Python were converted to sonar.lang.patterns.py : **/*.py
 17:08:39.309 DEBUG: Declared extensions of language Go were converted to sonar.lang.patterns.go : **/*.go
 17:08:39.309 DEBUG: Declared extensions of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt
 17:08:39.309 DEBUG: Declared extensions of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
 17:08:39.309 DEBUG: Declared extensions of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
 17:08:39.310 DEBUG: Declared extensions of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
 17:08:39.310 DEBUG: Declared extensions of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl,**/*.bas,**/*.frm,**/*.ctl
 17:08:39.310 DEBUG: Declared extensions of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
 17:08:39.310 DEBUG: Declared extensions of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
 17:08:39.311 DEBUG: Declared extensions of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
 17:08:39.311 DEBUG: Declared extensions of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss
 17:08:39.311 DEBUG: Declared extensions of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
 17:08:39.311 DEBUG: Declared extensions of language Dart were converted to sonar.lang.patterns.dart : **/*.dart
 17:08:39.311 DEBUG: Declared extensions of language Groovy were converted to sonar.lang.patterns.grvy : **/*.groovy
 17:08:39.311 DEBUG: Declared extensions of language COBOL were converted to sonar.lang.patterns.cobol :
 17:08:39.312 DEBUG: Declared extensions of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
 17:08:39.312 DEBUG: Declared extensions of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
 17:08:39.312 DEBUG: Declared extensions of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
 17:08:39.312 DEBUG: Declared extensions of language JSON were converted to sonar.lang.patterns.json : **/*.json
 17:08:39.316 DEBUG: Will ignore generated code
 17:08:39.318 DEBUG: Will ignore generated code
 17:08:39.338 INFO: Indexing files...
 17:08:39.338 INFO: Project configuration:
 17:08:39.339 INFO:   Excluded sources: node_modules/**, **/*.spec.ts, **/*.json, **/test-helpers/**, **time-configuration.ts, **depth-configuration.ts, **int-default-configuration.ts, **config.consts.ts, **rt-configuration.ts, **data.ts, **config.ts, **default.ts, **constant.ts, **color-maps.ts, **default-log-format.ts, **/index.ts, **.js, **.md, index.ts, **/test.ts
 17:08:39.355 DEBUG: loading config FileBasedConfig[/root/.config/jgit/config]
 17:08:39.355 DEBUG: readpipe [/usr/bin/git, --version],/usr/bin
 17:08:39.366 DEBUG: readpipe may return 'git version 2.25.1'
 17:08:39.367 DEBUG: remaining output:

 17:08:39.367 DEBUG: readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
 17:08:39.369 DEBUG: readpipe may return 'file:/etc/gitconfig�filter.lfs.clean'
 17:08:39.369 DEBUG: remaining output:

 17:08:39.369 DEBUG: git-lfs clean -- %f�file:/etc/gitconfig�filter.lfs.smudge
 17:08:39.369 DEBUG: git-lfs smudge -- %f�file:/etc/gitconfig�filter.lfs.process
 17:08:39.370 DEBUG: git-lfs filter-process�file:/etc/gitconfig�filter.lfs.required
 17:08:39.370 DEBUG: true�
 17:08:39.371 DEBUG: loading config FileBasedConfig[/etc/gitconfig]
 17:08:39.371 DEBUG: loading config FileBasedConfig[/root/.gitconfig]
 17:08:39.685 DEBUG: 3626 non excluded files in this Git repository

17:08:39.708 DEBUG: 'xxx/src/app/interceptor/header-interceptor.ts' generated metadata with charset 'US-ASCII'
17:08:39.717 DEBUG: 'xxx/src/app/interceptor/header-interceptor.ts' indexed with language 'ts'
 17:08:39.727 DEBUG: 'xxx/src/app/app-routing.module.ts' generated metadata with charset 'US-ASCII'
 17:08:39.728 DEBUG: 'xxx/src/app/app-routing.module.ts' indexed with language 'ts'
 17:08:39.733 DEBUG: 'xxx/src/app/app.component.ts' generated metadata with charset 'US-ASCII'
 17:08:39.735 DEBUG: 'xxx/src/app/app.component.ts' indexed with language 'ts'
 17:08:39.737 DEBUG: 'xxx/src/app/toolbar/widgets.module.ts' generated metadata with charset 'US-ASCII'
...

Is it enough for troubleshooting? I can not show the next part because the full file paths of our projects is not allowed to be exposed due to the policy

These logs don’t show anything related to the coverage report, so I wouldn’t say they’re comprehensive enough.

this is the full log. I replaced all file paths with ‘filename’

log.txt (117.9 KB)

Hello Colin, I would appreciate it if you could help me address the issue. Do I miss any thing?

Can anyone please help

Hey there.

Sorry for the delay on this oen.

2024-01-02T04:51:22.2861679Z INFO: Sensor JavaScript/TypeScript Coverage [javascript]
2024-01-02T04:51:22.5360367Z INFO: No LCOV files were found using */coverageReporter/coverage.lcov
2024-01-02T04:51:22.5360821Z WARN: No coverage information will be saved because all LCOV files cannot be found.
2024-01-02T04:51:22.5361071Z INFO: Sensor JavaScript/TypeScript Coverage [javascript] (done) | time=250ms

Here, my expectation would be that you use **/coverageReporter/coverage.lcov (a single * represents all files in a directory, but does not traverse all directories, so this would only look in the root directory).

Hi Colin,
Thank you very much for your response. I tried all ways as below, but none worked.

 Using '/azp/_work/1/s/coverageReporter/drop/**/*/coverage.lcov' to resolve LCOV files
08:56:15.333 INFO: No LCOV files were found using /azp/_work/1/s/coverageReporter/drop/**/*/coverage.lcov
08:56:15.333 DEBUG: Using '**/*.lcov' to resolve LCOV files
08:56:15.632 INFO: No LCOV files were found using **/*.lcov
08:56:15.632 DEBUG: Using '/azp/_work/1/s/coverageReporter/drop/*/coverage.lcov' to resolve LCOV files
08:56:15.853 INFO: No LCOV files were found using /azp/_work/1/s/coverageReporter/drop/*/coverage.lcov
08:56:15.853 DEBUG: Using '/azp/_work/1/s/coverageReporter/drop/**/coverage.lcov' to resolve LCOV files
08:56:16.074 INFO: No LCOV files were found using /azp/_work/1/s/coverageReporter/drop/**/coverage.lcov

I’m very sure there was at lease one coverage.lcov file, because I can use an explicit path to find the file as I mentioned before
@Colin