添加链接
link管理
链接快照平台
  • 输入网页链接,自动生成快照
  • 标签化管理网页链接
  • what are you trying to achieve
    I am trying to run a scan on my windows pc and send it to the sonarqube server
  • what have you tried so far to achieve this
  • checked all the required Java versions
  • Just upgraded from SonarQube version 9.9 to 10.5.0.89998 from a zip file. The server is up and running fine in a virtual windows machine. The database has been upgraded manually and I can log in and see the projects.
    On my host windows machine I upgraded my scanner from 5.5 to 6.2.0.
    The scan works fine, but sending it to the server results in this error:

    Error: LinkageError occurred while loading main class org.sonarsource.scanner.cli.Main
    java.lang.UnsupportedClassVersionError: org/sonarsource/scanner/cli/Main has been compiled by a more recent version of the Java Runtime (class file version 61.0), this version of the Java Runtime only recognizes class file versions up to 55.0

    On the server I have version 17.0.2 of OpenJDK installed:

    C:>java --version
    openjdk 17.0.2 2022-01-18
    OpenJDK Runtime Environment (build 17.0.2+8-86)
    OpenJDK 64-Bit Server VM (build 17.0.2+8-86, mixed mode, sharing)

    That has not been upgraded durng the SonarQube upgrade process,

    What can I do to fix this error?

    Kind of fixed this.

    I forgot I had a java version on my host machine, which turned out to be version 11.
    Replaced this with the same version on the server. Rebooted and ran the scan again.
    It now completes the scan and sends it to the server, so that’s good.
    The scan however finished with and exception:

    Exception in thread "Thread-0" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
            at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
            at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
            at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
            at ch.qos.logback.classic.Logger.error(Logger.java:543)
            at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
            at java.base/java.lang.Thread.run(Thread.java:840)
    Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
            at java.base/java.net.URLClassLoader.findClass(URLClassLoader.java:445)
            at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
            at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:525)
            ... 6 more
    

    I don’t know if this is bad or not and I cannot find anything Sonar-related about this.
    Does anyone know?

    I have he same issue here. Scan is working but end with stacktrace. I tried Java 17 and Java 21.

    SonarQube Server 10.5.0
    SonarQube Scanner : 5.0.1.3006

    I happen with all scan run with with sonar scanner CLI (I didn’t try with other scanner like maven)

    Here is the debug logs

    sonar-scanner -X -Dsonar.sourceEncoding=UTF-8 -Dsonar.host.url=**** -Dsonar.token=**** -Dsonar.projectKey=***

    14:30:24.238 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
    14:30:24.249 INFO: Project root configuration file: NONE
    14:30:24.269 INFO: SonarScanner 5.0.1.3006
    14:30:24.269 INFO: Java 21.0.2 Eclipse Adoptium (64-bit)
    14:30:24.269 INFO: Linux 5.15.133.1-microsoft-standard-WSL2 amd64
    14:30:24.385 DEBUG: keyStore is : 
    14:30:24.385 DEBUG: keyStore type is : pkcs12
    14:30:24.385 DEBUG: keyStore provider is : 
    14:30:24.385 DEBUG: init keystore
    14:30:24.386 DEBUG: init keymanager of type SunX509
    14:30:24.447 DEBUG: Create: /home/*****/.sonar/cache
    14:30:24.447 INFO: User cache: /home/*****/.sonar/cache
    14:30:24.447 DEBUG: Create: /home/*****/.sonar/cache/_tmp
    14:30:24.448 DEBUG: Extract sonar-scanner-api-batch in temp...
    14:30:24.450 DEBUG: Get bootstrap index...
    14:30:24.451 DEBUG: Download: https://*****.*****.ch/batch/index
    14:30:24.669 DEBUG: Get bootstrap completed
    14:30:24.672 DEBUG: Create isolated classloader...
    14:30:24.684 DEBUG: Start temp cleaning...
    14:30:24.694 DEBUG: Temp cleaning done
    14:30:24.695 DEBUG: Execution getVersion
    14:30:24.708 INFO: Analyzing on SonarQube server 10.5.0.89998
    14:30:24.708 INFO: Default locale: "en", source code encoding: "UTF-8"
    14:30:24.708 DEBUG: Work directory: *****/container-image-az/.scannerwork
    14:30:24.709 DEBUG: Execution execute
    14:30:24.941 DEBUG: Enterprise 10.5.0.89998
    14:30:25.091 INFO: Load global settings
    14:30:25.201 DEBUG: GET 200 https://*****.*****.ch/api/settings/values.protobuf | time=108ms
    14:30:25.225 INFO: Load global settings (done) | time=134ms
    14:30:25.245 INFO: Server id: 20FC515B-AYKhkMzvVeDeF6JyC9op
    14:30:25.251 INFO: User cache: /home/*****/.sonar/cache
    14:30:25.260 INFO: Loading required plugins
    14:30:25.261 INFO: Load plugins index
    14:30:25.280 DEBUG: GET 200 https://*****.*****.ch/api/plugins/installed | time=19ms
    14:30:25.308 INFO: Load plugins index (done) | time=47ms
    14:30:25.308 INFO: Load/download plugins
    14:30:25.364 INFO: Load/download plugins (done) | time=56ms
    14:30:25.364 DEBUG: Plugins not loaded because they are optional: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, java, javascript, kotlin, php, pli, plsql, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend]
    14:30:25.393 DEBUG: Plugins loaded:
    14:30:25.393 DEBUG:   * Text Code Quality and Security 2.10.0.2188 (textenterprise)
    14:30:25.394 DEBUG:   * Python Code Quality and Security 4.17.0.14845 (python)
    14:30:25.394 DEBUG:   * Clean as You Code 2.3.0.1782 (cayc)
    14:30:25.394 DEBUG:   * XML Code Quality and Security 2.10.0.4108 (xml)
    14:30:25.394 DEBUG:   * JaCoCo 1.3.0.1538 (jacoco)
    14:30:25.394 DEBUG:   * IaC Code Quality and Security 1.27.0.9518 (iac)
    14:30:25.394 DEBUG:   * Text Code Quality and Security 2.10.0.2188 (text)
    14:30:25.424 INFO: Loaded core extensions: developer-scanner
    14:30:25.445 DEBUG: Installed core extension: developer-scanner
    14:30:25.532 DEBUG: register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda/0x00007fc7982bc800@17271176 with shutdown hook
    14:30:25.612 INFO: Process project properties
    14:30:25.613 INFO: Process project properties (done) | time=1ms
    14:30:25.619 INFO: Project key: container-image-az
    14:30:25.619 INFO: Base dir: *****/container-image-az
    14:30:25.619 INFO: Working dir: *****/container-image-az/.scannerwork
    14:30:25.619 DEBUG: Project global encoding: UTF-8, default locale: en
    14:30:25.628 INFO: Load project settings for component key: 'container-image-az'
    14:30:25.667 DEBUG: GET 200 https://*****.*****.ch/api/settings/values.protobuf?component=container-image-az | time=39ms
    14:30:25.669 INFO: Load project settings for component key: 'container-image-az' (done) | time=41ms
    14:30:25.698 INFO: Load project branches
    14:30:25.726 DEBUG: GET 200 https://*****.*****.ch/api/project_branches/list?project=container-image-az | time=26ms
    14:30:25.735 INFO: Load project branches (done) | time=36ms
    14:30:25.736 INFO: Load branch configuration
    14:30:25.737 INFO: Load branch configuration (done) | time=1ms
    14:30:25.747 DEBUG: Creating module hierarchy
    14:30:25.747 DEBUG:   Init module 'container-image-az'
    14:30:25.747 DEBUG:     Base dir: *****/container-image-az
    14:30:25.748 DEBUG:     Working dir: *****/container-image-az/.scannerwork
    14:30:25.748 DEBUG:     Module global encoding: UTF-8, default locale: en
    14:30:25.765 INFO: Load quality profiles
    14:30:25.837 DEBUG: GET 200 https://*****.*****.ch/api/qualityprofiles/search.protobuf?project=container-image-az | time=71ms
    14:30:25.860 INFO: Load quality profiles (done) | time=95ms
    14:30:25.908 INFO: Load active rules
    14:30:25.973 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKmpRl9Uq_nMddq7mT_&ps=500&p=1 | time=64ms
    14:30:26.161 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm08_VeDeF6JyDLdZ&ps=500&p=1 | time=63ms
    14:30:26.232 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnFcrVeDeF6JyDMwX&ps=500&p=1 | time=61ms
    14:30:26.252 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhkhxmVeDeF6JyDIEY&ps=500&p=1 | time=17ms
    14:30:26.568 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm8spVeDeF6JyDL83&ps=500&p=1 | time=316ms
    14:30:26.877 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnCtQVeDeF6JyDMk4&ps=500&p=1 | time=278ms
    14:30:26.957 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmvNxVeDeF6JyDKtF&ps=500&p=1 | time=64ms
    14:30:27.024 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYZt9VnKqIKl8BABtQvu&ps=500&p=1 | time=63ms
    14:30:27.162 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnByFVeDeF6JyDMeX&ps=500&p=1 | time=131ms
    14:30:27.215 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=9cf0defe-17f2-4293-9248-103f75ac6f5e&ps=500&p=1 | time=42ms
    14:30:27.717 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm7MsVeDeF6JyDLlE&ps=500&p=1 | time=500ms
    14:30:27.843 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm7MsVeDeF6JyDLlE&ps=500&p=2 | time=110ms
    14:30:27.924 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm4SlVeDeF6JyDLjn&ps=500&p=1 | time=78ms
    14:30:27.987 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm2x8VeDeF6JyDLf9&ps=500&p=1 | time=62ms
    14:30:28.046 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnL4fVeDeF6JyDNK-&ps=500&p=1 | time=57ms
    14:30:28.062 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhkiktVeDeF6JyDI8H&ps=500&p=1 | time=15ms
    14:30:28.091 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnIxAVeDeF6JyDM6W&ps=500&p=1 | time=29ms
    14:30:28.265 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnKakVeDeF6JyDND8&ps=500&p=1 | time=174ms
    14:30:28.320 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm1uIVeDeF6JyDLer&ps=500&p=1 | time=51ms
    14:30:28.383 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnGU1VeDeF6JyDMx7&ps=500&p=1 | time=62ms
    14:30:28.397 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhkivIVeDeF6JyDJDL&ps=500&p=1 | time=12ms
    14:30:28.772 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmyl0VeDeF6JyDLF9&ps=500&p=1 | time=375ms
    14:30:29.017 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmwSvVeDeF6JyDKvK&ps=500&p=1 | time=234ms
    14:30:29.064 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm3j0VeDeF6JyDLiT&ps=500&p=1 | time=42ms
    14:30:29.198 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm9vnVeDeF6JyDMG2&ps=500&p=1 | time=133ms
    14:30:29.253 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnD1DVeDeF6JyDMtT&ps=500&p=1 | time=52ms
    14:30:29.287 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnA_EVeDeF6JyDMdi&ps=500&p=1 | time=33ms
    14:30:29.356 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnHIoVeDeF6JyDM1I&ps=500&p=1 | time=68ms
    14:30:29.401 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnLLSVeDeF6JyDNJn&ps=500&p=1 | time=43ms
    14:30:29.483 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYZt9W2oqIKl8BABtQxw&ps=500&p=1 | time=80ms
    14:30:29.542 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnEnbVeDeF6JyDMuz&ps=500&p=1 | time=51ms
    14:30:29.859 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmxZvVeDeF6JyDK5A&ps=500&p=1 | time=316ms
    14:30:29.964 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmz97VeDeF6JyDLZS&ps=500&p=1 | time=95ms
    14:30:30.145 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm_1JVeDeF6JyDMU4&ps=500&p=1 | time=179ms
    14:30:30.233 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnH9rVeDeF6JyDM39&ps=500&p=1 | time=83ms
    14:30:30.289 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYvR8P-RlNsVYgEArIcP&ps=500&p=1 | time=55ms
    14:30:30.354 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhmuC9VeDeF6JyDKpr&ps=500&p=1 | time=57ms
    14:30:30.574 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhm-r_VeDeF6JyDMK9&ps=500&p=1 | time=219ms
    14:30:30.884 DEBUG: GET 200 https://*****.*****.ch/api/rules/list.protobuf?qprofile=AYKhnJcEVeDeF6JyDM6b&ps=500&p=1 | time=306ms
    14:30:30.910 INFO: Load active rules (done) | time=5002ms
    14:30:30.916 INFO: Load analysis cache
    14:30:30.930 DEBUG: GET 404 https://*****.*****.ch/api/analysis_cache/get?project=container-image-az | time=13ms
    14:30:30.931 INFO: Load analysis cache (404) | time=15ms
    14:30:30.962 DEBUG: GET 200 https://*****.*****.ch/api/languages/list | time=9ms
    14:30:30.990 DEBUG: Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes : 
    14:30:30.991 DEBUG: Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
    14:30:30.991 DEBUG: Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
    14:30:30.991 DEBUG: Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
    14:30:30.992 DEBUG: Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
    14:30:30.992 DEBUG: Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
    14:30:30.992 DEBUG: Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
    14:30:30.993 DEBUG: Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
    14:30:30.993 DEBUG: Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.pks,**/*.pkb
    14:30:30.993 DEBUG: Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
    14:30:30.993 DEBUG: Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
    14:30:30.994 DEBUG: Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
    14:30:30.994 DEBUG: Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
    14:30:30.994 DEBUG: Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl,**/*.config
    14:30:30.994 DEBUG: Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
    14:30:30.995 DEBUG: Declared patterns of language Text were converted to sonar.lang.patterns.text : 
    14:30:30.995 DEBUG: Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
    14:30:30.995 DEBUG: Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation : 
    14:30:30.995 DEBUG: Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
    14:30:30.995 DEBUG: Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
    14:30:30.995 DEBUG: Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp
    14:30:30.996 DEBUG: Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
    14:30:30.996 DEBUG: Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
    14:30:30.996 DEBUG: Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
    14:30:30.996 DEBUG: Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
    14:30:30.996 DEBUG: Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
    14:30:30.996 DEBUG: Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
    14:30:30.997 DEBUG: Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
    14:30:30.997 DEBUG: Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets : 
    14:30:30.997 DEBUG: Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
    14:30:30.997 DEBUG: Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
    14:30:30.998 DEBUG: Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol : 
    14:30:30.998 DEBUG: Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
    14:30:30.998 DEBUG: Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
    14:30:30.998 DEBUG: Declared patterns of language AzureResourceManager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
    14:30:30.999 DEBUG: Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
    14:30:30.999 DEBUG: Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
    14:30:30.999 DEBUG: Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
    14:30:31.013 INFO: Preprocessing files...
    14:30:31.024 DEBUG: loading config FileBasedConfig[/home/*****/.config/jgit/config]
    14:30:31.026 DEBUG: readpipe [/usr/bin/git, --version],/usr/bin
    14:30:31.036 DEBUG: readpipe may return 'git version 2.43.2'
    14:30:31.036 DEBUG: remaining output:
    14:30:31.036 DEBUG: readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
    14:30:31.042 DEBUG: readpipe may return 'file:/etc/gitconfigcore.longpaths'
    14:30:31.042 DEBUG: remaining output:
    14:30:31.042 DEBUG: true
    14:30:31.042 DEBUG: loading config FileBasedConfig[/etc/gitconfig]
    14:30:31.043 DEBUG: loading config FileBasedConfig[/home/*****/.config/git/config]
    14:30:31.043 DEBUG: loading config UserConfigFile[/home/*****/.gitconfig]
    14:30:31.085 DEBUG: 10 non excluded files in this Git repository
    14:30:31.107 INFO: 3 languages detected in 7 preprocessed files
    14:30:31.107 INFO: 0 files ignored because of scm ignore settings
    14:30:31.110 INFO: Loading plugins for detected languages
    14:30:31.110 DEBUG: Detected languages: [json, yaml, docker]
    14:30:31.110 INFO: Load/download plugins
    14:30:31.133 INFO: Load/download plugins (done) | time=23ms
    14:30:31.134 DEBUG: Optional language-specific plugins not loaded: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, java, kotlin, php, pli, plsql, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, securitycsharpfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend]
    14:30:31.167 DEBUG: Plugins loaded:
    14:30:31.168 DEBUG:   * Vulnerability Analysis 10.5.0.30668 (security)
    14:30:31.168 DEBUG:   * Vulnerability Rules for JS 10.5.0.30668 (securityjsfrontend)
    14:30:31.168 DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 10.13.2.25981 (javascript)
    14:30:31.294 INFO: Inconsistent constructor declaration on bean with name 'org.sonarsource.scanner.api.internal.IsolatedClassloader@5bd03f44-org.sonar.scanner.issue.IssueFilters': single autowire-marked constructor flagged as optional - this constructor is effectively required since there is no default constructor to fall back to: public org.sonar.scanner.issue.IssueFilters(org.sonar.api.batch.fs.internal.DefaultInputProject)
    14:30:31.308 INFO: Load project repositories
    14:30:31.346 DEBUG: GET 200 https://*****.*****.ch/batch/project.protobuf?key=container-image-az | time=38ms
    14:30:31.356 INFO: Load project repositories (done) | time=48ms
    14:30:31.372 DEBUG: Available languages:
    14:30:31.372 DEBUG:   * JavaScript => "js"
    14:30:31.372 DEBUG:   * TypeScript => "ts"
    14:30:31.372 DEBUG:   * CSS => "css"
    14:30:31.372 DEBUG:   * Python => "py"
    14:30:31.372 DEBUG:   * XML => "xml"
    14:30:31.372 DEBUG:   * Terraform => "terraform"
    14:30:31.372 DEBUG:   * CloudFormation => "cloudformation"
    14:30:31.372 DEBUG:   * Kubernetes => "kubernetes"
    14:30:31.372 DEBUG:   * Docker => "docker"
    14:30:31.372 DEBUG:   * AzureResourceManager => "azureresourcemanager"
    14:30:31.372 DEBUG:   * YAML => "yaml"
    14:30:31.372 DEBUG:   * JSON => "json"
    14:30:31.372 DEBUG:   * Text => "text"
    14:30:31.372 DEBUG:   * Secrets => "secrets"
    14:30:31.380 INFO: Indexing files...
    14:30:31.380 INFO: Project configuration:
    14:30:31.383 DEBUG: 'catalog-info.yaml' indexed with language 'yaml'
    14:30:31.385 DEBUG: 'renovate.json' indexed with language 'json'
    14:30:31.386 DEBUG: 'README.md' indexed with no language
    14:30:31.386 DEBUG: 'Jenkinsfile' indexed with no language
    14:30:31.386 DEBUG: 'docs/index.md' indexed with no language
    14:30:31.387 DEBUG: 'Dockerfile' indexed with language 'docker'
    14:30:31.387 DEBUG: 'mkdocs.yml' indexed with language 'yaml'
    14:30:31.388 INFO: 7 files indexed
    14:30:31.389 INFO: Quality profile for docker: Sonar way
    14:30:31.389 INFO: Quality profile for json: Sonar way
    14:30:31.389 INFO: Quality profile for yaml: Sonar way
    14:30:31.389 INFO: ------------- Run sensors on module container-image-az
    14:30:31.437 INFO: Load metrics repository
    14:30:31.457 DEBUG: GET 200 https://*****.*****.ch/api/metrics/search?ps=500&p=1 | time=19ms
    14:30:31.466 INFO: Load metrics repository (done) | time=29ms
    14:30:31.918 DEBUG: Added 308 checks for language='ts', repository='typescript'
    14:30:31.925 DEBUG: Added 15 checks for language='ts', repository='tssecurity'
    14:30:31.929 DEBUG: Added 307 checks for language='js', repository='javascript'
    14:30:31.935 DEBUG: Added 15 checks for language='js', repository='jssecurity'
    14:30:31.994 DEBUG: 'Import external issues report' skipped because one of the required properties is missing
    14:30:31.995 DEBUG: 'Python Sensor' skipped because there is no related file in current project
    14:30:31.995 DEBUG: 'Cobertura Sensor for Python coverage' skipped because there is no related file in current project
    14:30:31.995 DEBUG: 'PythonXUnitSensor' skipped because there is no related file in current project
    14:30:31.996 DEBUG: 'Import of Pylint issues' skipped because there is no related file in current project
    14:30:31.996 DEBUG: 'Import of Bandit issues' skipped because there is no related file in current project
    14:30:31.996 DEBUG: 'Import of Flake8 issues' skipped because there is no related file in current project
    14:30:31.996 DEBUG: 'Import of Mypy issues' skipped because there is no related file in current project
    14:30:31.997 DEBUG: 'Import of Ruff issues' skipped because there is no related file in current project
    14:30:31.997 DEBUG: 'XML Sensor' skipped because there is no related file in current project
    14:30:31.997 DEBUG: 'IaC Terraform Sensor' skipped because there is no related file in current project
    14:30:31.998 DEBUG: 'JavaScript/TypeScript analysis' skipped because there is no related file in current project
    14:30:31.998 DEBUG: 'JavaScript inside HTML analysis' skipped because there is no related file in current project
    14:30:31.999 DEBUG: 'JavaScript/TypeScript Coverage' skipped because there is no related file in current project
    14:30:31.999 DEBUG: 'Import of ESLint issues' skipped because one of the required properties is missing
    14:30:31.999 DEBUG: 'Import of TSLint issues' skipped because one of the required properties is missing
    14:30:31.999 DEBUG: 'CSS Metrics' skipped because there is no related file in current project
    14:30:32.000 DEBUG: 'Import of stylelint issues' skipped because one of the required properties is missing
    14:30:32.002 DEBUG: 'Generic Test Executions Report' skipped because one of the required properties is missing
    14:30:32.002 DEBUG: Sensors : JaCoCo XML Report Importer -> IaC CloudFormation Sensor -> IaC Kubernetes Sensor -> IaC AzureResourceManager Sensor -> JavaScript inside YAML analysis -> CSS Rules -> IaC Docker Sensor -> Serverless configuration file sensor -> AWS SAM template file sensor -> AWS SAM Inline template file sensor -> EnterpriseSecretsSensor -> TextAndSecretsSensor -> JavaSecuritySensor -> CSharpSecuritySensor -> PhpSecuritySensor -> PythonSecuritySensor -> JsSecuritySensor
    14:30:32.004 INFO: Sensor JaCoCo XML Report Importer [jacoco]
    14:30:32.005 INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
    14:30:32.006 INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
    14:30:32.006 INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3ms
    14:30:32.006 INFO: Sensor IaC CloudFormation Sensor [iac]
    14:30:32.020 DEBUG: 'mkdocs.yml' generated metadata with charset 'UTF-8'
    14:30:32.021 DEBUG: File without identifier 'AWSTemplateFormatVersion': mkdocs.yml
    14:30:32.022 DEBUG: 'renovate.json' generated metadata with charset 'UTF-8'
    14:30:32.023 DEBUG: File without identifier 'AWSTemplateFormatVersion': renovate.json
    14:30:32.024 DEBUG: 'catalog-info.yaml' generated metadata with charset 'UTF-8'
    14:30:32.024 DEBUG: File without identifier 'AWSTemplateFormatVersion': catalog-info.yaml
    14:30:32.030 INFO: 0 source files to be analyzed
    14:30:32.039 INFO: 0/0 source files have been analyzed
    14:30:32.039 INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=33ms
    14:30:32.039 INFO: Sensor IaC Kubernetes Sensor [iac]
    14:30:32.041 DEBUG: Checking conditions for enabling Helm analysis: isNotSonarLintContext=true, isHelmActivationFlagTrue=true, isHelmEvaluatorExecutableAvailable=true
    14:30:32.041 DEBUG: Initializing Helm processor
    14:30:32.092 DEBUG: File without Kubernetes identifier: mkdocs.yml
    14:30:32.093 INFO: 1 source file to be analyzed
    14:30:32.148 INFO: 1/1 source file has been analyzed
    14:30:32.148 DEBUG: Kubernetes Parsing Statistics: Pure Kubernetes files count: 1, parsed: 1, not parsed: 0; Helm files count: 0, parsed: 0, not parsed: 0
    14:30:32.148 INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=109ms
    14:30:32.148 INFO: Sensor IaC AzureResourceManager Sensor [iac]
    14:30:32.148 DEBUG: File without identifier 'https://schema.management.azure.com/schemas/': renovate.json
    14:30:32.149 INFO: 0 source files to be analyzed
    14:30:32.230 INFO: 0/0 source files have been analyzed
    14:30:32.230 INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=82ms
    14:30:32.230 INFO: Sensor JavaScript inside YAML analysis [javascript]
    14:30:32.239 INFO: No input files found for analysis
    14:30:32.240 INFO: Hit the cache for 0 out of 0
    14:30:32.241 INFO: Miss the cache for 0 out of 0
    14:30:32.241 INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=11ms
    14:30:32.241 INFO: Sensor CSS Rules [javascript]
    14:30:32.242 INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
    14:30:32.242 INFO: Sensor CSS Rules [javascript] (done) | time=1ms
    14:30:32.242 INFO: Sensor IaC Docker Sensor [iac]
    14:30:32.243 INFO: 1 source file to be analyzed
    14:30:32.277 DEBUG: 'Dockerfile' generated metadata with charset 'UTF-8'
    14:30:32.332 INFO: 1/1 source file has been analyzed
    14:30:32.332 INFO: Sensor IaC Docker Sensor [iac] (done) | time=90ms
    14:30:32.332 INFO: Sensor Serverless configuration file sensor [security]
    14:30:32.333 INFO: 0 Serverless function entries were found in the project
    14:30:32.334 INFO: 0 Serverless function handlers were kept as entrypoints
    14:30:32.334 INFO: Sensor Serverless configuration file sensor [security] (done) | time=2ms
    14:30:32.334 INFO: Sensor AWS SAM template file sensor [security]
    14:30:32.336 DEBUG: 0 SAM template configuration files were found in the project. 0 SAM function entries were found in total. 0 were kept as potential entrypoints.
    14:30:32.336 INFO: Sensor AWS SAM template file sensor [security] (done) | time=2ms
    14:30:32.336 INFO: Sensor AWS SAM Inline template file sensor [security]
    14:30:32.338 DEBUG: 0 SAM Inline template configuration files were found in the project. 0 SAM Inline function entries were found in total. 0 were kept as potential entrypoints.
    14:30:32.338 INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=2ms
    14:30:32.338 INFO: Sensor EnterpriseSecretsSensor [textenterprise]
    14:30:32.338 INFO: Available processors: 4
    14:30:32.338 INFO: Using 4 threads for analysis.
    14:30:32.342 INFO: Sensor EnterpriseSecretsSensor [textenterprise] (done) | time=4ms
    14:30:32.342 INFO: Sensor TextAndSecretsSensor [text]
    14:30:32.342 INFO: Available processors: 4
    14:30:32.342 INFO: Using 4 threads for analysis.
    14:30:32.768 DEBUG: Analyzing only language associated files, "sonar.text.inclusions.activate" property is deactivated
    14:30:32.800 INFO: 4 source files to be analyzed
    14:30:32.849 INFO: 4/4 source files have been analyzed
    14:30:32.850 INFO: Sensor TextAndSecretsSensor [text] (done) | time=507ms
    14:30:32.850 INFO: Sensor JavaSecuritySensor [security]
    14:30:32.851 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
    14:30:32.852 INFO: Load type hierarchy and UCFGs: Starting
    14:30:32.852 INFO: Load type hierarchy: Starting
    14:30:32.852 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/java
    14:30:32.852 INFO: Read 0 type definitions
    14:30:32.854 INFO: Load type hierarchy: Time spent was 00:00:00.001
    14:30:32.854 INFO: Load UCFGs: Starting
    14:30:32.854 INFO: Load UCFGs: Time spent was 00:00:00.000
    14:30:32.854 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001
    14:30:32.854 INFO: No UCFGs have been included for analysis.
    14:30:32.855 INFO: java security sensor: Time spent was 00:00:00.004
    14:30:32.865 INFO: Sensor JavaSecuritySensor [security] (done) | time=15ms
    14:30:32.865 INFO: Sensor CSharpSecuritySensor [security]
    14:30:32.866 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
    14:30:32.866 INFO: Load type hierarchy and UCFGs: Starting
    14:30:32.866 INFO: Load type hierarchy: Starting
    14:30:32.866 INFO: Reading type hierarchy from: *****/container-image-az/ucfg2/cs
    14:30:32.866 INFO: Read 0 type definitions
    14:30:32.866 INFO: Load type hierarchy: Time spent was 00:00:00.000
    14:30:32.866 INFO: Load UCFGs: Starting
    14:30:32.866 INFO: Load UCFGs: Time spent was 00:00:00.000
    14:30:32.866 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
    14:30:32.866 INFO: No UCFGs have been included for analysis.
    14:30:32.866 INFO: csharp security sensor: Time spent was 00:00:00.001
    14:30:32.867 INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
    14:30:32.867 INFO: Sensor PhpSecuritySensor [security]
    14:30:32.867 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
    14:30:32.867 INFO: Load type hierarchy and UCFGs: Starting
    14:30:32.867 INFO: Load type hierarchy: Starting
    14:30:32.867 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/php
    14:30:32.867 INFO: Read 0 type definitions
    14:30:32.867 INFO: Load type hierarchy: Time spent was 00:00:00.000
    14:30:32.867 INFO: Load UCFGs: Starting
    14:30:32.867 INFO: Load UCFGs: Time spent was 00:00:00.000
    14:30:32.867 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
    14:30:32.868 INFO: No UCFGs have been included for analysis.
    14:30:32.868 INFO: php security sensor: Time spent was 00:00:00.000
    14:30:32.868 INFO: Sensor PhpSecuritySensor [security] (done) | time=1ms
    14:30:32.868 INFO: Sensor PythonSecuritySensor [security]
    14:30:32.868 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
    14:30:32.868 INFO: Load type hierarchy and UCFGs: Starting
    14:30:32.868 INFO: Load type hierarchy: Starting
    14:30:32.868 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/python
    14:30:32.869 INFO: Read 0 type definitions
    14:30:32.869 INFO: Load type hierarchy: Time spent was 00:00:00.000
    14:30:32.869 INFO: Load UCFGs: Starting
    14:30:32.869 INFO: Load UCFGs: Time spent was 00:00:00.000
    14:30:32.869 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
    14:30:32.869 INFO: No UCFGs have been included for analysis.
    14:30:32.869 INFO: python security sensor: Time spent was 00:00:00.001
    14:30:32.869 INFO: Sensor PythonSecuritySensor [security] (done) | time=1ms
    14:30:32.870 INFO: Sensor JsSecuritySensor [security]
    14:30:32.870 INFO: Enabled taint analysis rules: S5131, S5144, S5146, S6287, S5883, S5696, S6096, S6105, S5334, S2083, S3649, S2631, S5147, S6350, S2076
    14:30:32.870 INFO: Load type hierarchy and UCFGs: Starting
    14:30:32.870 INFO: Load type hierarchy: Starting
    14:30:32.870 INFO: Reading type hierarchy from: *****/container-image-az/.scannerwork/ucfg2/js
    14:30:32.870 INFO: Read 0 type definitions
    14:30:32.870 INFO: Load type hierarchy: Time spent was 00:00:00.000
    14:30:32.870 INFO: Load UCFGs: Starting
    14:30:32.870 INFO: Load UCFGs: Time spent was 00:00:00.000
    14:30:32.871 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
    14:30:32.871 INFO: No UCFGs have been included for analysis.
    14:30:32.871 INFO: js security sensor: Time spent was 00:00:00.001
    14:30:32.871 INFO: Sensor JsSecuritySensor [security] (done) | time=1ms
    14:30:32.876 INFO: ------------- Run sensors on project
    14:30:32.903 DEBUG: 'Generic Coverage Report' skipped because one of the required properties is missing
    14:30:32.903 DEBUG: 'Import external issues report from SARIF file.' skipped because one of the required properties is missing
    14:30:32.903 DEBUG: 'Java CPD Block Indexer' skipped because there is no related file in current project
    14:30:32.903 DEBUG: Sensors : Zero Coverage Sensor
    14:30:32.904 INFO: Sensor Zero Coverage Sensor
    14:30:32.904 INFO: Sensor Zero Coverage Sensor (done) | time=0ms
    14:30:32.914 INFO: CPD Executor Calculating CPD for 0 files
    14:30:32.914 INFO: CPD Executor CPD calculation finished (done) | time=0ms
    14:30:32.922 INFO: SCM revision ID '2cd61f3d4141a858440381d598fbb4639896ba19'
    14:30:32.974 INFO: Load New Code definition
    14:30:32.991 DEBUG: GET 200 https://*****.*****.ch/api/new_code_periods/show.protobuf?project=container-image-az&branch=main | time=17ms
    14:30:32.993 INFO: Load New Code definition (done) | time=19ms
    14:30:32.994 WARN: New Code reference branch is set to the branch being analyzed. Skipping the computation of New Code
    14:30:32.997 INFO: Analysis report generated in 79ms, dir size=242.3 kB
    14:30:33.011 INFO: Analysis report compressed in 13ms, zip size=32.0 kB
    14:30:33.011 INFO: Analysis report generated in *****/container-image-az/.scannerwork/scanner-report
    14:30:33.011 DEBUG: Upload report
    14:30:33.049 DEBUG: POST 200 https://*****.*****.ch/api/ce/submit?projectKey=container-image-az | time=37ms
    14:30:33.051 INFO: Analysis report uploaded in 39ms
    14:30:33.052 DEBUG: Report metadata written to *****/container-image-az/.scannerwork/report-task.txt
    14:30:33.052 INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://*****.*****.ch/dashboard?id=container-image-az
    14:30:33.052 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
    14:30:33.052 INFO: More about the report processing at https://*****.*****.ch/api/ce/task?id=cd33db22-691e-42a1-8ba4-fc412de175db
    14:30:33.056 DEBUG: Post-jobs : 
    14:30:33.062 INFO: Analysis total time: 7.636 s
    14:30:33.063 INFO: ------------------------------------------------------------------------
    14:30:33.064 INFO: EXECUTION SUCCESS
    14:30:33.064 INFO: ------------------------------------------------------------------------
    14:30:33.064 INFO: Total time: 8.844s
    14:30:33.127 INFO: Final Memory: 23M/80M
    14:30:33.127 INFO: ------------------------------------------------------------------------
    Exception in thread "Thread-0" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
            at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
            at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
            at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
            at ch.qos.logback.classic.Logger.error(Logger.java:543)
            at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
            at java.base/java.lang.Thread.run(Thread.java:1583)
    Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
            at java.base/java.net.URLClassLoader.findClass(URLClassLoader.java:445)
            at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
            at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:526)
            ... 6 more
    

    Like you see it dosn’t fail the build but it’s very confusing for users…

    Any idea ?

    Hi @Colin sorry to ping you directly, but something you might be interested

    Seems I’m not the only one facing this issue with SonarQube scanner on both JDK 17 and 21

    Thanks for your support

    also noticed this behaviour with Sonar Maven plugin 3.11 and Sonarqube 10.5.0 Enterprise.
    Maven Build and Sonarqube run both on Windows.

    Gilbert

    Hi all,

    I have nothing helpful offer, but I wanted to let you know that this has been flagged for the team. And thanks for the reports!

    Java 21.0.2 Eclipse Adoptium (64-bit)
    Sonar server 10.5.0.89998

    Exception in thread "Thread-1" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
    	at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
    	at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
    	at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
    	at ch.qos.logback.classic.Logger.error(Logger.java:543)
    	at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
    	at java.base/java.lang.Thread.run(Thread.java:1583)
    Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
    	at java.base/java.net.URLClassLoader.findClass(URLClassLoader.java:445)
    	at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
    	at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:526)
                  

    After upgrading to 10.5 we are seeing the following error in our builds.
    It occurs after analysis is successfull.

    ##[error]Exception in thread "Thread-1" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
    ##[error]at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
    at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
    at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
    at ch.qos.logback.classic.Logger.error(Logger.java:543)
    at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
    at java.base/java.lang.Thread.run(Unknown Source)
    

    SonarScanner for MSBuild 5.15
    SonarQube version v10.5 (89998)

    Build agents capabilities
    java C:\Program Files\Eclipse Adoptium\jre-21.0.1.12-hotspot
    java_21_x64 C:\Program Files\Eclipse Adoptium\jre-21.0.1.12-hotspot\

    I was getting the same issue with Oracle JDK 22, but after I switch on the OpenJDK 22.0.1 everything works normally.

    All I’ve done is downloading OpenJDK from here and adding absolute path to the jdk-22.0.1\bin in System Environment Variable named ‘Path’.

    P.S. I’m talking about Windows system.

    Welcome :slight_smile:

    Your Sonarqube server in version 10.5.0 runs with Java 17 and the scanner runs with Java 22.0.1,
    or both on Java 22.0.1 ?
    Which scanner do you use, Sonar Maven plugin, Sonar CLI scanner or … ?

    Gilbert

    Facing similar problems after upgrading from 10.4 to 10.5.
    Java on both SonarQube Server and Azure Pipeline agents are using Azul Zulu OpenJDK 17.0.8.1+1.
    All running on Windows System.

    Same issue here.
    I have updated SonarQube to 10.5 and I am using the Azure DevOps plugin.
    I have made tests both with JDK 17 and JDK 21 (via the jdkversion: JAVA_HOME_XX_X64 option) and the scanner throws the same errors in both cases.

    Hey all.

    Thanks for the reports. The issue is tracked at SONAR-22152.

    Since it doesn’t cause an analysis failure, barring any other issues (feel free to report them), we are targeting a fix in SonarQube v10.6.

    If it is causing other issues, please let us know.

    It seems this error causes the .coverage file to not be processed by SonarQube. since 10.5, we’ll lost all code coverage report in Sonar (0%) while they appear correctly on out DevOps side.

    Not just a cosmetic error.

    When coverage data isn’t appearing as expected in SonarQube / SonarCloud, the first place you should look is the scanner logs. Where do I find the scanner logs? warning This will likely be broken out into its own guide soon The Scanner logs are the output of executing one of the scanners, either directly or wrapped by one of many integrations, such as the SonarScanner for Jenkins, SonarScanner for Azure DevOps, SonarQube/SonarCloud GitHub Actions or SonarQube / SonarCloud Bitbucket Pipes.

    I have the same error in sonarqube/sonarqube-10.5.0 helm chart version

    I check java version in sonarqube2-sonarqube-0 pod container.

    $ java --version
    openjdk 17.0.11 2024-04-16
    OpenJDK Runtime Environment Temurin-17.0.11+9 (build 17.0.11+9)
    OpenJDK 64-Bit Server VM Temurin-17.0.11+9 (build 17.0.11+9, mixed mode, sharing)
    

    And I run this command in my repo

    /home/zti/Desktop/sonar-scanner-cli-5.0.1.3006-linux/sonar-scanner-5.0.1.3006-linux/bin/sonar-scanner -X -Dsonar.host.url=<my_sonarqube_url> -Dsonar.token=<my-token>
    

    then I got this error :-

    15:23:08.362 INFO: Total time: 14.512s
    15:23:08.375 INFO: Final Memory: 18M/136M
    15:23:08.375 INFO: ------------------------------------------------------------------------
    Exception in thread "Thread-1" java.lang.NoClassDefFoundError: ch/qos/logback/classic/spi/ThrowableProxy
    	at ch.qos.logback.classic.spi.LoggingEvent.<init>(LoggingEvent.java:145)
    	at ch.qos.logback.classic.Logger.buildLoggingEventAndAppend(Logger.java:424)
    	at ch.qos.logback.classic.Logger.filterAndLog_0_Or3Plus(Logger.java:386)
    	at ch.qos.logback.classic.Logger.error(Logger.java:543)
    	at org.eclipse.jgit.internal.util.ShutdownHook.cleanup(ShutdownHook.java:87)
    	at java.base/java.lang.Thread.run(Unknown Source)
    Caused by: java.lang.ClassNotFoundException: ch.qos.logback.classic.spi.ThrowableProxy
    	at java.base/java.net.URLClassLoader.findClass(Unknown Source)
    	at org.sonarsource.scanner.api.internal.IsolatedClassloader.loadClass(IsolatedClassloader.java:82)
    	at java.base/java.lang.ClassLoader.loadClass(Unknown Source)
    

    Here code is successfully scanned, but the GitLab pipeline failed. So how do solve this error?