Download SonarQube
Author: m | 2025-04-24
Download sonarqube (PDF) sonarqube. Getting started with sonarqube; sonarqube. Getting started with sonarqube; sonarqube. Getting started with sonarqube.
SonarQube can't download values.protobuf file - SonarQube
This application here. Now let's proceed to the deployment. SonarQube stores all the data in the database. You can use different databases, but the recommended one is PostgreSQL. Let's set it up first. Configuring PostgreSQL Download the latest version here. Install it and create a database for SonarQube. To do this, first, create a user named sonar. Run the following command in the psql command line: CREATE USER sonar WITH PASSWORD '12345'; You can also use pgAdmin for this and other operations. Now we need to create the database named sonarqube using the CREATE DATABASE command. It looks like this in our case: CREATE DATABASE sonarqube OWNER sonar; The database is ready, let's start configuring SonarQube. SonarQube configuration Download and install SonarQube. You can get the latest version here. The distribution itself is an archive. We need to unpack the archive to the C directory:\sonarqube\sonarqube-8.5.1.38104. Then, edit the file C:\sonarqube\sonarqube-8.5.1.38104\conf\sonar.properties. We'll add there the following info on our created database: sonar.jdbc.username=sonarsonar.jdbc.password=12345sonar.jdbc.url=jdbc:postgresql://localhost/sonarqube SonarQube will see the database that we created and will start working with it. Next, you'll need to install the plugin for PVS-Studio. The plugin is in the directory where PVS-Studio is installed. It is C:\Program Files (x86)\PVS-Studio by default. We need a sonar-pvs-studio-plugin.jar file. Copy it to the directory with SonarQube C:\sonarqube\sonarqube-8.5.1.38104\extensions\plugins. You also need to download the sonar-cxx-plugin, click here to do it. At the time of writing, this is sonar-cxx-plugin-1.3.2.1853.jar. We need to copy this plugin to the C:\sonarqube\sonarqube-8.5.1.38104\extensions\plugins directory. Now you can run SonarQube. To do this, run C:\sonarqube\sonarqube-8.5.1.38104\bin\windows-x86-64\StartSonar.bat. Let's start setting up via the web interface. Go to the browser at sonarServer:9000. Here sonarServer is the name of the machine where SonarQube is installed. Quality Profile configuration The quality profile is a key component of SonarQube, which defines a set of rules for the
sonarqube Tutorial = Getting started with sonarqube
SonarQube Server, SonarQube Cloud, and SonarQube Community Build analyze your code on each build as part of your CI/CD workflow and, together with Sonar Quality Gates, prevent code with issues from being released to production.The Sonar solution helps you incorporate the Clean as You Code methodology by helping engineers pay attention to new code. Focusing on writing new, clean code during development ensures that all code released for production will be incrementally improved over time.Connected ModeConnected mode joins SonarQube for IDE with SonarQube (Server, Cloud) or SonarQube Community Build to deliver the full Sonar solution. SonarQube for IDE and SonarQube 9.9+, SonarQube Cloud, or SonarQube Community Build analyses help to ensure only clean code makes it into your project.Be sure to check out all of the Connected Mode benefits.Getting startedNow that you've heard about how SonarQube for IDE can help you write clean code, you are ready to try it out for yourself. After installing SonarQube for Visual Studio for your IDE from the Marketplace, open a project using a supported language and let it run an analysis.The Investigating issues explains how to find issues and focus on new code and each IDE explains how to fix issues in your code as you write.Learn moreCheck out the entire suite of Sonar products: SonarQube Server, SonarQube Cloud, and SonarQube for IDE.Then, have a look at the types of issues that SonarQube for IDE detects when combined with SonarQube Server and SonarQube Cloud, and browse a full list of Sonar Rules and Rule Descriptions available for static code analysis.Staying connectedUse the following links to follow SonarQube for Visual Studio behind the scenes: Source code Issue tracker JiraAnd if you need help, visit our online community to search for answers and reach out with questions!Install SonarQube – SonarQube Runner - Qualilogy
Requires SonarQube 5.6+ (tested against 5.6, 5.6.5 (LTS), 6.0, 6.1, 6.2 and 6.3)Uses a fork ( of the JDepend libraries ( version 2.9.1) to add the following rules and metrics to SonarQube:Number of Classes and Interfaces (Rule and Metric)Afferent Couplings (Rule and Metric)Efferent Couplings (Rule and Metric)Abstractness (Rule only)Instability (Rule only)Distance from the Main Sequence (Rule only)Package Dependency Cycle (Rule and Metric)This plugin depends on the existence of a package-info.java file in the package to correctly display issues (if no package-info.java file is present, the issues cannot be registered, as SonarQube only allows issues on existing files).(See Workarounds to generate package-info.java files using a Maven plugin)Missing package-info.java files can be detected and enforced with the following metrics:Number of Packages (Metric)Number of missing package-info.java files (Metric)ConfigurationThe plugin executes the Jdepend library (packaged within the plugin) during the execution of the SonarQube scanner to scan the binaries, so no extra configuration is needed within the project. The sensor will not be executed if no Jdepend rules have been activated.InstallationInstall the plugin via the Update Center in the SonarQube administration pages. Or to install the plugin manually; copy the .jar file from the release to the extensions/plugins directory of your SonarQube installation.. Download sonarqube (PDF) sonarqube. Getting started with sonarqube; sonarqube. Getting started with sonarqube; sonarqube. Getting started with sonarqube.What is SonarQube and use cases of SonarQube?
Easy interface to import your projects whatever your code repository platform: GitHub, GitLab, Azure DevOps, and Bitbucket; both on-prem and in-cloud. Yes, all eight! Once your projects are imported, tutorials will walk you through setting up analysis in GitHub Actions, Jenkins, GitLab CI, or Azure DevOps Pipelines; with language-specific tutorials for .NET, C, C++ and Objective-C projects. And now, regardless of which CI you use, you can fail the pipeline for a failing analysis.PR analysis on steroidsCode Repository Platform integration doesn't stop at onboarding. We support pull request decoration for GitHub, Bitbucket, Azure DevOps and GitLab; both on-prem and in-cloud. Yes, all eight! And Enterprise Edition adds PR decoration in monorepos.And it's not just decoration; Developer Edition also brings automagic branch and PR configuration for most workflows: Jenkins, GitHub Actions, Gitlab CI, Azure Pipelines and Bitbucket Pipelines.Ready to download SonarQube 8.9 LTA?Operating SonarQube is easier than ever We've made running SonarQube easier and more secure than ever. SonarQube has been security-hardened to U.S. Department of Defense standards (i.e. STIG-hardened), with a Docker image per edition on Docker Hub and in the DoD's Iron Bank. That, plus a Helm chart for Kubernetes support, makes SonarQube easier than ever to deploy.Routine maintenance is easier too, with support for hot database backups. Upgrading is easier than ever with progressive availability during upgrades; now, SonarQube is available for analysis and limited browsing even before reindexing is complete.Time for Python devs to onboard with SonarQube This LTA adds in-depth analysis to catch the tricky Bugs and Vulnerabilities developers expect, with the sane defaults, high performance, and minimal configuration that's standard to SonarQube. We’ve got Python support for up to version 3.9 of the language to properly track issues through all language structures, frameworks, and types. For teams just transitioning from other tools, there is a tool to easily import Pylint and Flake8 reports, plus the ability to write custom rules.In addition to all this, commercial editions support taint analysis rules to detect taint analysis Vulnerabilities such as injection flaws.C++ brings the rules & performance developers wantWith comprehensive coverage of the C++ Core Guidelines and a broad set of C++17-specific rules, we've made following modern best practices easy. If your shop uses multiple standard versions, managing your Quality Profile gets easy, too: enable the rules for all the versions you use, and we'll activate them based on the standard version the project compiles to. In addition,sonarqube 3 sonarsource/sonarqube - artifacthub.io
Codebase. The PVS-Studio plugin provides a set of rules that correspond to the analyzer warnings. We can add all of them to the quality profile or disable any rules if necessary. According to the configured quality profile, SonarQube will display or not display warnings after analyzing our code. Now, we need to configure the Quality Profile. To do so go to the Quality Profiles tab and click Create as shown in the picture below. In the appeared window enter a profile name (it can be random). In our case, the name is PVS-Studio Way. Then, select the language. C++ is relevant for us now. After that, click Create. Then go to the Rules tab, select the Repository category, and select PVS-Studio C++. Next, click Bulk Change and Activate In, in the appeared window select our created profile, that is, PVS-Studio Way. SonarQube is set up and ready to go. Analysis Then, we'll configure the project analysis directly using the PVS-Studio analyzer. Download the source code with the following command: git clone generate the project files: make.bat full nobuild generate the necessary additional files, compile the build_windows_Full_x64_vc15_Release\INSTALL.vcxproj project for that. Run the analysis with the following command "c:\\Program Files (x86)\\PVS-Studio\\PVS-Studio_Cmd.exe" \ -t build_windows_Full_x64_vc15_Release\\Blender.sln \ -o blender.plog --sonarqubedata -r So, we have the files blender.plog and sonar-project.properties, and we can push the results of our analysis to SonarQube. Use the sonar-scanner utility to do this. Sonar scanner You can download the utility here. Download the archive by the link, unzip it. For example, in our case, it is placed in the directory D:\sonar\sonar-scanner-4.5.0.2216-windows. Edit the D:\sonar\sonar-scanner-4.5.0.2216-windows\conf\sonar-scanner.properties file by adding the following line to it: sonar.host.url= Where sonarServer is the name of the machine where SonarQube is installed. Run the following command: D:\sonar\sonar-scanner-4.5.0.2216-windows\sonar-scanner.bat \-Dsonar.projectKey=blender -Dsonar.projectName=blender \-Dsonar.projectVersion=1.0 \-Dsonar.pvs-studio.reportPath=blender.plog Note that the command is calledPlans Pricing SonarQube Server and SonarQube Cloud
As you code and ensure your team follows a single governed coding standard.Connected ModeMeasure code coverageView the percentage of your codebase exercised by your tests for valuable insights into your code's health. Guides you to areas of low coverage to make improvements.Code coverageAI at SonarNew AI Code AssuranceSonar AI Code Assurance is a robust and streamlined process for validating AI-generated code through a structured and comprehensive analysis. This ensures that every new piece of code meets the highest standards of quality and security before it moves to production. View AI Code AssuranceIntroducing AI CodeFixSonar AI CodeFix is a powerful capability that suggests code fixes for issues discovered by our code analysis solutions SonarQube Server and SonarQube Cloud. With just one click, you can receive suggestions on how to resolve a range of issues, streamlining the issue resolution process.View AI CodeFixNEW - Advanced secrets detectionExplore SonarQube Server with this interactive product demoSee how SonarQube Server allows you to deliver and meet high code quality standards, for every project, at every step of the workflow. SECURITY AND SECRETS DETECTIONEnhanced developer security toolsStatic code analysisSonar’s static application security testing (SAST) engine detects security vulnerabilities in your code so they can be eliminated before you build and test your application. Achieve robust application security and compliance for complex projects with SAST. Explore SASTSecrets detectionSonarQube Server includes a powerful secrets detection tool, one of the most comprehensive solutions for detecting and removing secrets in code. Together with SonarQube for IDE, it prevents secrets from leaking out and becoming a serious security breach.Explore secrets detectionSecurity standards complianceSonarQube Server helps you comply with common code security standards, such as the NIST SSDF. Using SonarQube Server with SonarQube for IDE automatically checks your projects' code for security vulnerabilities and enhances overall code quality.Explore NIST SSDFFlexibility & governance: the. Download sonarqube (PDF) sonarqube. Getting started with sonarqube; sonarqube. Getting started with sonarqube; sonarqube. Getting started with sonarqube.Comments
This application here. Now let's proceed to the deployment. SonarQube stores all the data in the database. You can use different databases, but the recommended one is PostgreSQL. Let's set it up first. Configuring PostgreSQL Download the latest version here. Install it and create a database for SonarQube. To do this, first, create a user named sonar. Run the following command in the psql command line: CREATE USER sonar WITH PASSWORD '12345'; You can also use pgAdmin for this and other operations. Now we need to create the database named sonarqube using the CREATE DATABASE command. It looks like this in our case: CREATE DATABASE sonarqube OWNER sonar; The database is ready, let's start configuring SonarQube. SonarQube configuration Download and install SonarQube. You can get the latest version here. The distribution itself is an archive. We need to unpack the archive to the C directory:\sonarqube\sonarqube-8.5.1.38104. Then, edit the file C:\sonarqube\sonarqube-8.5.1.38104\conf\sonar.properties. We'll add there the following info on our created database: sonar.jdbc.username=sonarsonar.jdbc.password=12345sonar.jdbc.url=jdbc:postgresql://localhost/sonarqube SonarQube will see the database that we created and will start working with it. Next, you'll need to install the plugin for PVS-Studio. The plugin is in the directory where PVS-Studio is installed. It is C:\Program Files (x86)\PVS-Studio by default. We need a sonar-pvs-studio-plugin.jar file. Copy it to the directory with SonarQube C:\sonarqube\sonarqube-8.5.1.38104\extensions\plugins. You also need to download the sonar-cxx-plugin, click here to do it. At the time of writing, this is sonar-cxx-plugin-1.3.2.1853.jar. We need to copy this plugin to the C:\sonarqube\sonarqube-8.5.1.38104\extensions\plugins directory. Now you can run SonarQube. To do this, run C:\sonarqube\sonarqube-8.5.1.38104\bin\windows-x86-64\StartSonar.bat. Let's start setting up via the web interface. Go to the browser at sonarServer:9000. Here sonarServer is the name of the machine where SonarQube is installed. Quality Profile configuration The quality profile is a key component of SonarQube, which defines a set of rules for the
2025-04-23SonarQube Server, SonarQube Cloud, and SonarQube Community Build analyze your code on each build as part of your CI/CD workflow and, together with Sonar Quality Gates, prevent code with issues from being released to production.The Sonar solution helps you incorporate the Clean as You Code methodology by helping engineers pay attention to new code. Focusing on writing new, clean code during development ensures that all code released for production will be incrementally improved over time.Connected ModeConnected mode joins SonarQube for IDE with SonarQube (Server, Cloud) or SonarQube Community Build to deliver the full Sonar solution. SonarQube for IDE and SonarQube 9.9+, SonarQube Cloud, or SonarQube Community Build analyses help to ensure only clean code makes it into your project.Be sure to check out all of the Connected Mode benefits.Getting startedNow that you've heard about how SonarQube for IDE can help you write clean code, you are ready to try it out for yourself. After installing SonarQube for Visual Studio for your IDE from the Marketplace, open a project using a supported language and let it run an analysis.The Investigating issues explains how to find issues and focus on new code and each IDE explains how to fix issues in your code as you write.Learn moreCheck out the entire suite of Sonar products: SonarQube Server, SonarQube Cloud, and SonarQube for IDE.Then, have a look at the types of issues that SonarQube for IDE detects when combined with SonarQube Server and SonarQube Cloud, and browse a full list of Sonar Rules and Rule Descriptions available for static code analysis.Staying connectedUse the following links to follow SonarQube for Visual Studio behind the scenes: Source code Issue tracker JiraAnd if you need help, visit our online community to search for answers and reach out with questions!
2025-04-03Easy interface to import your projects whatever your code repository platform: GitHub, GitLab, Azure DevOps, and Bitbucket; both on-prem and in-cloud. Yes, all eight! Once your projects are imported, tutorials will walk you through setting up analysis in GitHub Actions, Jenkins, GitLab CI, or Azure DevOps Pipelines; with language-specific tutorials for .NET, C, C++ and Objective-C projects. And now, regardless of which CI you use, you can fail the pipeline for a failing analysis.PR analysis on steroidsCode Repository Platform integration doesn't stop at onboarding. We support pull request decoration for GitHub, Bitbucket, Azure DevOps and GitLab; both on-prem and in-cloud. Yes, all eight! And Enterprise Edition adds PR decoration in monorepos.And it's not just decoration; Developer Edition also brings automagic branch and PR configuration for most workflows: Jenkins, GitHub Actions, Gitlab CI, Azure Pipelines and Bitbucket Pipelines.Ready to download SonarQube 8.9 LTA?Operating SonarQube is easier than ever We've made running SonarQube easier and more secure than ever. SonarQube has been security-hardened to U.S. Department of Defense standards (i.e. STIG-hardened), with a Docker image per edition on Docker Hub and in the DoD's Iron Bank. That, plus a Helm chart for Kubernetes support, makes SonarQube easier than ever to deploy.Routine maintenance is easier too, with support for hot database backups. Upgrading is easier than ever with progressive availability during upgrades; now, SonarQube is available for analysis and limited browsing even before reindexing is complete.Time for Python devs to onboard with SonarQube This LTA adds in-depth analysis to catch the tricky Bugs and Vulnerabilities developers expect, with the sane defaults, high performance, and minimal configuration that's standard to SonarQube. We’ve got Python support for up to version 3.9 of the language to properly track issues through all language structures, frameworks, and types. For teams just transitioning from other tools, there is a tool to easily import Pylint and Flake8 reports, plus the ability to write custom rules.In addition to all this, commercial editions support taint analysis rules to detect taint analysis Vulnerabilities such as injection flaws.C++ brings the rules & performance developers wantWith comprehensive coverage of the C++ Core Guidelines and a broad set of C++17-specific rules, we've made following modern best practices easy. If your shop uses multiple standard versions, managing your Quality Profile gets easy, too: enable the rules for all the versions you use, and we'll activate them based on the standard version the project compiles to. In addition,
2025-04-03Codebase. The PVS-Studio plugin provides a set of rules that correspond to the analyzer warnings. We can add all of them to the quality profile or disable any rules if necessary. According to the configured quality profile, SonarQube will display or not display warnings after analyzing our code. Now, we need to configure the Quality Profile. To do so go to the Quality Profiles tab and click Create as shown in the picture below. In the appeared window enter a profile name (it can be random). In our case, the name is PVS-Studio Way. Then, select the language. C++ is relevant for us now. After that, click Create. Then go to the Rules tab, select the Repository category, and select PVS-Studio C++. Next, click Bulk Change and Activate In, in the appeared window select our created profile, that is, PVS-Studio Way. SonarQube is set up and ready to go. Analysis Then, we'll configure the project analysis directly using the PVS-Studio analyzer. Download the source code with the following command: git clone generate the project files: make.bat full nobuild generate the necessary additional files, compile the build_windows_Full_x64_vc15_Release\INSTALL.vcxproj project for that. Run the analysis with the following command "c:\\Program Files (x86)\\PVS-Studio\\PVS-Studio_Cmd.exe" \ -t build_windows_Full_x64_vc15_Release\\Blender.sln \ -o blender.plog --sonarqubedata -r So, we have the files blender.plog and sonar-project.properties, and we can push the results of our analysis to SonarQube. Use the sonar-scanner utility to do this. Sonar scanner You can download the utility here. Download the archive by the link, unzip it. For example, in our case, it is placed in the directory D:\sonar\sonar-scanner-4.5.0.2216-windows. Edit the D:\sonar\sonar-scanner-4.5.0.2216-windows\conf\sonar-scanner.properties file by adding the following line to it: sonar.host.url= Where sonarServer is the name of the machine where SonarQube is installed. Run the following command: D:\sonar\sonar-scanner-4.5.0.2216-windows\sonar-scanner.bat \-Dsonar.projectKey=blender -Dsonar.projectName=blender \-Dsonar.projectVersion=1.0 \-Dsonar.pvs-studio.reportPath=blender.plog Note that the command is called
2025-04-21SonarQube for IDESonarQube for IDE (formerly known as SonarLint) is a free and open-source IDE plugin for static code analysis brought to you by Sonar. It’s your first line of defense, designed to detect coding issues in real-time for 8 languages. Your code is checked against an extensive set of rules that cover many attributes of code, such as maintainability, reliability, and security issues. It’s possible to analyze more rules, assign issues, share quality profiles, and more, with your team when running in connected mode with SonarQube (Server, Cloud) or SonarQube Community Build. See the Connected mode benefits list for more details.Sonar’s IDE extensions are available for IntelliJ (and other JetBrains IDEs), Visual Studio, VS Code, and Eclipse, and can be installed directly from your IDE's plugin marketplace. SonarQube for IDE leverages over 5,000 language-specific Clean Code rules.The approach to Clean CodeClean Code is the standard for all code that results in secure, reliable, and maintainable software therefore, writing clean code is essential to maintaining a healthy codebase. This applies to all code: source code, test code, infrastructure as code, glue code, scripts, and more.Sonar's Clean as You Code approach is a software development practice based on the principle that new code (code that you added or modified recently) needs to comply with SonarQube (Server, Cloud) quality standards. The Sonar solution implements Clean as You Code by warning you whenever issues are detected in your new code, helping you maintain high standards and focus on code quality by incrementally improving the entire code base.SonarQube Server, SonarQube Cloud, and SonarQube Community Build come with built-in quality profiles designed for each supported language, called the Sonar Way profile. The Sonar way activates a set of rules that should be applicable to most projects and is a starting point to help you implement clean code practices in your organization.The Sonar SolutionSonar products are designed to help you achieve a state of Clean Code. By linking SonarQube for IDE with SonarQube Server, SonarQube Cloud, or SonarQube Community Build, checks are performed at every stage of the development process; we call this the Sonar solution. This means your project settings, new code definitions, and quality profiles are applied locally to an analysis in the IDE. The Sonar solution is designed to help you achieve a state of Clean Code. Your project settings, new code definitions, and the quality profiles managed in SonarCloud are applied locally to an analysis in the IDE SonarLint provides immediate feedback in your IDE as you write code so you can find and fix issues before a commit. Then, SonarQube Server and SonarQube Cloud analyze your pull requests before you merge them, providing another layer of protection against code issues. Finally,
2025-04-10Local cache11:53:13 06:23:13.102 Fetching resource for plugin: vbnet, version 8.55.0.65544. Resource: SonarAnalyzer-8.55.0.65544.zip11:53:13 06:23:13.102 Downloading SonarAnalyzer-8.55.0.65544.zip to /app/buildagent/temp/buildTmp/.sonarqube/resources/111:53:13 06:23:13.102 Downloading file to /app/buildagent/temp/buildTmp/.sonarqube/resources/1/SonarAnalyzer-8.55.0.65544.zip...11:53:13 06:23:13.102 Downloading from 06:23:13.114 Response received from 06:23:13.115 Extracting files to /app/buildagent/temp/buildTmp/.sonarqube/resources/1...11:53:13 06:23:13.136 Processing plugin: securitycsharpfrontend version 10.0.0.2023411:53:13 06:23:13.138 Cache miss: plugin files were not found in the local cache11:53:13 06:23:13.138 Fetching resource for plugin: securitycsharpfrontend, version 10.0.0.20234. Resource: SonarAnalyzer.Security-10.0.0.20234.zip11:53:13 06:23:13.138 Downloading SonarAnalyzer.Security-10.0.0.20234.zip to /app/buildagent/temp/buildTmp/.sonarqube/resources/211:53:13 06:23:13.138 Downloading file to /app/buildagent/temp/buildTmp/.sonarqube/resources/2/SonarAnalyzer.Security-10.0.0.20234.zip...11:53:13 06:23:13.14 Downloading from 06:23:13.147 Response received from 06:23:13.149 Extracting files to /app/buildagent/temp/buildTmp/.sonarqube/resources/2...11:53:13 06:23:13.17 Writing Roslyn analyzer additional file to /app/buildagent/work/3cea31a8a2e2aa95/src/.sonarqube/conf/cs/SonarLint.xml...11:53:13 06:23:13.171 Fetching quality profile for project '######'...11:53:13 06:23:13.172 Downloading from 06:23:13.211 Response received from 06:23:13.213 Fetching rules for quality profile 'AYJ-KBq2XOwVvgx9jUmr'...11:53:13 06:23:13.213 Downloading from 06:23:13.265 Response received from 06:23:13.271 Local analyzer cache: /app/buildagent/temp/buildTmp/.sonarqube/resources11:53:13 06:23:13.272 Writing Roslyn generated ruleset to /app/buildagent/work/3cea31a8a2e2aa95/src/.sonarqube/conf/Sonar-vbnet.ruleset...11:53:13 06:23:13.273 Writing Roslyn generated ruleset to /app/buildagent/work/3cea31a8a2e2aa95/src/.sonarqube/conf/Sonar-vbnet-none.ruleset...11:53:13 06:23:13.274 Provisioning analyzer assemblies for vbnet...11:53:13 06:23:13.274 Installing required Roslyn analyzers...11:53:13 06:23:13.274 Processing plugin: csharp version 8.55.0.6554411:53:13 06:23:13.275 Cache hit: using plugin files from /app/buildagent/temp/buildTmp/.sonarqube/resources/011:53:13 06:23:13.275 Processing plugin: vbnet version 8.55.0.6554411:53:13 06:23:13.276 Cache hit: using plugin files from /app/buildagent/temp/buildTmp/.sonarqube/resources/111:53:13 06:23:13.277 Writing Roslyn analyzer additional file to /app/buildagent/work/3cea31a8a2e2aa95/src/.sonarqube/conf/vbnet/SonarLint.xml...11:53:13 06:23:13.281 Processing analysis cache11:53:13 06:23:13.284 Incremental PR analysis: Base branch parameter was not provided.11:53:13 06:23:13.284 Cache data is empty. A full analysis will be performed.Unhandled exception. System.InvalidOperationException: There was an error generating the XML document. ---> System.ArgumentException: ' ', hexadecimal value 0x1B, is an invalid character. at System.Xml.XmlEncodedRawTextWriter.WriteElementTextBlock(Char* pSrc, Char* pSrcEnd) at System.Xml.XmlEncodedRawTextWriter.WriteString(String text) at System.Xml.XmlWellFormedWriter.WriteString(String text) at System.Xml.Serialization.XmlSerializationWriter.WriteElementString(String localName, String ns, String value,
2025-04-19