[Azure DevOps] Run Code Analysis task failing with "could not find the pullrequest"

Azure DevOps, SonarCloud

For the last 48 hours, the “Run Code Analysis” task has been failing all of our gated builds with the message: “ERROR: Could not find the pullrequest with key ‘<pull request number>’”.

The pull requests are not appearing in SonarCloud when the task fails.

  • The service connection still verifies correctly, and using a new security token had no effect.
  • The error is only in the “Run Code Analysis” task.
  • It affects all of our build servers, with separate locations and hardware.
  • We haven’t modified the pipelines (both YAML and classic UI).
  • We haven’t modified the build servers.
  • It’s affecting every pull request that uses Sonar analysis.
  • It’s failing commits that previously passed the quality gates successfully.

Example of failing log from this morning:

##[section]Starting: Run Code Analysis
==============================================================================
Task         : Run Code Analysis
Description  : Run scanner and upload the results to the SonarCloud server.
Version      : 1.41.0
Author       : sonarsource
Help         : Version: 1.41.0. This task is not needed for Maven and Gradle projects since the scanner should be run as part of the build.

[More Information](https://docs.sonarcloud.io/advanced-setup/ci-based-analysis/sonarcloud-extension-for-azure-devops/)
==============================================================================
[command]D:\a\_work\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe end
SonarScanner for MSBuild 5.13
Using the .NET Framework version of the Scanner for MSBuild
Post-processing started.
Uninstalling target: D:\a\_work\1\.sonarqube\bin\targets\SonarQube.Integration.targets
sonar.verbose=true was specified - setting the log verbosity to 'Debug'
Loading the SonarCloud analysis config from D:\a\_work\1\.sonarqube\conf\SonarQubeAnalysisConfig.xml
TeamBuild environment detected
Analysis base directory: D:\a\_work\1\.sonarqube
Build directory: D:\a\_work\1
Bin directory: D:\a\_work\1\.sonarqube\bin
Config directory: D:\a\_work\1\.sonarqube\conf
Output directory: D:\a\_work\1\.sonarqube\out
Config file: D:\a\_work\1\.sonarqube\conf\SonarQubeAnalysisConfig.xml
Generating SonarCloud project properties file to D:\a\_work\1\.sonarqube\out\sonar-project.properties
Setting analysis property: sonar.visualstudio.enable=false
The supplied Code Analysis ErrorLog file is a valid json file and does not need to be fixed: D:\a\_work\1\.sonarqube\out\0\Issues.json
The supplied Code Analysis ErrorLog file is a valid json file and does not need to be fixed: D:\a\_work\1\.sonarqube\out\1\Issues.json
The supplied Code Analysis ErrorLog file is a valid json file and does not need to be fixed: D:\a\_work\1\.sonarqube\out\2\Issues.json
Using TFS/Azure DevOps sources directory as project base directory: 'D:\a\_work\1\s'.
WARNING: File 'C:\Users\cloudtest\AppData\Local\Temp\.NETFramework,Version=v4.7.2.SqlClrAttributes.cs' is not located under the base directory 'D:\a\_work\1\s' and will not be analyzed.
WARNING: File 'C:\Users\cloudtest\AppData\Local\Temp\.NETFramework,Version=v4.5.2.SqlClrAttributes.cs' is not located under the base directory 'D:\a\_work\1\s' and will not be analyzed.
File was referenced by the following projects: 'D:\a\_work\1\s\[redacted].sqlproj', 'D:\a\_work\1\s\[redacted]\[redacted].sqlproj'.
Dumping content of sonar-project.properties
------------------------------------------------------------------------
sonar.projectKey=[redacted]
sonar.working.directory=D:\\a\\_work\\1\\.sonarqube\\out\\.sonar
sonar.projectBaseDir=D:\\a\\_work\\1\\s
sonar.pullrequest.cache.basepath=D:\\a\\_work\\1\\s
sonar.sources=\
"D:\\a\\_work\\1\\s\\[redacted]\\.editorconfig"

74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.projectKey=[redacted]:[redacted]
74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.projectName=[redacted]
74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.projectBaseDir=D:\\a\\_work\\1\\s\\[redacted]
74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.sourceEncoding=utf-8
74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.sources=\
[1758 files]

74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.cs.analyzer.projectOutPaths=\
"D:\\a\\_work\\1\\.sonarqube\\out\\0"
74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.cs.roslyn.reportFilePaths=\
"D:\\a\\_work\\1\\.sonarqube\\out\\0\\Issues.json"

74D1BC06-5487-479A-8589-28CE70EC2D13.sonar.working.directory=D:\\a\\_work\\1\\.sonarqube\\out\\.sonar\\mod0
31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.projectKey=[redacted]:[redacted]
31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.projectName=[redacted]
31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.projectBaseDir=D:\\a\\_work\\1\\s\\[redacted]
31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.sourceEncoding=utf-8
31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.sources=\
[135 files]

31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.cs.analyzer.projectOutPaths=\
"D:\\a\\_work\\1\\.sonarqube\\out\\1"
31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.cs.roslyn.reportFilePaths=\
"D:\\a\\_work\\1\\.sonarqube\\out\\1\\Issues.json"

31BD8B1B-5D6B-465E-9EA3-FFE560655283.sonar.working.directory=D:\\a\\_work\\1\\.sonarqube\\out\\.sonar\\mod1
C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.projectKey=[redacted]:[redacted]
C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.projectName=[redacted]
C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.projectBaseDir=D:\\a\\_work\\1\\s\\[redacted]
C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.sourceEncoding=utf-8
C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.sources=\
[457 files]

C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.cs.analyzer.projectOutPaths=\
"D:\\a\\_work\\1\\.sonarqube\\out\\2"
C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.cs.roslyn.reportFilePaths=\
"D:\\a\\_work\\1\\.sonarqube\\out\\2\\Issues.json"

C51393A3-51DB-4E90-A580-FE8F6542BB94.sonar.working.directory=D:\\a\\_work\\1\\.sonarqube\\out\\.sonar\\mod2
sonar.organization=[redacted]
sonar.host.url=https://sonarcloud.io/
sonar.projectKey=[redacted]
sonar.projectName=[redacted]
sonar.projectVersion=refs_pull_23429_merge_230828.1
sonar.pullrequest.key=23429
sonar.pullrequest.base=develop
sonar.pullrequest.branch=sprint-67/akash/BUG152106
sonar.pullrequest.provider=vsts
sonar.pullrequest.vsts.instanceUrl=https://[redacted].visualstudio.com/
sonar.pullrequest.vsts.project=[redacted]
sonar.pullrequest.vsts.repository=[redacted]
sonar.scanner.metadataFilePath=D:\\a\\_work\\_temp\\sonar\\141306\\f15b0bcf-5bb8-393a-85bb-c5a651f8c5cf\\report-task.txt
sonar.visualstudio.enable=false

sonar.modules=74D1BC06-5487-479A-8589-28CE70EC2D13,31BD8B1B-5D6B-465E-9EA3-FFE560655283,C51393A3-51DB-4E90-A580-FE8F6542BB94


------------------------------------------------------------------------
Writing processing summary to D:\a\_work\1\.sonarqube\out\ProjectInfo.log
Calling the TFS Processor executable...
Executing file D:\a\_work\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.TFSProcessor.exe
Args: ConvertCoverage D:\a\_work\1\.sonarqube\conf\SonarQubeAnalysisConfig.xml D:\a\_work\1\.sonarqube\out\sonar-project.properties 
Working directory: D:\a\_work\1
Timeout (ms):-1
Process id: 5304
Attempting to locate the CodeCoverage.exe tool...
Attempting to locate the CodeCoverage.exe tool using setup configuration...
Code coverage command line tool: C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\Team Tools\Dynamic Code Coverage Tools\CodeCoverage.exe
Fetching code coverage report information from TFS...
Attempting to locate a test results (.trx) file...
Looking for TRX files in: D:\a\_work\1\TestResults
No test results files found
Did not find any binary coverage files in the expected location.
Falling back on locating coverage files in the agent temp directory.
Searching for coverage files in D:\a\_work\_temp
No coverage files found in the agent temp directory.
Coverage report conversion completed successfully.
Process returned exit code 0
The TFS Processor has finished
Calling the SonarScanner CLI...
Executing file D:\a\_work\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\sonar-scanner-4.8.0.2856\bin\sonar-scanner.bat
Args: -Dsonar.scanAllFiles=true -Dproject.settings=D:\a\_work\1\.sonarqube\out\sonar-project.properties --from=ScannerMSBuild/5.13 --debug <sensitive data removed>
Working directory: D:\a\_work\1
Timeout (ms):-1
Process id: 5960
INFO: Scanner configuration file: D:\a\_work\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\sonar-scanner-4.8.0.2856\bin\..\conf\sonar-scanner.properties
INFO: Project root configuration file: D:\a\_work\1\.sonarqube\out\sonar-project.properties
INFO: SonarScanner 4.8.0.2856
INFO: Java 17.0.6 Eclipse Adoptium (64-bit)
INFO: Windows Server 2019 10.0 amd64
DEBUG: keyStore is : 
DEBUG: keyStore type is : pkcs12
DEBUG: keyStore provider is : 
DEBUG: init keystore
DEBUG: init keymanager of type SunX509
DEBUG: Create: C:\Users\cloudtest\.sonar\cache
INFO: User cache: C:\Users\cloudtest\.sonar\cache
DEBUG: Create: C:\Users\cloudtest\.sonar\cache\_tmp
DEBUG: Extract sonar-scanner-api-batch in temp...
DEBUG: Get bootstrap index...
DEBUG: Download: https://sonarcloud.io/batch/index
DEBUG: Get bootstrap completed
DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.45575-all.jar to C:\Users\cloudtest\.sonar\cache\_tmp\fileCache11793588656701651329.tmp
DEBUG: Create isolated classloader...
DEBUG: Start temp cleaning...
DEBUG: Temp cleaning done
INFO: Analyzing on SonarCloud
INFO: Default locale: "en_US", source code encoding: "windows-1252" (analysis is platform dependent)
DEBUG: Work directory: D:\a\_work\1\.sonarqube\out\.sonar
DEBUG: Execution execute
DEBUG: SonarCloud 10.1.0.809
INFO: Load global settings
DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=325ms
INFO: Load global settings (done) | time=329ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
DEBUG: Create : C:\Users\cloudtest\.sonar\_tmp
INFO: User cache: C:\Users\cloudtest\.sonar\cache
INFO: Load/download plugins
INFO: Load plugins index
DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=287ms
INFO: Load plugins index (done) | time=398ms
DEBUG: Download plugin 'abap' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache15049687493372608664.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/abap/versions/2c171ccd0ad613263651d9bb2d2a462f.jar | time=54ms
DEBUG: Download plugin 'sonarapex' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache10764987554182584471.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarapex/versions/b62bcb36fec7db374fa3b730a89d2394.jar | time=19ms
DEBUG: Download plugin 'csharp' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache14625954781186921550.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/csharp/versions/fff1a7411736e2d074652b649ed9e87b.jar | time=26ms
DEBUG: Download plugin 'cpp' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache14687885224983179171.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/cpp/versions/7d57ae6a442f04f6de55f4100337b8d7.jar | time=156ms
DEBUG: Download plugin 'cobol' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache4711221844305828450.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/cobol/versions/43c241e4e6a975353832ed4488295b33.jar | time=14ms
DEBUG: Download plugin 'config' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache636577171901216861.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/config/versions/0ffdd8661b532f02f26a6609f74963d9.jar | time=8ms
DEBUG: Download plugin 'dbd' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache14766230223191566159.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbd/versions/eb49f324dc6af30a44d6065c5ea47545.jar | time=14ms
DEBUG: Download plugin 'dbdjavafrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache9970398245815215393.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/ae95a67e15b29f049f5f34679e6625ce.jar | time=13ms
DEBUG: Download plugin 'dbdpythonfrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache4120717492243126449.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbdpythonfrontend/versions/170391812be9547b3ab39275b0e16f97.jar | time=10ms
DEBUG: Download plugin 'flex' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache9881331801155460583.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/flex/versions/4de84a1cf99ad0aae74b4e90ec793b66.jar | time=7ms
DEBUG: Download plugin 'go' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache13381093213868068259.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/go/versions/089cdc39b68a08046758a4ade00dedda.jar | time=17ms
DEBUG: Download plugin 'web' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache16109899194416403045.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/web/versions/173658656006ee666e713c1fb4f1f668.jar | time=26ms
DEBUG: Download plugin 'iac' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache3064924052290699989.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/iac/versions/05a62541c3338231aeb721b12d1f1e3f.jar | time=7ms
DEBUG: Download plugin 'jacoco' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache9139340223549933784.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar | time=6ms
DEBUG: Download plugin 'java' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache1416966710848164928.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/java/versions/dde5a46287f2fdb6350a8fcdd44d593b.jar | time=31ms
DEBUG: Download plugin 'javascript' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache16947724387987879702.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/javascript/versions/74f9a5fc6471d4bf4a0aff49fb90f8a1.jar | time=47ms
DEBUG: Download plugin 'kotlin' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache8172153163352190476.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/kotlin/versions/4ed0d94115ead227ec935065fa86d2e0.jar | time=8ms
DEBUG: Download plugin 'license' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache8983197617524133931.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/license/versions/efb1e950baa42792bf282e1dbb55f86c.jar | time=4ms
DEBUG: Download plugin 'php' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache4709408883444450942.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/php/versions/ba60a1de59fb439265ac926c8c274103.jar | time=12ms
DEBUG: Download plugin 'plsql' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache1702542960431006148.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/plsql/versions/e2f212825f651b0bc2bb42cd2d94969c.jar | time=25ms
DEBUG: Download plugin 'python' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache11224249557621774370.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/python/versions/e4fff1589730767cee36aa4627d58fc2.jar | time=8ms
DEBUG: Download plugin 'ruby' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache16041642929552890277.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/ruby/versions/8b0f338549b584a32db6f5f533b71981.jar | time=7ms
DEBUG: Download plugin 'sonarscala' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache4196786598207193128.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarscala/versions/041c92de4a66a5ec2cedb373a5535515.jar | time=9ms
DEBUG: Download plugin 'swift' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache13235234864297837953.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/swift/versions/aa1cdae1c8474bc9c62125a450f9a87f.jar | time=6ms
DEBUG: Download plugin 'tsql' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache17069366195244768874.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/tsql/versions/29f8087dda10b263378a41ab2c9c7bae.jar | time=6ms
DEBUG: Download plugin 'text' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache13610688885464835643.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/text/versions/d8721ad6e9a42ec2dc0b54aca1832f53.jar | time=7ms
DEBUG: Download plugin 'vbnet' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache1681238465197802604.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/vbnet/versions/1a588021a5a3d6fbbf015b59af87a3d2.jar | time=5ms
DEBUG: Download plugin 'security' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache8822355535946946982.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/security/versions/806aadbd3f67f5c9f7fd97c5a530dcfc.jar | time=8ms
DEBUG: Download plugin 'securitycsharpfrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache10431461893845740313.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securitycsharpfrontend/versions/cf554eb0cee391cd55e5e1458a940655.jar | time=13ms
DEBUG: Download plugin 'securityjsfrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache15993719276281359105.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/559415e9bd1f55589c0d05cd657381a4.jar | time=0ms
DEBUG: Download plugin 'securityjavafrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache2814612751507088702.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/6fe5b2c504d43caafee630cce6df7522.jar | time=8ms
DEBUG: Download plugin 'securityphpfrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache7124588147641995093.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityphpfrontend/versions/4ed2ff1bb3c136524827c5f661af76ae.jar | time=16ms
DEBUG: Download plugin 'securitypythonfrontend' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache6962925359706401716.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securitypythonfrontend/versions/bfea7206b2644af4028c82a470daa201.jar | time=9ms
DEBUG: Download plugin 'xml' to 'C:\Users\cloudtest\.sonar\_tmp\fileCache5234569219177045074.tmp'
DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar | time=7ms
INFO: Load/download plugins (done) | time=2966ms
DEBUG: Plugins:
DEBUG:   * IaC Code Quality and Security 1.20.0.5654 (iac)
DEBUG:   * PL/SQL Code Quality and Security 3.10.0.5282 (plsql)
DEBUG:   * Scala Code Quality and Security 1.14.0.4481 (sonarscala)
DEBUG:   * C# Code Quality and Security 9.8.0.76515 (csharp)
DEBUG:   * Vulnerability Analysis 10.2.0.22608 (security)
DEBUG:   * Java Code Quality and Security 7.24.0.32100 (java)
DEBUG:   * HTML Code Quality and Security 3.9.0.3600 (web)
DEBUG:   * Flex Code Quality and Security 2.10.0.3458 (flex)
DEBUG:   * XML Code Quality and Security 2.10.0.4108 (xml)
DEBUG:   * Text Code Quality and Security 2.3.0.1632 (text)
DEBUG:   * VB.NET Code Quality and Security 9.8.0.76515 (vbnet)
DEBUG:   * Swift Code Quality and Security 4.10.0.5999 (swift)
DEBUG:   * CFamily Code Quality and Security 6.48.0.62520 (cpp)
DEBUG:   * Python Code Quality and Security 4.7.0.12181 (python)
DEBUG:   * Dataflow Bug Detection Rules for Python 1.17.0.4892 (dbdpythonfrontend)
DEBUG:   * Dataflow Bug Detection 1.17.0.4892 (dbd)
DEBUG:   * Go Code Quality and Security 1.14.0.4481 (go)
DEBUG:   * JaCoCo 1.3.0.1538 (jacoco)
DEBUG:   * Kotlin Code Quality and Security 2.17.0.2902 (kotlin)
DEBUG:   * Dataflow Bug Detection Rules for Java 1.17.0.4892 (dbdjavafrontend)
DEBUG:   * T-SQL Code Quality and Security 1.10.0.5799 (tsql)
DEBUG:   * Apex Code Quality and Security 1.14.0.4481 (sonarapex)
DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 10.5.1.22382 (javascript)
DEBUG:   * Ruby Code Quality and Security 1.14.0.4481 (ruby)
DEBUG:   * Vulnerability Rules for C# 10.2.0.22608 (securitycsharpfrontend)
DEBUG:   * Vulnerability Rules for Java 10.2.0.22608 (securityjavafrontend)
DEBUG:   * License for SonarLint 8.0.0.45575 (license)
DEBUG:   * Vulnerability Rules for JS 10.2.0.22608 (securityjsfrontend)
DEBUG:   * COBOL Code Quality 5.4.0.6318 (cobol)
DEBUG:   * Vulnerability Rules for Python 10.2.0.22608 (securitypythonfrontend)
DEBUG:   * PHP Code Quality and Security 3.31.0.9993 (php)
DEBUG:   * ABAP Code Quality and Security 3.13.0.4389 (abap)
DEBUG:   * Configuration detection for Code Quality and Security 1.3.0.654 (config)
DEBUG:   * Vulnerability Rules for PHP 10.2.0.22608 (securityphpfrontend)
DEBUG: GET 200 https://sonarcloud.io/api/server/version | time=293ms
DEBUG: Updated analysis started with a difference of -73 milliseconds
DEBUG: Started at Mon Aug 28 09:23:02 UTC 2023
INFO: Loaded core extensions: developer-scanner
DEBUG: Installed core extension: com.sonarsource.branch.DeveloperScannerCoreExtension@1e63d216
INFO: Found an active CI vendor: 'Azure DevOps'
INFO: Load project settings for component key: '[redacted]'
DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=[redacted] | time=253ms
INFO: Load project settings for component key: '[redacted]' (done) | time=289ms
INFO: Process project properties
DEBUG: Process project properties (done) | time=107ms
INFO: Execute project builders
DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
DEBUG: Processing D:\a\_work\1\.sonarqube\out\0\output-cs\file-metadata.pb
DEBUG: Processing D:\a\_work\1\.sonarqube\out\1\output-cs\file-metadata.pb
DEBUG: Processing D:\a\_work\1\.sonarqube\out\2\output-cs\file-metadata.pb
DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
INFO: Execute project builders (done) | time=127ms
INFO: Project key: [redacted]
INFO: Base dir: D:\a\_work\1\s
INFO: Working dir: D:\a\_work\1\.sonarqube\out\.sonar
DEBUG: Project global encoding: windows-1252, default locale: en_US
DEBUG: Creating module hierarchy
DEBUG:   Init module '[redacted]'
DEBUG:     Base dir: D:\a\_work\1\s
DEBUG:     Working dir: D:\a\_work\1\.sonarqube\out\.sonar
DEBUG:     Module global encoding: windows-1252, default locale: en_US
DEBUG:   Init module '[redacted]'
DEBUG:     Base dir: D:\a\_work\1\s\[redacted]
DEBUG:     Working dir: D:\a\_work\1\.sonarqube\out\.sonar\mod0
DEBUG:     Module global encoding: UTF-8, default locale: en_US
DEBUG:   Init module '[redacted]'
DEBUG:     Base dir: D:\a\_work\1\s\[redacted]
DEBUG:     Working dir: D:\a\_work\1\.sonarqube\out\.sonar\mod1
DEBUG:     Module global encoding: UTF-8, default locale: en_US
DEBUG:   Init module '[redacted]'
DEBUG:     Base dir: D:\a\_work\1\s\[redacted]
DEBUG:     Working dir: D:\a\_work\1\.sonarqube\out\.sonar\mod2
DEBUG:     Module global encoding: UTF-8, default locale: en_US
INFO: Load project branches
DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=[redacted] | time=287ms
INFO: Load project branches (done) | time=305ms
INFO: Check ALM binding of project '[redacted]'
DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=[redacted] | time=345ms
INFO: Detected project binding: BOUND
INFO: Check ALM binding of project '[redacted]' (done) | time=351ms
INFO: Load project pull requests
DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=[redacted] | time=496ms
INFO: Load project pull requests (done) | time=544ms
INFO: Load branch configuration
DEBUG: Found manual configuration of branch/PR analysis. Skipping automatic configuration.
DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=[redacted]&pullrequestKey=23429 | time=376ms
INFO: ------------------------------------------------------------------------
INFO: EXECUTION FAILURE
INFO: ------------------------------------------------------------------------
INFO: Total time: 19.734s
INFO: Final Memory: 21M/74M
INFO: ------------------------------------------------------------------------
##[error] ERROR: Error during SonarScanner execution
ERROR: Error during SonarScanner execution
##[error]java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
##[error]at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
##[error]at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
##[error]at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
##[error]at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
##[error]at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
##[error]at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
##[error]at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
##[error]at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
##[error]at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
##[error]at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
##[error]at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
##[error]at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
##[error]at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
##[error]at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
##[error]at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
##[error]at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
##[error]at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
##[error]at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
##[error]at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:57)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:51)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
at org.sonarsource.scanner.cli.Main.main(Main.java:62)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
... 34 more
Caused by: Could not find the pullrequest with key '23429'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=[redacted]&pullrequestKey=23429 : {"errors":[{"msg":"Unable to find the pullrequest with key \u002723429\u0027"}]}
at org.sonarqube.ws.client.BaseResponse.failIfNotSuccessful(BaseResponse.java:22)
at org.sonar.scanner.bootstrap.DefaultScannerWsClient.failIfUnauthorized(DefaultScannerWsClient.java:88)
at org.sonar.scanner.bootstrap.DefaultScannerWsClient.call(DefaultScannerWsClient.java:61)
at com.sonarsource.branch.pr.PullRequestClient.getPullRequest(PullRequestClient.java:32)
at com.sonarsource.branch.PrBranchConfigurationBuilder.buildForBoundProject(PrBranchConfigurationBuilder.java:68)
at com.sonarsource.branch.PrBranchConfigurationBuilder.build(PrBranchConfigurationBuilder.java:56)
at com.sonarsource.branch.BranchConfigurationLoaderImpl.load(BranchConfigurationLoaderImpl.java:65)
at org.sonar.scanner.scan.branch.BranchConfigurationProvider.provide(BranchConfigurationProvider.java:33)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
at org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
at org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:57)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:51)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:57)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:51)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
at org.sonarsource.scanner.cli.Main.main(Main.java:62)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
... 34 more
Caused by: Could not find the pullrequest with key '23429'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=[redacted]&pullrequestKey=23429 : {"errors":[{"msg":"Unable to find the pullrequest with key \u002723429\u0027"}]}
at org.sonarqube.ws.client.BaseResponse.failIfNotSuccessful(BaseResponse.java:22)
at org.sonar.scanner.bootstrap.DefaultScannerWsClient.failIfUnauthorized(DefaultScannerWsClient.java:88)
at org.sonar.scanner.bootstrap.DefaultScannerWsClient.call(DefaultScannerWsClient.java:61)
at com.sonarsource.branch.pr.PullRequestClient.getPullRequest(PullRequestClient.java:32)
at com.sonarsource.branch.PrBranchConfigurationBuilder.buildForBoundProject(PrBranchConfigurationBuilder.java:68)
at com.sonarsource.branch.PrBranchConfigurationBuilder.build(PrBranchConfigurationBuilder.java:56)
at com.sonarsource.branch.BranchConfigurationLoaderImpl.load(BranchConfigurationLoaderImpl.java:65)
at org.sonar.scanner.scan.branch.BranchConfigurationProvider.provide(BranchConfigurationProvider.java:33)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
at org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
at org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:57)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:51)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:568)
##[error]at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
at org.sonarsource.scanner.cli.Main.main(Main.java:62)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
at org.sonarsource.scanner.cli.Main.main(Main.java:62)
Process returned exit code 1
##[error]The SonarScanner did not complete successfully
The SonarScanner did not complete successfully
##[error]  Post-processing failed. Exit code: 1
Post-processing failed. Exit code: 1
##[error]The process 'D:\a\_work\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe' failed with exit code 1
##[section]Finishing: Run Code Analysis

I have the same issue. Checked few of the previous post and still can’t fix this issue.

Issue is persisting after 48 hours. We’ve learned that the failure only happens when the build is an automatic pull request build (i.e. treated as a pull request by SonarCloud). Manual builds on the exact same commit and pipeline are treated as a branch analysis and don’t fail the “Run Code Analysis” task.

The failures occur across all our projects with servers and configurations that worked previously, so the evidence still suggests that SonarCloud is the issue here. Our SonarCloud organization can’t analyze pull requests.

The exact errors are:

java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
Caused by: Could not find the pullrequest with key '\<id\>'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=\<project name\>&pullrequestKey=\<id\> : {"errors":[{"msg":"Unable to find the pullrequest with key '\<id\>'"}]}

And here is a log from the “Prepare Analysis” task in a build where “Run Code Analysis” fails with the error above:

##[section]Starting: Prepare analysis on SonarCloud
 ==============================================================================
 Task         : Prepare Analysis Configuration
 Description  : Prepare SonarCloud analysis configuration
 Version      : 1.38.0
 Author       : sonarsource
 Help         : Version: 1.38.0. [More Information](https://docs.sonarcloud.io/advanced-setup/ci-based-analysis/sonarcloud-extension-for-azure-devops/)
 ==============================================================================
 [command]D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe begin /k:[redacted] /o:[redacted]
 SonarScanner for MSBuild 5.13
 Using the .NET Framework version of the Scanner for MSBuild
 Pre-processing started.
 Preparing working directories...
     Loading analysis properties from D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.38.0\classic-sonar-scanner-msbuild\SonarQube.Analysis.xml
     sonar.verbose=true was specified - setting the log verbosity to 'Debug'
   Updating build integration targets...
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\4.0\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\10.0\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\11.0\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\12.0\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\14.0\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\15.0\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.ImportBefore.targets to C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\Current\Microsoft.Common.targets\ImportBefore
   Installed SonarQube.Integration.targets to D:\a\1\.sonarqube\bin\targets
   Creating config and output folders...
   Creating directory: D:\a\1\.sonarqube\conf
   Creating directory: D:\a\1\.sonarqube\out
   Fetching server version...
   Downloading from https://sonarcloud.io/api/server/version...
   Response received from https://sonarcloud.io/api/server/version...
   SonarCloud detected, skipping license check.
   Fetching analysis configuration settings...
   Fetching properties for project '[redacted]'...
   Downloading from https://sonarcloud.io/api/settings/values?component=[redacted]...
   Response received from https://sonarcloud.io/api/settings/values?component=[redacted]...
   Downloading from https://sonarcloud.io/api/languages/list...
   Response received from https://sonarcloud.io/api/languages/list...
   Fetching quality profile for project '[redacted]'...
   Downloading from https://sonarcloud.io/api/qualityprofiles/search?project=[redacted]&organization=[redacted]...
   Response received from https://sonarcloud.io/api/qualityprofiles/search?project=[redacted]&organization=[redacted]...
   Fetching rules for quality profile 'AYaZSOeZeYp02ftosHqR'...
   Downloading from https://sonarcloud.io/api/rules/search?f=repo,name,severity,lang,internalKey,templateKey,params,actives&ps=500&qprofile=AYaZSOeZeYp02ftosHqR&p=1...
   Response received from https://sonarcloud.io/api/rules/search?f=repo,name,severity,lang,internalKey,templateKey,params,actives&ps=500&qprofile=AYaZSOeZeYp02ftosHqR&p=1...
   Local analyzer cache: C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources
   Writing Roslyn generated ruleset to D:\a\1\.sonarqube\conf\Sonar-cs.ruleset...
   Writing Roslyn generated ruleset to D:\a\1\.sonarqube\conf\Sonar-cs-none.ruleset...
   Provisioning analyzer assemblies for cs...
   Installing required Roslyn analyzers...
   Processing plugin: csharp version 9.8.0.76515
   Cache miss: plugin files were not found in the local cache
   Fetching resource for plugin: csharp, version 9.8.0.76515. Resource: SonarAnalyzer-9.8.0.76515.zip
   Downloading SonarAnalyzer-9.8.0.76515.zip to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\0
   Downloading file to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\0\SonarAnalyzer-9.8.0.76515.zip...
   Downloading from https://sonarcloud.io/static/csharp/SonarAnalyzer-9.8.0.76515.zip...
   Response received from https://sonarcloud.io/static/csharp/SonarAnalyzer-9.8.0.76515.zip...
   Extracting files to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\0...
   Processing plugin: vbnet version 9.8.0.76515
   Cache miss: plugin files were not found in the local cache
   Fetching resource for plugin: vbnet, version 9.8.0.76515. Resource: SonarAnalyzer-9.8.0.76515.zip
   Downloading SonarAnalyzer-9.8.0.76515.zip to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\1
   Downloading file to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\1\SonarAnalyzer-9.8.0.76515.zip...
   Downloading from https://sonarcloud.io/static/vbnet/SonarAnalyzer-9.8.0.76515.zip...
   Response received from https://sonarcloud.io/static/vbnet/SonarAnalyzer-9.8.0.76515.zip...
   Extracting files to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\1...
   Processing plugin: securitycsharpfrontend version 10.2.0.22608
   Cache miss: plugin files were not found in the local cache
   Fetching resource for plugin: securitycsharpfrontend, version 10.2.0.22608. Resource: SonarAnalyzer.Security-10.2.0.22608.zip
   Downloading SonarAnalyzer.Security-10.2.0.22608.zip to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\2
   Downloading file to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\2\SonarAnalyzer.Security-10.2.0.22608.zip...
   Downloading from https://sonarcloud.io/static/securitycsharpfrontend/SonarAnalyzer.Security-10.2.0.22608.zip...
   Response received from https://sonarcloud.io/static/securitycsharpfrontend/SonarAnalyzer.Security-10.2.0.22608.zip...
   Extracting files to C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\2...
   Writing Roslyn analyzer additional file to D:\a\1\.sonarqube\conf\cs\SonarLint.xml...
   Fetching quality profile for project '[redacted]'...
   Downloading from https://sonarcloud.io/api/qualityprofiles/search?project=[redacted]&organization=[redacted]...
   Response received from https://sonarcloud.io/api/qualityprofiles/search?project=[redacted]&organization=[redacted]...
   Fetching rules for quality profile 'AYaZSOeZeYp02ftosHqk'...
   Downloading from https://sonarcloud.io/api/rules/search?f=repo,name,severity,lang,internalKey,templateKey,params,actives&ps=500&qprofile=AYaZSOeZeYp02ftosHqk&p=1...
   Response received from https://sonarcloud.io/api/rules/search?f=repo,name,severity,lang,internalKey,templateKey,params,actives&ps=500&qprofile=AYaZSOeZeYp02ftosHqk&p=1...
   Local analyzer cache: C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources
   Writing Roslyn generated ruleset to D:\a\1\.sonarqube\conf\Sonar-vbnet.ruleset...
   Writing Roslyn generated ruleset to D:\a\1\.sonarqube\conf\Sonar-vbnet-none.ruleset...
   Provisioning analyzer assemblies for vbnet...
   Installing required Roslyn analyzers...
   Processing plugin: csharp version 9.8.0.76515
   Cache hit: using plugin files from C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\0
   Processing plugin: vbnet version 9.8.0.76515
   Cache hit: using plugin files from C:\Users\VssAdministrator\AppData\Local\Temp\.sonarqube\resources\1
   Writing Roslyn analyzer additional file to D:\a\1\.sonarqube\conf\vbnet\SonarLint.xml...
   Processing analysis cache
   Fetching properties for project '[redacted]:Releases/R-6.6.0.1'...
   Downloading from https://sonarcloud.io/api/settings/values?component=[redacted]%3AReleases%2FR-6.6.0.1...
   Response received from https://sonarcloud.io/api/settings/values?component=[redacted]:Releases%2FR-6.6.0.1...
   No settings for project [redacted]:Releases/R-6.6.0.1. Getting global settings...
   Downloading from https://sonarcloud.io/api/settings/values...
   Response received from https://sonarcloud.io/api/settings/values...
   Downloading cache. Project key: [redacted], branch: Releases/R-6.6.0.1.
   Incremental PR Analysis: Requesting 'prepare_read' from https://ea6ne4j2sb.execute-api.eu-central-1.amazonaws.com/current/v1/sensor_cache/prepare_read?organization=[redacted]&project=[redacted]&branch=Releases%2FR-6.6.0.1
   Incremental PR analysis: an error occurred while retrieving the cache entries! 'prepare_read' response: { Enabled = False, Url =  }.
   Cache data is empty. A full analysis will be performed.
   Pre-processing succeeded.
 ##[section]Finishing: Prepare analysis on SonarCloud

We found the solution in a thread that didn’t come up in our initial search: Could not find pullrequest with key ‘’ - SonarQube - Sonar Community (sonarsource.com)

For posterity, the gist is that:

  • Azure DevOps has both a service connection to SonarCloud and an organization-level connection from SonarCloud back to Azure DevOps that requires a personal access token. These are separate connections and both must be valid.
  • In our case, the service connection was valid, but our personal access token for the return connection somehow became invalidated 4 months before its expiry. Not sure how.
  • The organization-level connection was failing silently: this error wasn’t reflected in the builds or alerted to us through an email. It also didn’t affect non-pull request analysis.

Fixing the personal access token at the organization-level connection resolved our issue.

2 Likes

This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.

Hi @MatthewR, are you referring to the PAT generated by Azure?
I experienced something similar while updating a Sonar-Azure DevOps tutorial and came across this Community thread today.

In my scenario, the Azure PAT stopped working after 30 days without an Azure login.

  • Is there a chance that no user logged into your Azure DevOps for a while?