Could not find the pullrequest with key '1387' when trying to get started with sonarcloud and gitlab

Hi @TomVanBraband

Thanks for the response, actually I opened a bug with a bit more info (which got moved here as well maybe you can close or merge it with this one? Could not find the pullrequest with key β€˜1387’ when trying to get started with sonarcloud and gitlab)

But to confirm yes the MR exists, and the personal access token is from an owner for the org so he should have access! :smiley:

Yesterday I have made a bit more progress in narrowing down the issue. I tried on another one of our smaller projects and managed to get it working - however it has a much simpler pipeline.

What I have found is:
On the project that doesn’t work our MR’s always have two pipelines triggered, this is due to the different requirements we have for branch builds vs MR builds and some quirks in gitlabs behavior here. So we have:

  • one pipeline for the MR which is detached (where sonarcloud runs and fails to find the pull request)
  • one for the branch (sonar job is not part of this one, but I enabled sonar to test it out and it ran successfully as a branch analysis not MR analysis )

It seems to affect sonarclouds ability to find the merge request, I’ve included the debug logs, job and sonarproperies below:

$ sonar-scanner -X
08:39:52.549 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
08:39:52.551 INFO: Project root configuration file: /builds/b3i/codex1/ui/sonar-project.properties
08:39:52.575 INFO: SonarScanner 4.6.2.2472
08:39:52.575 INFO: Java 11.0.11 AdoptOpenJDK (64-bit)
08:39:52.575 INFO: Linux 5.4.0-1035-azure amd64
08:39:52.686 DEBUG: keyStore is : 
08:39:52.686 DEBUG: keyStore type is : pkcs12
08:39:52.686 DEBUG: keyStore provider is : 
08:39:52.686 DEBUG: init keystore
08:39:52.687 DEBUG: init keymanager of type SunX509
08:39:52.782 DEBUG: Create: /builds/b3i/codex1/ui/.sonar/cache
08:39:52.783 INFO: User cache: /builds/b3i/codex1/ui/.sonar/cache
08:39:52.783 DEBUG: Create: /builds/b3i/codex1/ui/.sonar/cache/_tmp
08:39:52.784 DEBUG: Extract sonar-scanner-api-batch in temp...
08:39:52.787 DEBUG: Get bootstrap index...
08:39:52.787 DEBUG: Download: https://sonarcloud.io/batch/index
08:39:53.043 DEBUG: Get bootstrap completed
08:39:53.046 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.21121-all.jar to /builds/b3i/codex1/ui/.sonar/cache/_tmp/fileCache1465031373231494925.tmp
08:39:53.555 DEBUG: Create isolated classloader...
08:39:53.562 DEBUG: Start temp cleaning...
08:39:53.564 DEBUG: Temp cleaning done
08:39:53.565 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
08:39:53.565 INFO: Project root configuration file: /builds/b3i/codex1/ui/sonar-project.properties
08:39:53.566 DEBUG: Execution getVersion
08:39:53.576 INFO: Analyzing on SonarQube server 8.8.0
08:39:53.576 INFO: Default locale: "en_US", source code encoding: "UTF-8"
08:39:53.577 DEBUG: Work directory: /builds/b3i/codex1/ui/.scannerwork
08:39:53.577 DEBUG: Execution execute
08:39:53.742 DEBUG: SonarCloud 8.8.0.42792
08:39:53.906 INFO: Load global settings
08:39:54.056 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=149ms
08:39:54.062 INFO: Load global settings (done) | time=156ms
08:39:54.065 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
08:39:54.068 DEBUG: Create : /builds/b3i/codex1/ui/.sonar/_tmp
08:39:54.069 INFO: User cache: /builds/b3i/codex1/ui/.sonar/cache
08:39:54.072 INFO: Load/download plugins
08:39:54.072 INFO: Load plugins index
08:39:54.089 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=17ms
08:39:54.119 INFO: Load plugins index (done) | time=47ms
08:39:54.210 DEBUG: Download plugin 'license' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache13451112217967765916.tmp'
08:39:54.226 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=16ms
08:39:54.230 DEBUG: Unpacking plugin license
08:39:54.290 INFO: Load/download plugins (done) | time=218ms
08:39:54.382 DEBUG: Plugins:
08:39:54.382 DEBUG:   * CSS Code Quality and Security 1.4.2.2002 (cssfamily)
08:39:54.382 DEBUG:   * PL/SQL Code Quality and Security 3.6.1.3873 (plsql)
08:39:54.382 DEBUG:   * Scala Code Quality and Security 1.8.3.2219 (sonarscala)
08:39:54.382 DEBUG:   * C# Code Quality and Security 8.24.0.32949 (csharp)
08:39:54.383 DEBUG:   * Vulnerability Analysis 9.0.0-M1.12247 (security)
08:39:54.383 DEBUG:   * Java Code Quality and Security 7.0.0.26422 (java)
08:39:54.383 DEBUG:   * HTML Code Quality and Security 3.4.0.2754 (web)
08:39:54.383 DEBUG:   * Flex Code Quality and Security 2.6.1.2564 (flex)
08:39:54.383 DEBUG:   * XML Code Quality and Security 2.2.0.2973 (xml)
08:39:54.383 DEBUG:   * VB.NET Code Quality and Security 8.24.0.32949 (vbnet)
08:39:54.383 DEBUG:   * Swift Code Quality and Security 4.3.1.4892 (swift)
08:39:54.383 DEBUG:   * CFamily Code Quality and Security 6.21.0.32709 (cpp)
08:39:54.383 DEBUG:   * Python Code Quality and Security 3.5.0.8244 (python)
08:39:54.383 DEBUG:   * Go Code Quality and Security 1.8.3.2219 (go)
08:39:54.383 DEBUG:   * JaCoCo 1.1.1.1157 (jacoco)
08:39:54.383 DEBUG:   * Kotlin Code Quality and Security 1.8.3.2219 (kotlin)
08:39:54.383 DEBUG:   * Mercurial 1.1.2 (scmmercurial)
08:39:54.384 DEBUG:   * T-SQL Code Quality and Security 1.5.1.4340 (tsql)
08:39:54.384 DEBUG:   * Apex Code Quality and Security 1.8.3.2219 (sonarapex)
08:39:54.384 DEBUG:   * JavaScript/TypeScript Code Quality and Security 8.0.0.15689 (javascript)
08:39:54.384 DEBUG:   * Ruby Code Quality and Security 1.8.3.2219 (ruby)
08:39:54.384 DEBUG:   * Vulnerability Rules for C# 9.0.0-M1.12247 (securitycsharpfrontend)
08:39:54.384 DEBUG:   * Vulnerability Rules for Java 9.0.0-M1.12247 (securityjavafrontend)
08:39:54.384 DEBUG:   * License for SonarLint 8.0.0.21121 (license)
08:39:54.384 DEBUG:   * Vulnerability Rules for JS 9.0.0-M1.12247 (securityjsfrontend)
08:39:54.384 DEBUG:   * COBOL Code Quality 4.6.2.4876 (cobol)
08:39:54.384 DEBUG:   * Vulnerability Rules for Python 9.0.0-M1.12247 (securitypythonfrontend)
08:39:54.384 DEBUG:   * Git 1.12.1.2064 (scmgit)
08:39:54.384 DEBUG:   * PHP Code Quality and Security 3.17.0.7439 (php)
08:39:54.385 DEBUG:   * ABAP Code Quality and Security 3.9.1.3127 (abap)
08:39:54.385 DEBUG:   * Vulnerability Rules for PHP 9.0.0-M1.12247 (securityphpfrontend)
08:39:54.405 INFO: Loaded core extensions: developer-scanner
08:39:54.421 DEBUG: Installed core extension: developer-scanner
08:39:54.582 INFO: JavaScript/TypeScript frontend is enabled
08:39:54.711 INFO: Found an active CI vendor: 'Gitlab CI'
08:39:54.718 INFO: Load project settings for component key: 'b3i_codex1-ui'
08:39:54.747 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=b3i_codex1-ui | time=29ms
08:39:54.748 INFO: Load project settings for component key: 'b3i_codex1-ui' (done) | time=30ms
08:39:54.751 INFO: Process project properties
08:39:54.757 DEBUG: Process project properties (done) | time=6ms
08:39:54.757 INFO: Execute project builders
08:39:54.757 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
08:39:54.758 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
08:39:54.758 INFO: Execute project builders (done) | time=1ms
08:39:54.760 INFO: Project key: b3i_codex1-ui
08:39:54.760 INFO: Base dir: /builds/b3i/codex1/ui
08:39:54.760 INFO: Working dir: /builds/b3i/codex1/ui/.scannerwork
08:39:54.760 DEBUG: Project global encoding: UTF-8, default locale: en_US
08:39:54.761 DEBUG: Creating module hierarchy
08:39:54.762 DEBUG:   Init module 'b3i_codex1-ui'
08:39:54.762 DEBUG:     Base dir: /builds/b3i/codex1/ui
08:39:54.762 DEBUG:     Working dir: /builds/b3i/codex1/ui/.scannerwork
08:39:54.762 DEBUG:     Module global encoding: UTF-8, default locale: en_US
08:39:54.873 INFO: Load project branches
08:39:54.895 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=b3i_codex1-ui | time=21ms
08:39:54.899 INFO: Load project branches (done) | time=26ms
08:39:54.902 INFO: Check ALM binding of project 'b3i_codex1-ui'
08:39:54.918 DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=b3i_codex1-ui | time=16ms
08:39:54.920 INFO: Detected project binding: BOUND
08:39:54.920 INFO: Check ALM binding of project 'b3i_codex1-ui' (done) | time=18ms
08:39:54.921 INFO: Load project pull requests
08:39:54.934 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=b3i_codex1-ui | time=12ms
08:39:54.937 INFO: Load project pull requests (done) | time=16ms
08:39:54.938 INFO: Load branch configuration
08:39:54.940 INFO: Auto-configuring pull request 1387
08:39:55.550 DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=b3i_codex1-ui&pullrequestKey=1387 | time=609ms
08:39:55.556 INFO: ------------------------------------------------------------------------
08:39:55.556 INFO: EXECUTION FAILURE
08:39:55.556 INFO: ------------------------------------------------------------------------
08:39:55.557 INFO: Total time: 3.013s
08:39:55.577 ERROR: Error during SonarScanner execution
08:39:55.576 INFO: Final Memory: 6M/34M
08:39:55.576 INFO: ------------------------------------------------------------------------
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	... 34 more
Caused by: Could not find the pullrequest with key '1387'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=b3i_codex1-ui&pullrequestKey=1387 : {"errors":[{"msg":"Unable to find the pullrequest with key '1387'"}]}
	at org.sonarqube.ws.client.BaseResponse.failIfNotSuccessful(BaseResponse.java:22)
	at org.sonar.scanner.bootstrap.DefaultScannerWsClient.failIfUnauthorized(DefaultScannerWsClient.java:98)
	at org.sonar.scanner.bootstrap.DefaultScannerWsClient.call(DefaultScannerWsClient.java:61)
	at com.sonarsource.branch.pr.PullRequestClient.getPullRequest(PullRequestClient.java:32)
	at com.sonarsource.branch.PrBranchConfigurationBuilder.buildForBoundProject(PrBranchConfigurationBuilder.java:68)
	at com.sonarsource.branch.PrBranchConfigurationBuilder.build(PrBranchConfigurationBuilder.java:56)
	at com.sonarsource.branch.BranchConfigurationLoaderImpl.load(BranchConfigurationLoaderImpl.java:65)
	at org.sonar.scanner.scan.branch.BranchConfigurationProvider.provide(BranchConfigurationProvider.java:33)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
	at org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
	at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
	at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
	at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
	at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
ERROR: Job failed: command terminated with exit code 1
sonarcloud-check:
  stage: sonar
  variables:
    SONAR_USER_HOME: "${CI_PROJECT_DIR}/.sonar" # Defines the location of the analysis task cache
    GIT_DEPTH: "0" # Tells git to fetch all the branches of the project, required by the analysis task
  image:
    name: sonarsource/sonar-scanner-cli:latest
    entrypoint: [ "" ]
  cache:
    key: "${CI_JOB_NAME}"
    paths:
      - .sonar/cache
  script:
    - sonar-scanner -X
  allow_failure: true
  dependencies:
    - build
  rules:
    - if: $CI_COMMIT_BRANCH == 'master' # Execute jobs when a new commit is pushed to master branch
    - if: $CI_MERGE_REQUEST_ID # Execute jobs in merge request context
sonar.projectKey=b3i_codex1-ui
sonar.organization=b3i

# This is the name and version displayed in the SonarCloud UI.
#sonar.projectName=codex1-ui
#sonar.projectVersion=1.0

# Path is relative to the sonar-project.properties file. Replace "\" by "/" on Windows.
sonar.sources=./src
sonar.exclusions=**/node_modules/**, **/coverage/**, **/build/**, **/dist/**
sonar.tests=./src
sonar.test.inclusions=**/*.spec.ts
sonar.javascript.lcov.reportPaths=reports/coverage/lcov.info
sonar.eslint.reportPaths=./reports/eslint-results.json
sonar.testExecutionReportPaths=./reports/report.xml

#
sonar.qualitygate.wait=true

# Encoding of the source code. Default is default system encoding
sonar.sourceEncoding=UTF-8

Any ideas on what we can do here? Can I provide any more information?