Could not find the pullrequest with key ‘1387’ when trying to get started with sonarcloud and gitlab

Hi

We are trying to get started with a trial of sonarcloud developer edition integrated with gitlab but after going through the setup guide (https://sonarcloud.io/documentation/getting-started/gitlab/ ) the scanner is unable to run on the project due to a 404 error, which given we have followed all of the instructions I think must be a bug.

  • ALM used: Gitlab
  • CI system used: Gitlab
  • Languages of the repository (Typescript/kotlin)

error:

$ sonar-scanner -X
13:41:05.609 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
13:41:05.610 INFO: Project root configuration file: /builds/b3i/codex1/ui/sonar-project.properties
13:41:05.635 INFO: SonarScanner 4.6.2.2472
13:41:05.635 INFO: Java 11.0.11 AdoptOpenJDK (64-bit)
13:41:05.635 INFO: Linux 5.4.0-1035-azure amd64
13:41:05.754 DEBUG: keyStore is : 
13:41:05.754 DEBUG: keyStore type is : pkcs12
13:41:05.754 DEBUG: keyStore provider is : 
13:41:05.754 DEBUG: init keystore
13:41:05.755 DEBUG: init keymanager of type SunX509
13:41:05.844 DEBUG: Create: /builds/b3i/codex1/ui/.sonar/cache
13:41:05.844 INFO: User cache: /builds/b3i/codex1/ui/.sonar/cache
13:41:05.844 DEBUG: Create: /builds/b3i/codex1/ui/.sonar/cache/_tmp
13:41:05.846 DEBUG: Extract sonar-scanner-api-batch in temp...
13:41:05.848 DEBUG: Get bootstrap index...
13:41:05.848 DEBUG: Download: https://sonarcloud.io/batch/index
13:41:06.166 DEBUG: Get bootstrap completed
13:41:06.169 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.20946-all.jar to /builds/b3i/codex1/ui/.sonar/cache/_tmp/fileCache10377739310756827385.tmp
13:41:06.668 DEBUG: Create isolated classloader...
13:41:06.674 DEBUG: Start temp cleaning...
13:41:06.677 DEBUG: Temp cleaning done
13:41:06.677 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
13:41:06.677 INFO: Project root configuration file: /builds/b3i/codex1/ui/sonar-project.properties
13:41:06.678 DEBUG: Execution getVersion
13:41:06.689 INFO: Analyzing on SonarQube server 8.8.0
13:41:06.689 INFO: Default locale: "en_US", source code encoding: "UTF-8"
13:41:06.690 DEBUG: Work directory: /builds/b3i/codex1/ui/.scannerwork
13:41:06.690 DEBUG: Execution execute
13:41:06.869 DEBUG: SonarCloud 8.8.0.42792
13:41:07.038 INFO: Load global settings
13:41:07.173 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=134ms
13:41:07.179 INFO: Load global settings (done) | time=141ms
13:41:07.183 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
13:41:07.186 DEBUG: Create : /builds/b3i/codex1/ui/.sonar/_tmp
13:41:07.186 INFO: User cache: /builds/b3i/codex1/ui/.sonar/cache
13:41:07.188 INFO: Load/download plugins
13:41:07.189 INFO: Load plugins index
13:41:07.206 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=17ms
13:41:07.232 INFO: Load plugins index (done) | time=43ms
13:41:07.233 DEBUG: Download plugin 'abap' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache5056586452749402623.tmp'
13:41:07.247 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=14ms
13:41:07.289 DEBUG: Unpacking plugin abap
13:41:07.483 DEBUG: Download plugin 'sonarapex' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache17001115450613573680.tmp'
13:41:07.495 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=12ms
13:41:07.514 DEBUG: Unpacking plugin sonarapex
13:41:07.847 DEBUG: Download plugin 'csharp' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache5444335772178678174.tmp'
13:41:07.862 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=14ms
13:41:07.895 DEBUG: Unpacking plugin csharp
13:41:08.275 DEBUG: Download plugin 'cpp' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache11512730728495062421.tmp'
13:41:08.290 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=15ms
13:41:08.564 DEBUG: Unpacking plugin cpp
13:41:09.606 DEBUG: Download plugin 'cobol' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache11888526139794819465.tmp'
13:41:09.621 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=15ms
13:41:09.628 DEBUG: Unpacking plugin cobol
13:41:09.943 DEBUG: Download plugin 'cssfamily' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache14456047318318536238.tmp'
13:41:09.956 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=13ms
13:41:10.006 DEBUG: Unpacking plugin cssfamily
13:41:10.433 DEBUG: Download plugin 'flex' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache2812612628628514527.tmp'
13:41:10.446 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=13ms
13:41:10.449 DEBUG: Unpacking plugin flex
13:41:10.588 DEBUG: Download plugin 'scmgit' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache15416828710867002544.tmp'
13:41:10.602 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=13ms
13:41:10.608 DEBUG: Unpacking plugin scmgit
13:41:10.874 DEBUG: Download plugin 'go' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache2919145428843384123.tmp'
13:41:10.887 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=12ms
13:41:10.931 DEBUG: Unpacking plugin go
13:41:11.560 DEBUG: Download plugin 'web' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache8319453320488165562.tmp'
13:41:11.577 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=17ms
13:41:11.579 DEBUG: Unpacking plugin web
13:41:11.648 DEBUG: Download plugin 'jacoco' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache4237289074091530652.tmp'
13:41:11.665 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=17ms
13:41:11.666 DEBUG: Unpacking plugin jacoco
13:41:11.669 DEBUG: Download plugin 'java' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache6639985395335361440.tmp'
13:41:11.687 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=18ms
13:41:11.720 DEBUG: Unpacking plugin java
13:41:13.418 DEBUG: Download plugin 'javascript' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache17726262645668672413.tmp'
13:41:13.432 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=14ms
13:41:13.704 DEBUG: Unpacking plugin javascript
13:41:14.500 DEBUG: Download plugin 'kotlin' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache4934003990730209821.tmp'
13:41:14.513 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=12ms
13:41:14.567 DEBUG: Unpacking plugin kotlin
13:41:15.513 DEBUG: Download plugin 'license' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache1023932401715180087.tmp'
13:41:15.527 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=14ms
13:41:15.529 DEBUG: Unpacking plugin license
13:41:15.531 DEBUG: Download plugin 'scmmercurial' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache1436638360361795344.tmp'
13:41:15.544 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=13ms
13:41:15.545 DEBUG: Unpacking plugin scmmercurial
13:41:15.548 DEBUG: Download plugin 'php' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache8765175347717993285.tmp'
13:41:15.561 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=12ms
13:41:15.568 DEBUG: Unpacking plugin php
13:41:15.993 DEBUG: Download plugin 'plsql' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache8516654497116042500.tmp'
13:41:16.005 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=12ms
13:41:16.010 DEBUG: Unpacking plugin plsql
13:41:16.205 DEBUG: Download plugin 'python' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache15089496446446898043.tmp'
13:41:16.220 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=15ms
13:41:16.229 DEBUG: Unpacking plugin python
13:41:16.621 DEBUG: Download plugin 'ruby' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache5982356892934202070.tmp'
13:41:16.633 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=12ms
13:41:16.659 DEBUG: Unpacking plugin ruby
13:41:17.882 DEBUG: Download plugin 'sonarscala' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache13945183220825817964.tmp'
13:41:17.896 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=14ms
13:41:17.959 DEBUG: Unpacking plugin sonarscala
13:41:19.069 DEBUG: Download plugin 'swift' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache16969872377503668978.tmp'
13:41:19.082 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=13ms
13:41:19.086 DEBUG: Unpacking plugin swift
13:41:19.208 DEBUG: Download plugin 'tsql' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache4007033921885339252.tmp'
13:41:19.220 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=12ms
13:41:19.224 DEBUG: Unpacking plugin tsql
13:41:19.406 DEBUG: Download plugin 'vbnet' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache5823486423825416265.tmp'
13:41:19.417 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=11ms
13:41:19.426 DEBUG: Unpacking plugin vbnet
13:41:19.739 DEBUG: Download plugin 'security' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache14951236530386076211.tmp'
13:41:19.753 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=14ms
13:41:19.763 DEBUG: Unpacking plugin security
13:41:20.014 DEBUG: Download plugin 'securitycsharpfrontend' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache15602448062972686114.tmp'
13:41:20.025 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=11ms
13:41:20.031 DEBUG: Unpacking plugin securitycsharpfrontend
13:41:20.060 DEBUG: Download plugin 'securityjsfrontend' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache10638238828074129973.tmp'
13:41:20.074 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjsfrontend&acceptCompressions=pack200 | time=14ms
13:41:20.076 DEBUG: Unpacking plugin securityjsfrontend
13:41:20.088 DEBUG: Download plugin 'securityjavafrontend' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache4740751854189108833.tmp'
13:41:20.118 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=30ms
13:41:20.171 DEBUG: Unpacking plugin securityjavafrontend
13:41:20.480 DEBUG: Download plugin 'securityphpfrontend' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache11441856388252933358.tmp'
13:41:20.494 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=14ms
13:41:20.509 DEBUG: Unpacking plugin securityphpfrontend
13:41:20.602 DEBUG: Download plugin 'securitypythonfrontend' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache17731141942449040162.tmp'
13:41:20.615 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitypythonfrontend&acceptCompressions=pack200 | time=13ms
13:41:20.630 DEBUG: Unpacking plugin securitypythonfrontend
13:41:20.722 DEBUG: Download plugin 'xml' to '/builds/b3i/codex1/ui/.sonar/_tmp/fileCache8709985269794254934.tmp'
13:41:20.734 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=11ms
13:41:20.738 DEBUG: Unpacking plugin xml
13:41:20.934 INFO: Load/download plugins (done) | time=13746ms
13:41:21.148 DEBUG: Plugins:
13:41:21.148 DEBUG:   * CSS Code Quality and Security 1.4.2.2002 (cssfamily)
13:41:21.148 DEBUG:   * PL/SQL Code Quality and Security 3.6.1.3873 (plsql)
13:41:21.148 DEBUG:   * Scala Code Quality and Security 1.8.3.2219 (sonarscala)
13:41:21.148 DEBUG:   * C# Code Quality and Security 8.24.0.32949 (csharp)
13:41:21.148 DEBUG:   * Vulnerability Analysis 9.0.0-M1.12247 (security)
13:41:21.148 DEBUG:   * Java Code Quality and Security 7.0.0.26422 (java)
13:41:21.148 DEBUG:   * HTML Code Quality and Security 3.4.0.2754 (web)
13:41:21.149 DEBUG:   * Flex Code Quality and Security 2.6.1.2564 (flex)
13:41:21.149 DEBUG:   * XML Code Quality and Security 2.2.0.2973 (xml)
13:41:21.149 DEBUG:   * VB.NET Code Quality and Security 8.24.0.32949 (vbnet)
13:41:21.149 DEBUG:   * Swift Code Quality and Security 4.3.1.4892 (swift)
13:41:21.149 DEBUG:   * CFamily Code Quality and Security 6.21.0.32709 (cpp)
13:41:21.149 DEBUG:   * Python Code Quality and Security 3.5.0.8244 (python)
13:41:21.149 DEBUG:   * Go Code Quality and Security 1.8.3.2219 (go)
13:41:21.149 DEBUG:   * JaCoCo 1.1.1.1157 (jacoco)
13:41:21.149 DEBUG:   * Kotlin Code Quality and Security 1.8.3.2219 (kotlin)
13:41:21.149 DEBUG:   * Mercurial 1.1.2 (scmmercurial)
13:41:21.149 DEBUG:   * T-SQL Code Quality and Security 1.5.1.4340 (tsql)
13:41:21.149 DEBUG:   * Apex Code Quality and Security 1.8.3.2219 (sonarapex)
13:41:21.149 DEBUG:   * JavaScript/TypeScript Code Quality and Security 8.0.0.15689 (javascript)
13:41:21.149 DEBUG:   * Ruby Code Quality and Security 1.8.3.2219 (ruby)
13:41:21.149 DEBUG:   * Vulnerability Rules for C# 9.0.0-M1.12247 (securitycsharpfrontend)
13:41:21.149 DEBUG:   * Vulnerability Rules for Java 9.0.0-M1.12247 (securityjavafrontend)
13:41:21.150 DEBUG:   * License for SonarLint 8.0.0.20946 (license)
13:41:21.150 DEBUG:   * Vulnerability Rules for JS 9.0.0-M1.12247 (securityjsfrontend)
13:41:21.150 DEBUG:   * COBOL Code Quality 4.6.2.4876 (cobol)
13:41:21.150 DEBUG:   * Vulnerability Rules for Python 9.0.0-M1.12247 (securitypythonfrontend)
13:41:21.150 DEBUG:   * Git 1.12.1.2064 (scmgit)
13:41:21.150 DEBUG:   * PHP Code Quality and Security 3.17.0.7439 (php)
13:41:21.150 DEBUG:   * ABAP Code Quality and Security 3.9.1.3127 (abap)
13:41:21.150 DEBUG:   * Vulnerability Rules for PHP 9.0.0-M1.12247 (securityphpfrontend)
13:41:21.183 INFO: Loaded core extensions: developer-scanner
13:41:21.202 DEBUG: Installed core extension: developer-scanner
13:41:21.395 INFO: JavaScript/TypeScript frontend is enabled
13:41:21.519 INFO: Found an active CI vendor: 'Gitlab CI'
13:41:21.526 INFO: Load project settings for component key: 'b3i_codex1-ui'
13:41:21.553 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=b3i_codex1-ui | time=27ms
13:41:21.554 INFO: Load project settings for component key: 'b3i_codex1-ui' (done) | time=28ms
13:41:21.558 INFO: Process project properties
13:41:21.563 DEBUG: Process project properties (done) | time=5ms
13:41:21.564 INFO: Execute project builders
13:41:21.564 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
13:41:21.564 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
13:41:21.565 INFO: Execute project builders (done) | time=1ms
13:41:21.566 INFO: Project key: b3i_codex1-ui
13:41:21.566 INFO: Base dir: /builds/b3i/codex1/ui
13:41:21.566 INFO: Working dir: /builds/b3i/codex1/ui/.scannerwork
13:41:21.566 DEBUG: Project global encoding: UTF-8, default locale: en_US
13:41:21.567 DEBUG: Creating module hierarchy
13:41:21.567 DEBUG:   Init module 'b3i_codex1-ui'
13:41:21.568 DEBUG:     Base dir: /builds/b3i/codex1/ui
13:41:21.568 DEBUG:     Working dir: /builds/b3i/codex1/ui/.scannerwork
13:41:21.568 DEBUG:     Module global encoding: UTF-8, default locale: en_US
13:41:21.668 INFO: Load project branches
13:41:21.687 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=b3i_codex1-ui | time=19ms
13:41:21.691 INFO: Load project branches (done) | time=23ms
13:41:21.693 INFO: Check ALM binding of project 'b3i_codex1-ui'
13:41:21.707 DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=b3i_codex1-ui | time=14ms
13:41:21.708 INFO: Detected project binding: BOUND
13:41:21.708 INFO: Check ALM binding of project 'b3i_codex1-ui' (done) | time=15ms
13:41:21.710 INFO: Load project pull requests
13:41:21.729 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=b3i_codex1-ui | time=19ms
13:41:21.732 INFO: Load project pull requests (done) | time=22ms
13:41:21.733 INFO: Load branch configuration
13:41:21.735 INFO: Auto-configuring pull request 1387
13:41:22.035 DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=b3i_codex1-ui&pullrequestKey=1387 | time=299ms
13:41:22.041 INFO: ------------------------------------------------------------------------
13:41:22.041 INFO: EXECUTION FAILURE
13:41:22.041 INFO: ------------------------------------------------------------------------
13:41:22.041 INFO: Total time: 16.439s
13:41:22.062 INFO: Final Memory: 6M/34M
13:41:22.062 INFO: ------------------------------------------------------------------------
13:41:22.062 ERROR: Error during SonarScanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	... 34 more
Caused by: Could not find the pullrequest with key '1387'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=b3i_codex1-ui&pullrequestKey=1387 : {"errors":[{"msg":"Unable to find the pullrequest with key '1387'"}]}
	at org.sonarqube.ws.client.BaseResponse.failIfNotSuccessful(BaseResponse.java:22)
	at org.sonar.scanner.bootstrap.DefaultScannerWsClient.failIfUnauthorized(DefaultScannerWsClient.java:98)
	at org.sonar.scanner.bootstrap.DefaultScannerWsClient.call(DefaultScannerWsClient.java:61)
	at com.sonarsource.branch.pr.PullRequestClient.getPullRequest(PullRequestClient.java:32)
	at com.sonarsource.branch.PrBranchConfigurationBuilder.buildForBoundProject(PrBranchConfigurationBuilder.java:68)
	at com.sonarsource.branch.PrBranchConfigurationBuilder.build(PrBranchConfigurationBuilder.java:56)
	at com.sonarsource.branch.BranchConfigurationLoaderImpl.load(BranchConfigurationLoaderImpl.java:65)
	at org.sonar.scanner.scan.branch.BranchConfigurationProvider.provide(BranchConfigurationProvider.java:33)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
	at org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
	at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
	at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
	at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
	at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
  • Steps to reproduce
  1. https://sonarcloud.io/documentation/getting-started/gitlab/ go through this guide to setup gitlab and sonarcloud, following the on screen instructions.
  2. once everything is setup, created an MR on gitlab (adding the sonar-properties file and pipeline step)
  3. observer the error:

I’ve been through several similar looking questions on the forums here and made sure that the organization and project is bound to gitlab, also ensured that the SONAR_TOKEN & URL is setup on gitlab and the personal access token is filled in. Now we are quite stuck and unsure how to proceed.

Can someone please help? I’ve included our pipeline and sonar properties files below:

sonarcloud-check:
  stage: sonar
  variables:
    SONAR_USER_HOME: '${CI_PROJECT_DIR}/.sonar' # Defines the location of the analysis task cache
    GIT_DEPTH: '0' # Tells git to fetch all the branches of the project, required by the analysis task
  image:
    name: sonarsource/sonar-scanner-cli:latest
    entrypoint: ['']
  cache:
    key: '${CI_JOB_NAME}'
    paths:
      - .sonar/cache
  script:
    - sonar-scanner -X
  only:
    - merge_requests
    - master
    - develop
sonar.projectKey=b3i_codex1-ui
sonar.organization=b3i

# This is the name and version displayed in the SonarCloud UI.
#sonar.projectName=codex1-ui
#sonar.projectVersion=1.0

# Path is relative to the sonar-project.properties file. Replace "\" by "/" on Windows.
sonar.sources=./src
sonar.exclusions=**/node_modules/**, **/coverage/**, **/build/**, **/dist/**
sonar.tests=./src
sonar.test.inclusions=**/*.spec.ts
sonar.javascript.lcov.reportPaths=reports/coverage/lcov.info
sonar.typescript.tslint.reportPaths=eslint-results.json
sonar.testExecutionReportPaths=./reports/report.xml

# Encoding of the source code. Default is default system encoding
sonar.sourceEncoding=UTF-8

Closing this one as a duplicate of Could not find the pullrequest with key '1387' when trying to get started with sonarcloud and gitlab - #5 by alexiii