Hi, we use GitHub Actions (sonarsource/sonarcloud-github-action@master) and SonarCloud to run the SonarCloud Check.
- name: SonarCloud Scan
uses: sonarsource/sonarcloud-github-action@master
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
The file “sonar-project.properties” is copied from SonarCloud Example.
But on PR we always get the following error:
DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=exporo_pat-microservices&pullrequestKey=1292
Caused by: Could not find the pullrequest with key ‘1292’
The project is linked to GitHub.
Please help - it also effects other repos.
ganncamp
(G Ann Campbell)
August 22, 2022, 6:21pm
2
Hi,
Welcome to the community!
Was there any more to that error message? Could you provide the full analysis log?
Ann
Sure - pretty long because I enabled the Debug Mode
Run sonarsource/sonarcloud-github-action@master
/usr/bin/docker run --name bb9954442b08d430aa49fd689529de8ea_fc16ef --label 94859b --workdir /github/workspace --rm -e GITHUB_TOKEN -e SONAR_TOKEN -e INPUT_ARGS -e INPUT_PROJECTBASEDIR -e HOME -e GITHUB_JOB -e GITHUB_REF -e GITHUB_SHA -e GITHUB_REPOSITORY -e GITHUB_REPOSITORY_OWNER -e GITHUB_RUN_ID -e GITHUB_RUN_NUMBER -e GITHUB_RETENTION_DAYS -e GITHUB_RUN_ATTEMPT -e GITHUB_ACTOR -e GITHUB_TRIGGERING_ACTOR -e GITHUB_WORKFLOW -e GITHUB_HEAD_REF -e GITHUB_BASE_REF -e GITHUB_EVENT_NAME -e GITHUB_SERVER_URL -e GITHUB_API_URL -e GITHUB_GRAPHQL_URL -e GITHUB_REF_NAME -e GITHUB_REF_PROTECTED -e GITHUB_REF_TYPE -e GITHUB_WORKSPACE -e GITHUB_ACTION -e GITHUB_EVENT_PATH -e GITHUB_ACTION_REPOSITORY -e GITHUB_ACTION_REF -e GITHUB_PATH -e GITHUB_ENV -e GITHUB_STEP_SUMMARY -e RUNNER_OS -e RUNNER_ARCH -e RUNNER_NAME -e RUNNER_TOOL_CACHE -e RUNNER_TEMP -e RUNNER_WORKSPACE -e ACTIONS_RUNTIME_URL -e ACTIONS_RUNTIME_TOKEN -e ACTIONS_CACHE_URL -e GITHUB_ACTIONS=true -e CI=true -v "/var/run/docker.sock":"/var/run/docker.sock" -v "/home/runner/work/_temp/_github_home":"/github/home" -v "/home/runner/work/_temp/_github_workflow":"/github/workflow" -v "/home/runner/work/_temp/_runner_file_commands":"/github/file_commands" -v "/home/runner/work/pat-microservices/pat-microservices":"/github/workspace" 94859b:b9954442b08d430aa49fd689529de8ea
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /github/workspace/sonar-project.properties
08:45:46.344 INFO: SonarScanner 4.7.0.2747
08:45:46.346 INFO: Java 11.0.15 Alpine (64-bit)
08:45:46.346 INFO: Linux 5.15.0-1017-azure amd64
08:45:46.530 DEBUG: keyStore is :
08:45:46.531 DEBUG: keyStore type is : pkcs12
08:45:46.532 DEBUG: keyStore provider is :
08:45:46.532 DEBUG: init keystore
08:45:46.533 DEBUG: init keymanager of type SunX509
08:45:46.694 DEBUG: Create: /opt/sonar-scanner/.sonar/cache
08:45:46.695 INFO: User cache: /opt/sonar-scanner/.sonar/cache
08:45:46.696 DEBUG: Create: /opt/sonar-scanner/.sonar/cache/_tmp
08:45:46.699 DEBUG: Extract sonar-scanner-api-batch in temp...
08:45:46.702 DEBUG: Get bootstrap index...
08:45:46.703 DEBUG: Download: https://sonarcloud.io/batch/index
08:45:47.778 DEBUG: Get bootstrap completed
08:45:47.783 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.31186-all.jar to /opt/sonar-scanner/.sonar/cache/_tmp/fileCache10691776563997393324.tmp
08:45:52.200 DEBUG: Create isolated classloader...
08:45:52.210 DEBUG: Start temp cleaning...
08:45:52.216 DEBUG: Temp cleaning done
08:45:52.217 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
08:45:52.219 INFO: Project root configuration file: /github/workspace/sonar-project.properties
08:45:52.221 INFO: Analyzing on SonarCloud
08:45:52.221 INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
08:45:52.223 DEBUG: Work directory: /github/workspace/.scannerwork
08:45:52.229 DEBUG: Execution execute
08:45:52.536 DEBUG: SonarCloud 9.9.0.229
08:45:52.792 INFO: Load global settings
08:45:53.699 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=905ms
08:45:53.707 INFO: Load global settings (done) | time=915ms
08:45:53.712 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
08:45:53.737 DEBUG: Create : /opt/sonar-scanner/.sonar/_tmp
08:45:53.737 INFO: User cache: /opt/sonar-scanner/.sonar/cache
08:45:53.749 INFO: Load/download plugins
08:45:53.749 INFO: Load plugins index
08:45:54.594 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=845ms
08:45:54.642 INFO: Load plugins index (done) | time=893ms
08:45:54.645 DEBUG: Download plugin 'abap' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9988597367028669128.tmp'
08:45:54.808 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/abap/versions/b597d6dd0a09e600243aa3ed385e8592.jar | time=162ms
08:45:54.898 DEBUG: Download plugin 'sonarapex' to '/opt/sonar-scanner/.sonar/_tmp/fileCache4022330507121385573.tmp'
08:45:54.908 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarapex/versions/983ea9cf987e3277a0423e062b3958dc.jar | time=9ms
08:45:55.008 DEBUG: Download plugin 'csharp' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5354215114239862791.tmp'
08:45:55.017 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/csharp/versions/2b11c14dfed1ee175fd6d1d7408043aa.jar | time=8ms
08:45:55.130 DEBUG: Download plugin 'cpp' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11245644789014899446.tmp'
08:45:55.141 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/cpp/versions/c03e3cf20caaa92b7a8106e5f8ec93e7.jar | time=10ms
08:45:55.956 DEBUG: Download plugin 'cobol' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14567387604039736976.tmp'
08:45:55.965 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/cobol/versions/619692202fac26345db72eabbbb53135.jar | time=8ms
08:45:56.014 DEBUG: Download plugin 'config' to '/opt/sonar-scanner/.sonar/_tmp/fileCache15941192608552891816.tmp'
08:45:56.042 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/config/versions/276619b656c2bb54288951fcaf34e31a.jar | time=26ms
08:45:56.044 DEBUG: Download plugin 'dbd' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5411282188059016727.tmp'
08:45:56.054 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbd/versions/529deb7e855b0ebd3979a633c760750f.jar | time=9ms
08:45:56.082 DEBUG: Download plugin 'dbdjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9013217089620445025.tmp'
08:45:56.102 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/6ab7e33a47e495a293fbf70cfb0cda05.jar | time=18ms
08:45:56.122 DEBUG: Download plugin 'dbdpythonfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9859005523750471447.tmp'
08:45:56.131 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbdpythonfrontend/versions/29212839cfa901a34c2182b3b299b604.jar | time=8ms
08:45:56.159 DEBUG: Download plugin 'flex' to '/opt/sonar-scanner/.sonar/_tmp/fileCache12581523067727243640.tmp'
08:45:56.179 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/flex/versions/9cf78e1f33634604df27546a25ce5b8c.jar | time=18ms
08:45:56.202 DEBUG: Download plugin 'go' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11457437224885161982.tmp'
08:45:56.248 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/go/versions/0128f9cabd087ac31ee0e75393057dfb.jar | time=45ms
08:45:56.321 DEBUG: Download plugin 'web' to '/opt/sonar-scanner/.sonar/_tmp/fileCache6577251695466850172.tmp'
08:45:56.329 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/web/versions/723f570db21c05405b1d27b80cbad49f.jar | time=8ms
08:45:56.339 DEBUG: Download plugin 'iac' to '/opt/sonar-scanner/.sonar/_tmp/fileCache939331595372637470.tmp'
08:45:56.356 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/iac/versions/f0ad6537fc5cfac4881cbcca9ced8b20.jar | time=16ms
08:45:56.370 DEBUG: Download plugin 'jacoco' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11926186062843073897.tmp'
08:45:56.379 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/c3b0852dcc82e97e572ca0812c0afd7d.jar | time=8ms
08:45:56.386 DEBUG: Download plugin 'java' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11582744985171166790.tmp'
08:45:56.398 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/java/versions/d741bcb2f39b25071ec7637ae2fc1ad6.jar | time=9ms
08:45:56.593 DEBUG: Download plugin 'javascript' to '/opt/sonar-scanner/.sonar/_tmp/fileCache17540891559344977774.tmp'
08:45:56.602 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/javascript/versions/4e7eb052f88daa8383aa887c3c9eb74b.jar | time=8ms
08:45:56.878 DEBUG: Download plugin 'kotlin' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5910878321018667646.tmp'
08:45:56.887 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/kotlin/versions/ece68225a77710b0d68aa66b3bbe47ef.jar | time=8ms
08:45:57.282 DEBUG: Download plugin 'license' to '/opt/sonar-scanner/.sonar/_tmp/fileCache17719432105801014547.tmp'
08:45:57.290 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/license/versions/87adcd2fe75fe35e7ccc9f100897ed03.jar | time=7ms
08:45:57.293 DEBUG: Download plugin 'php' to '/opt/sonar-scanner/.sonar/_tmp/fileCache15255451476133021200.tmp'
08:45:57.301 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/php/versions/4709012900278ece28600853946d9a78.jar | time=8ms
08:45:57.367 DEBUG: Download plugin 'plsql' to '/opt/sonar-scanner/.sonar/_tmp/fileCache12667491003777711801.tmp'
08:45:57.376 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/plsql/versions/7ae65b7823dabc565d8359445078103f.jar | time=8ms
08:45:57.418 DEBUG: Download plugin 'python' to '/opt/sonar-scanner/.sonar/_tmp/fileCache877866592944452718.tmp'
08:45:57.461 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/python/versions/a312a28dc3f18d9c93c7cccc343fb828.jar | time=42ms
08:45:57.530 DEBUG: Download plugin 'ruby' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5231879855749938648.tmp'
08:45:57.538 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/ruby/versions/4d1a001c8709683f985f2d2e01a70bb2.jar | time=7ms
08:45:57.670 DEBUG: Download plugin 'sonarscala' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14000271439368345110.tmp'
08:45:57.677 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarscala/versions/3e5bc0d7a33aabd56d8cf8fc95214b48.jar | time=7ms
08:45:57.788 DEBUG: Download plugin 'swift' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9748246330487231878.tmp'
08:45:57.796 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/swift/versions/15d33c3256d82170f827164b475a07c9.jar | time=8ms
08:45:57.817 DEBUG: Download plugin 'tsql' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5093707840214015227.tmp'
08:45:57.827 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/tsql/versions/3d6c6990357811e86be4648df5beeac6.jar | time=9ms
08:45:57.855 DEBUG: Download plugin 'text' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14855655080596074678.tmp'
08:45:57.864 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/text/versions/2dd70b82b4916308b2a95dda25e98acb.jar | time=8ms
08:45:57.867 DEBUG: Download plugin 'vbnet' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14676518790095558774.tmp'
08:45:57.876 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/vbnet/versions/786decdc73c6616600c749da10a22013.jar | time=8ms
08:45:57.914 DEBUG: Download plugin 'security' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7829072649662766976.tmp'
08:45:57.941 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/security/versions/0e3800828b72f0c6ad816757fbb04f33.jar | time=27ms
08:45:58.016 DEBUG: Download plugin 'securitycsharpfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache4999951429014528137.tmp'
08:45:58.024 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securitycsharpfrontend/versions/345e554d2ff3bd60e272dda169585af6.jar | time=8ms
08:45:58.036 DEBUG: Download plugin 'securityjsfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5889866883859389269.tmp'
08:45:58.044 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/ce591e3f7610860294db52053899e90f.jar | time=8ms
08:45:58.052 DEBUG: Download plugin 'securityjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache6036260864822063438.tmp'
08:45:58.059 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/7b636807a8d6a882243f6fcdd8a176f2.jar | time=7ms
08:45:58.137 DEBUG: Download plugin 'securityphpfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache16921917469186017356.tmp'
08:45:58.161 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityphpfrontend/versions/a627680fb01ed49dd1d1aba67553e14a.jar | time=24ms
08:45:58.186 DEBUG: Download plugin 'securitypythonfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache6855862433324974598.tmp'
08:45:58.195 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securitypythonfrontend/versions/4d302a9257fad93fc0dcf20f2ec0d6ac.jar | time=8ms
08:45:58.221 DEBUG: Download plugin 'xml' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7820786963378442762.tmp'
08:45:58.229 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/xml/versions/174d80380d3f6820c8a33f10927fd650.jar | time=8ms
08:45:58.251 INFO: Load/download plugins (done) | time=4502ms
08:45:58.639 DEBUG: Plugins:
08:45:58.640 DEBUG: * IaC Code Quality and Security 1.9.2.2279 (iac)
08:45:58.640 DEBUG: * PL/SQL Code Quality and Security 3.7.0.4372 (plsql)
08:45:58.640 DEBUG: * Scala Code Quality and Security 1.10.0.3710 (sonarscala)
08:45:58.641 DEBUG: * C# Code Quality and Security 8.43.0.51858 (csharp)
08:45:58.641 DEBUG: * Vulnerability Analysis 9.6.0.17156 (security)
08:45:58.641 DEBUG: * Java Code Quality and Security 7.13.0.29990 (java)
08:45:58.642 DEBUG: * HTML Code Quality and Security 3.6.0.3106 (web)
08:45:58.642 DEBUG: * Flex Code Quality and Security 2.7.0.2865 (flex)
08:45:58.642 DEBUG: * XML Code Quality and Security 2.5.0.3376 (xml)
08:45:58.642 DEBUG: * Text file Code Quality and Security 1.1.0.282 (text)
08:45:58.642 DEBUG: * VB.NET Code Quality and Security 8.43.0.51858 (vbnet)
08:45:58.642 DEBUG: * Swift Code Quality and Security 4.6.1.5444 (swift)
08:45:58.643 DEBUG: * CFamily Code Quality and Security 6.36.0.52033 (cpp)
08:45:58.643 DEBUG: * Python Code Quality and Security 3.15.1.9817 (python)
08:45:58.643 DEBUG: * Dataflow Bug Detection Rules for Python 1.5.0.1969 (dbdpythonfrontend)
08:45:58.643 DEBUG: * Dataflow Bug Detection 1.5.0.1969 (dbd)
08:45:58.643 DEBUG: * Go Code Quality and Security 1.10.0.3710 (go)
08:45:58.643 DEBUG: * JaCoCo 1.1.1.1157 (jacoco)
08:45:58.644 DEBUG: * Kotlin Code Quality and Security 2.10.0.1456 (kotlin)
08:45:58.644 DEBUG: * Dataflow Bug Detection Rules for Java 1.5.0.1969 (dbdjavafrontend)
08:45:58.644 DEBUG: * T-SQL Code Quality and Security 1.6.0.4844 (tsql)
08:45:58.644 DEBUG: * Apex Code Quality and Security 1.10.0.3710 (sonarapex)
08:45:58.644 DEBUG: * JavaScript/TypeScript/CSS Code Quality and Security 9.6.0.18814 (javascript)
08:45:58.644 DEBUG: * Ruby Code Quality and Security 1.10.0.3710 (ruby)
08:45:58.645 DEBUG: * Vulnerability Rules for C# 9.6.0.17156 (securitycsharpfrontend)
08:45:58.645 DEBUG: * Vulnerability Rules for Java 9.6.0.17156 (securityjavafrontend)
08:45:58.645 DEBUG: * License for SonarLint 8.0.0.31186 (license)
08:45:58.645 DEBUG: * Vulnerability Rules for JS 9.6.0.17156 (securityjsfrontend)
08:45:58.645 DEBUG: * COBOL Code Quality 5.0.0.5433 (cobol)
08:45:58.645 DEBUG: * Vulnerability Rules for Python 9.6.0.17156 (securitypythonfrontend)
08:45:58.645 DEBUG: * PHP Code Quality and Security 3.24.0.8949 (php)
08:45:58.646 DEBUG: * ABAP Code Quality and Security 3.10.0.3628 (abap)
08:45:58.646 DEBUG: * Configuration detection fot Code Quality and Security 1.2.0.267 (config)
08:45:58.646 DEBUG: * Vulnerability Rules for PHP 9.6.0.17156 (securityphpfrontend)
08:45:59.495 DEBUG: GET 200 https://sonarcloud.io/api/server/version | time=849ms
08:45:59.498 DEBUG: Updated analysis started with a difference of -83 milliseconds
08:45:59.510 DEBUG: Started at Mon Aug 22 08:45:53 GMT 2022
08:45:59.560 INFO: Loaded core extensions: developer-scanner
08:45:59.585 DEBUG: Installed core extension: com.sonarsource.branch.DeveloperScannerCoreExtension@8d7b252
08:46:00.247 INFO: Found an active CI vendor: 'Github Actions'
08:46:00.264 INFO: Load project settings for component key: 'exporo_pat-microservices'
08:46:01.117 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=exporo_pat-microservices | time=853ms
08:46:01.119 INFO: Load project settings for component key: 'exporo_pat-microservices' (done) | time=855ms
08:46:01.124 INFO: Process project properties
08:46:01.132 DEBUG: Process project properties (done) | time=8ms
08:46:01.132 INFO: Execute project builders
08:46:01.132 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
08:46:01.133 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
08:46:01.134 INFO: Execute project builders (done) | time=2ms
08:46:01.136 INFO: Project key: exporo_pat-microservices
08:46:01.136 INFO: Base dir: /github/workspace
08:46:01.136 INFO: Working dir: /github/workspace/.scannerwork
08:46:01.136 DEBUG: Project global encoding: UTF-8, default locale: en_US
08:46:01.137 DEBUG: Creating module hierarchy
08:46:01.137 DEBUG: Init module 'exporo_pat-microservices'
08:46:01.138 DEBUG: Base dir: /github/workspace
08:46:01.138 DEBUG: Working dir: /github/workspace/.scannerwork
08:46:01.138 DEBUG: Module global encoding: UTF-8, default locale: en_US
08:46:01.233 INFO: Load project branches
08:46:02.089 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=exporo_pat-microservices | time=847ms
08:46:02.094 INFO: Load project branches (done) | time=861ms
08:46:02.097 INFO: Check ALM binding of project 'exporo_pat-microservices'
08:46:02.957 DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=exporo_pat-microservices | time=858ms
08:46:02.960 INFO: Detected project binding: BOUND
08:46:02.960 INFO: Check ALM binding of project 'exporo_pat-microservices' (done) | time=863ms
08:46:02.963 INFO: Load project pull requests
08:46:03.857 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=exporo_pat-microservices | time=893ms
08:46:03.863 INFO: Load project pull requests (done) | time=900ms
08:46:03.867 INFO: Load branch configuration
08:46:03.869 INFO: Github event: pull_request
08:46:03.877 INFO: Auto-configuring pull request 1292
08:46:05.136 DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=exporo_pat-microservices&pullrequestKey=1292 | time=1256ms
08:46:05.149 INFO: ------------------------------------------------------------------------
08:46:05.149 INFO: EXECUTION FAILURE
08:46:05.149 INFO: ------------------------------------------------------------------------
08:46:05.150 INFO: Total time: 18.853s
08:46:05.202 INFO: Final Memory: 20M/74M
08:46:05.203 INFO: ------------------------------------------------------------------------
08:46:05.203 ERROR: Error during SonarScanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:130)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at com.sun.proxy.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
... 34 more
Caused by: Could not find the pullrequest with key '1292'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=exporo_pat-microservices&pullrequestKey=1292 : {"errors":[{"msg":"The pullrequest could not be found"}]}
at org.sonarqube.ws.client.BaseResponse.failIfNotSuccessful(BaseResponse.java:22)
at org.sonar.scanner.bootstrap.DefaultScannerWsClient.failIfUnauthorized(DefaultScannerWsClient.java:86)
at org.sonar.scanner.bootstrap.DefaultScannerWsClient.call(DefaultScannerWsClient.java:61)
at com.sonarsource.branch.pr.PullRequestClient.getPullRequest(PullRequestClient.java:32)
at com.sonarsource.branch.PrBranchConfigurationBuilder.buildForBoundProject(PrBranchConfigurationBuilder.java:68)
at com.sonarsource.branch.PrBranchConfigurationBuilder.build(PrBranchConfigurationBuilder.java:56)
at com.sonarsource.branch.BranchConfigurationLoaderImpl.load(BranchConfigurationLoaderImpl.java:65)
at org.sonar.scanner.scan.branch.BranchConfigurationProvider.provide(BranchConfigurationProvider.java:33)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
at org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:130)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.base/java.lang.reflect.Method.invoke(Method.java:566)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at com.sun.proxy.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
at org.sonarsource.scanner.cli.Main.main(Main.java:61)
08:46:05.226 ERROR:
08:46:05.226 ERROR: Re-run SonarScanner using the -X switch to enable full debug logging.
ganncamp
(G Ann Campbell)
August 23, 2022, 11:48am
4
Hi,
Thanks for this. So the core of the problem is that SonarCloud checks with your DevOps platform to… make sure the PR is there(?). Anyway, it submits a request to GitHub for the PR. And that request is failing:
Typically this is a permissions issue. So this is probably going to be about the GITHUB_TOKEN
in your analysis environment & whether or not it has permissions to the project/PR in question.
HTH,
Ann
danade002
(Daniel Ademeso)
May 14, 2024, 10:43am
5
Hi I’m having exactly the same issue, please how can I resolve this