Could not find the pullrequest with key XY

Hi, we use GitHub Actions (sonarsource/sonarcloud-github-action@master) and SonarCloud to run the SonarCloud Check.

  - name: SonarCloud Scan
    uses: sonarsource/sonarcloud-github-action@master
    env:
      GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
      SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} 

The file “sonar-project.properties” is copied from SonarCloud Example.

But on PR we always get the following error:

DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=exporo_pat-microservices&pullrequestKey=1292

Caused by: Could not find the pullrequest with key ‘1292’

The project is linked to GitHub.

Please help - it also effects other repos.

Hi,

Welcome to the community!

Was there any more to that error message? Could you provide the full analysis log?

 
Ann

Sure - pretty long because I enabled the Debug Mode :wink:

Run sonarsource/sonarcloud-github-action@master
/usr/bin/docker run --name bb9954442b08d430aa49fd689529de8ea_fc16ef --label 94859b --workdir /github/workspace --rm -e GITHUB_TOKEN -e SONAR_TOKEN -e INPUT_ARGS -e INPUT_PROJECTBASEDIR -e HOME -e GITHUB_JOB -e GITHUB_REF -e GITHUB_SHA -e GITHUB_REPOSITORY -e GITHUB_REPOSITORY_OWNER -e GITHUB_RUN_ID -e GITHUB_RUN_NUMBER -e GITHUB_RETENTION_DAYS -e GITHUB_RUN_ATTEMPT -e GITHUB_ACTOR -e GITHUB_TRIGGERING_ACTOR -e GITHUB_WORKFLOW -e GITHUB_HEAD_REF -e GITHUB_BASE_REF -e GITHUB_EVENT_NAME -e GITHUB_SERVER_URL -e GITHUB_API_URL -e GITHUB_GRAPHQL_URL -e GITHUB_REF_NAME -e GITHUB_REF_PROTECTED -e GITHUB_REF_TYPE -e GITHUB_WORKSPACE -e GITHUB_ACTION -e GITHUB_EVENT_PATH -e GITHUB_ACTION_REPOSITORY -e GITHUB_ACTION_REF -e GITHUB_PATH -e GITHUB_ENV -e GITHUB_STEP_SUMMARY -e RUNNER_OS -e RUNNER_ARCH -e RUNNER_NAME -e RUNNER_TOOL_CACHE -e RUNNER_TEMP -e RUNNER_WORKSPACE -e ACTIONS_RUNTIME_URL -e ACTIONS_RUNTIME_TOKEN -e ACTIONS_CACHE_URL -e GITHUB_ACTIONS=true -e CI=true -v "/var/run/docker.sock":"/var/run/docker.sock" -v "/home/runner/work/_temp/_github_home":"/github/home" -v "/home/runner/work/_temp/_github_workflow":"/github/workflow" -v "/home/runner/work/_temp/_runner_file_commands":"/github/file_commands" -v "/home/runner/work/pat-microservices/pat-microservices":"/github/workspace" 94859b:b9954442b08d430aa49fd689529de8ea
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /github/workspace/sonar-project.properties
08:45:46.344 INFO: SonarScanner 4.7.0.2747
08:45:46.346 INFO: Java 11.0.15 Alpine (64-bit)
08:45:46.346 INFO: Linux 5.15.0-1017-azure amd64
08:45:46.530 DEBUG: keyStore is : 
08:45:46.531 DEBUG: keyStore type is : pkcs12
08:45:46.532 DEBUG: keyStore provider is : 
08:45:46.532 DEBUG: init keystore
08:45:46.533 DEBUG: init keymanager of type SunX509
08:45:46.694 DEBUG: Create: /opt/sonar-scanner/.sonar/cache
08:45:46.695 INFO: User cache: /opt/sonar-scanner/.sonar/cache
08:45:46.696 DEBUG: Create: /opt/sonar-scanner/.sonar/cache/_tmp
08:45:46.699 DEBUG: Extract sonar-scanner-api-batch in temp...
08:45:46.702 DEBUG: Get bootstrap index...
08:45:46.703 DEBUG: Download: https://sonarcloud.io/batch/index
08:45:47.778 DEBUG: Get bootstrap completed
08:45:47.783 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.31186-all.jar to /opt/sonar-scanner/.sonar/cache/_tmp/fileCache10691776563997393324.tmp
08:45:52.200 DEBUG: Create isolated classloader...
08:45:52.210 DEBUG: Start temp cleaning...
08:45:52.216 DEBUG: Temp cleaning done
08:45:52.217 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
08:45:52.219 INFO: Project root configuration file: /github/workspace/sonar-project.properties
08:45:52.221 INFO: Analyzing on SonarCloud
08:45:52.221 INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
08:45:52.223 DEBUG: Work directory: /github/workspace/.scannerwork
08:45:52.229 DEBUG: Execution execute
08:45:52.536 DEBUG: SonarCloud 9.9.0.229
08:45:52.792 INFO: Load global settings
08:45:53.699 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=905ms
08:45:53.707 INFO: Load global settings (done) | time=915ms
08:45:53.712 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
08:45:53.737 DEBUG: Create : /opt/sonar-scanner/.sonar/_tmp
08:45:53.737 INFO: User cache: /opt/sonar-scanner/.sonar/cache
08:45:53.749 INFO: Load/download plugins
08:45:53.749 INFO: Load plugins index
08:45:54.594 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=845ms
08:45:54.642 INFO: Load plugins index (done) | time=893ms
08:45:54.645 DEBUG: Download plugin 'abap' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9988597367028669128.tmp'
08:45:54.808 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/abap/versions/b597d6dd0a09e600243aa3ed385e8592.jar | time=162ms
08:45:54.898 DEBUG: Download plugin 'sonarapex' to '/opt/sonar-scanner/.sonar/_tmp/fileCache4022330507121385573.tmp'
08:45:54.908 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarapex/versions/983ea9cf987e3277a0423e062b3958dc.jar | time=9ms
08:45:55.008 DEBUG: Download plugin 'csharp' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5354215114239862791.tmp'
08:45:55.017 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/csharp/versions/2b11c14dfed1ee175fd6d1d7408043aa.jar | time=8ms
08:45:55.130 DEBUG: Download plugin 'cpp' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11245644789014899446.tmp'
08:45:55.141 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/cpp/versions/c03e3cf20caaa92b7a8106e5f8ec93e7.jar | time=10ms
08:45:55.956 DEBUG: Download plugin 'cobol' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14567387604039736976.tmp'
08:45:55.965 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/cobol/versions/619692202fac26345db72eabbbb53135.jar | time=8ms
08:45:56.014 DEBUG: Download plugin 'config' to '/opt/sonar-scanner/.sonar/_tmp/fileCache15941192608552891816.tmp'
08:45:56.042 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/config/versions/276619b656c2bb54288951fcaf34e31a.jar | time=26ms
08:45:56.044 DEBUG: Download plugin 'dbd' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5411282188059016727.tmp'
08:45:56.054 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbd/versions/529deb7e855b0ebd3979a633c760750f.jar | time=9ms
08:45:56.082 DEBUG: Download plugin 'dbdjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9013217089620445025.tmp'
08:45:56.102 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/6ab7e33a47e495a293fbf70cfb0cda05.jar | time=18ms
08:45:56.122 DEBUG: Download plugin 'dbdpythonfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9859005523750471447.tmp'
08:45:56.131 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/dbdpythonfrontend/versions/29212839cfa901a34c2182b3b299b604.jar | time=8ms
08:45:56.159 DEBUG: Download plugin 'flex' to '/opt/sonar-scanner/.sonar/_tmp/fileCache12581523067727243640.tmp'
08:45:56.179 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/flex/versions/9cf78e1f33634604df27546a25ce5b8c.jar | time=18ms
08:45:56.202 DEBUG: Download plugin 'go' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11457437224885161982.tmp'
08:45:56.248 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/go/versions/0128f9cabd087ac31ee0e75393057dfb.jar | time=45ms
08:45:56.321 DEBUG: Download plugin 'web' to '/opt/sonar-scanner/.sonar/_tmp/fileCache6577251695466850172.tmp'
08:45:56.329 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/web/versions/723f570db21c05405b1d27b80cbad49f.jar | time=8ms
08:45:56.339 DEBUG: Download plugin 'iac' to '/opt/sonar-scanner/.sonar/_tmp/fileCache939331595372637470.tmp'
08:45:56.356 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/iac/versions/f0ad6537fc5cfac4881cbcca9ced8b20.jar | time=16ms
08:45:56.370 DEBUG: Download plugin 'jacoco' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11926186062843073897.tmp'
08:45:56.379 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/c3b0852dcc82e97e572ca0812c0afd7d.jar | time=8ms
08:45:56.386 DEBUG: Download plugin 'java' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11582744985171166790.tmp'
08:45:56.398 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/java/versions/d741bcb2f39b25071ec7637ae2fc1ad6.jar | time=9ms
08:45:56.593 DEBUG: Download plugin 'javascript' to '/opt/sonar-scanner/.sonar/_tmp/fileCache17540891559344977774.tmp'
08:45:56.602 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/javascript/versions/4e7eb052f88daa8383aa887c3c9eb74b.jar | time=8ms
08:45:56.878 DEBUG: Download plugin 'kotlin' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5910878321018667646.tmp'
08:45:56.887 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/kotlin/versions/ece68225a77710b0d68aa66b3bbe47ef.jar | time=8ms
08:45:57.282 DEBUG: Download plugin 'license' to '/opt/sonar-scanner/.sonar/_tmp/fileCache17719432105801014547.tmp'
08:45:57.290 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/license/versions/87adcd2fe75fe35e7ccc9f100897ed03.jar | time=7ms
08:45:57.293 DEBUG: Download plugin 'php' to '/opt/sonar-scanner/.sonar/_tmp/fileCache15255451476133021200.tmp'
08:45:57.301 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/php/versions/4709012900278ece28600853946d9a78.jar | time=8ms
08:45:57.367 DEBUG: Download plugin 'plsql' to '/opt/sonar-scanner/.sonar/_tmp/fileCache12667491003777711801.tmp'
08:45:57.376 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/plsql/versions/7ae65b7823dabc565d8359445078103f.jar | time=8ms
08:45:57.418 DEBUG: Download plugin 'python' to '/opt/sonar-scanner/.sonar/_tmp/fileCache877866592944452718.tmp'
08:45:57.461 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/python/versions/a312a28dc3f18d9c93c7cccc343fb828.jar | time=42ms
08:45:57.530 DEBUG: Download plugin 'ruby' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5231879855749938648.tmp'
08:45:57.538 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/ruby/versions/4d1a001c8709683f985f2d2e01a70bb2.jar | time=7ms
08:45:57.670 DEBUG: Download plugin 'sonarscala' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14000271439368345110.tmp'
08:45:57.677 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarscala/versions/3e5bc0d7a33aabd56d8cf8fc95214b48.jar | time=7ms
08:45:57.788 DEBUG: Download plugin 'swift' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9748246330487231878.tmp'
08:45:57.796 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/swift/versions/15d33c3256d82170f827164b475a07c9.jar | time=8ms
08:45:57.817 DEBUG: Download plugin 'tsql' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5093707840214015227.tmp'
08:45:57.827 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/tsql/versions/3d6c6990357811e86be4648df5beeac6.jar | time=9ms
08:45:57.855 DEBUG: Download plugin 'text' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14855655080596074678.tmp'
08:45:57.864 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/text/versions/2dd70b82b4916308b2a95dda25e98acb.jar | time=8ms
08:45:57.867 DEBUG: Download plugin 'vbnet' to '/opt/sonar-scanner/.sonar/_tmp/fileCache14676518790095558774.tmp'
08:45:57.876 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/vbnet/versions/786decdc73c6616600c749da10a22013.jar | time=8ms
08:45:57.914 DEBUG: Download plugin 'security' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7829072649662766976.tmp'
08:45:57.941 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/security/versions/0e3800828b72f0c6ad816757fbb04f33.jar | time=27ms
08:45:58.016 DEBUG: Download plugin 'securitycsharpfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache4999951429014528137.tmp'
08:45:58.024 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securitycsharpfrontend/versions/345e554d2ff3bd60e272dda169585af6.jar | time=8ms
08:45:58.036 DEBUG: Download plugin 'securityjsfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache5889866883859389269.tmp'
08:45:58.044 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/ce591e3f7610860294db52053899e90f.jar | time=8ms
08:45:58.052 DEBUG: Download plugin 'securityjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache6036260864822063438.tmp'
08:45:58.059 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/7b636807a8d6a882243f6fcdd8a176f2.jar | time=7ms
08:45:58.137 DEBUG: Download plugin 'securityphpfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache16921917469186017356.tmp'
08:45:58.161 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securityphpfrontend/versions/a627680fb01ed49dd1d1aba67553e14a.jar | time=24ms
08:45:58.186 DEBUG: Download plugin 'securitypythonfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache6855862433324974598.tmp'
08:45:58.195 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/securitypythonfrontend/versions/4d302a9257fad93fc0dcf20f2ec0d6ac.jar | time=8ms
08:45:58.221 DEBUG: Download plugin 'xml' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7820786963378442762.tmp'
08:45:58.229 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/xml/versions/174d80380d3f6820c8a33f10927fd650.jar | time=8ms
08:45:58.251 INFO: Load/download plugins (done) | time=4502ms
08:45:58.639 DEBUG: Plugins:
08:45:58.640 DEBUG:   * IaC Code Quality and Security 1.9.2.2279 (iac)
08:45:58.640 DEBUG:   * PL/SQL Code Quality and Security 3.7.0.4372 (plsql)
08:45:58.640 DEBUG:   * Scala Code Quality and Security 1.10.0.3710 (sonarscala)
08:45:58.641 DEBUG:   * C# Code Quality and Security 8.43.0.51858 (csharp)
08:45:58.641 DEBUG:   * Vulnerability Analysis 9.6.0.17156 (security)
08:45:58.641 DEBUG:   * Java Code Quality and Security 7.13.0.29990 (java)
08:45:58.642 DEBUG:   * HTML Code Quality and Security 3.6.0.3106 (web)
08:45:58.642 DEBUG:   * Flex Code Quality and Security 2.7.0.2865 (flex)
08:45:58.642 DEBUG:   * XML Code Quality and Security 2.5.0.3376 (xml)
08:45:58.642 DEBUG:   * Text file Code Quality and Security 1.1.0.282 (text)
08:45:58.642 DEBUG:   * VB.NET Code Quality and Security 8.43.0.51858 (vbnet)
08:45:58.642 DEBUG:   * Swift Code Quality and Security 4.6.1.5444 (swift)
08:45:58.643 DEBUG:   * CFamily Code Quality and Security 6.36.0.52033 (cpp)
08:45:58.643 DEBUG:   * Python Code Quality and Security 3.15.1.9817 (python)
08:45:58.643 DEBUG:   * Dataflow Bug Detection Rules for Python 1.5.0.1969 (dbdpythonfrontend)
08:45:58.643 DEBUG:   * Dataflow Bug Detection 1.5.0.1969 (dbd)
08:45:58.643 DEBUG:   * Go Code Quality and Security 1.10.0.3710 (go)
08:45:58.643 DEBUG:   * JaCoCo 1.1.1.1157 (jacoco)
08:45:58.644 DEBUG:   * Kotlin Code Quality and Security 2.10.0.1456 (kotlin)
08:45:58.644 DEBUG:   * Dataflow Bug Detection Rules for Java 1.5.0.1969 (dbdjavafrontend)
08:45:58.644 DEBUG:   * T-SQL Code Quality and Security 1.6.0.4844 (tsql)
08:45:58.644 DEBUG:   * Apex Code Quality and Security 1.10.0.3710 (sonarapex)
08:45:58.644 DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 9.6.0.18814 (javascript)
08:45:58.644 DEBUG:   * Ruby Code Quality and Security 1.10.0.3710 (ruby)
08:45:58.645 DEBUG:   * Vulnerability Rules for C# 9.6.0.17156 (securitycsharpfrontend)
08:45:58.645 DEBUG:   * Vulnerability Rules for Java 9.6.0.17156 (securityjavafrontend)
08:45:58.645 DEBUG:   * License for SonarLint 8.0.0.31186 (license)
08:45:58.645 DEBUG:   * Vulnerability Rules for JS 9.6.0.17156 (securityjsfrontend)
08:45:58.645 DEBUG:   * COBOL Code Quality 5.0.0.5433 (cobol)
08:45:58.645 DEBUG:   * Vulnerability Rules for Python 9.6.0.17156 (securitypythonfrontend)
08:45:58.645 DEBUG:   * PHP Code Quality and Security 3.24.0.8949 (php)
08:45:58.646 DEBUG:   * ABAP Code Quality and Security 3.10.0.3628 (abap)
08:45:58.646 DEBUG:   * Configuration detection fot Code Quality and Security 1.2.0.267 (config)
08:45:58.646 DEBUG:   * Vulnerability Rules for PHP 9.6.0.17156 (securityphpfrontend)
08:45:59.495 DEBUG: GET 200 https://sonarcloud.io/api/server/version | time=849ms
08:45:59.498 DEBUG: Updated analysis started with a difference of -83 milliseconds
08:45:59.510 DEBUG: Started at Mon Aug 22 08:45:53 GMT 2022
08:45:59.560 INFO: Loaded core extensions: developer-scanner
08:45:59.585 DEBUG: Installed core extension: com.sonarsource.branch.DeveloperScannerCoreExtension@8d7b252
08:46:00.247 INFO: Found an active CI vendor: 'Github Actions'
08:46:00.264 INFO: Load project settings for component key: 'exporo_pat-microservices'
08:46:01.117 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=exporo_pat-microservices | time=853ms
08:46:01.119 INFO: Load project settings for component key: 'exporo_pat-microservices' (done) | time=855ms
08:46:01.124 INFO: Process project properties
08:46:01.132 DEBUG: Process project properties (done) | time=8ms
08:46:01.132 INFO: Execute project builders
08:46:01.132 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
08:46:01.133 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
08:46:01.134 INFO: Execute project builders (done) | time=2ms
08:46:01.136 INFO: Project key: exporo_pat-microservices
08:46:01.136 INFO: Base dir: /github/workspace
08:46:01.136 INFO: Working dir: /github/workspace/.scannerwork
08:46:01.136 DEBUG: Project global encoding: UTF-8, default locale: en_US
08:46:01.137 DEBUG: Creating module hierarchy
08:46:01.137 DEBUG:   Init module 'exporo_pat-microservices'
08:46:01.138 DEBUG:     Base dir: /github/workspace
08:46:01.138 DEBUG:     Working dir: /github/workspace/.scannerwork
08:46:01.138 DEBUG:     Module global encoding: UTF-8, default locale: en_US
08:46:01.233 INFO: Load project branches
08:46:02.089 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=exporo_pat-microservices | time=847ms
08:46:02.094 INFO: Load project branches (done) | time=861ms
08:46:02.097 INFO: Check ALM binding of project 'exporo_pat-microservices'
08:46:02.957 DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=exporo_pat-microservices | time=858ms
08:46:02.960 INFO: Detected project binding: BOUND
08:46:02.960 INFO: Check ALM binding of project 'exporo_pat-microservices' (done) | time=863ms
08:46:02.963 INFO: Load project pull requests
08:46:03.857 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=exporo_pat-microservices | time=893ms
08:46:03.863 INFO: Load project pull requests (done) | time=900ms
08:46:03.867 INFO: Load branch configuration
08:46:03.869 INFO: Github event: pull_request
08:46:03.877 INFO: Auto-configuring pull request 1292
08:46:05.136 DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=exporo_pat-microservices&pullrequestKey=1292 | time=1256ms
08:46:05.149 INFO: ------------------------------------------------------------------------
08:46:05.149 INFO: EXECUTION FAILURE
08:46:05.149 INFO: ------------------------------------------------------------------------
08:46:05.150 INFO: Total time: 18.853s
08:46:05.202 INFO: Final Memory: 20M/74M
08:46:05.203 INFO: ------------------------------------------------------------------------
08:46:05.203 ERROR: Error during SonarScanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:130)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:52)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	... 34 more
Caused by: Could not find the pullrequest with key '1292'
Caused by: org.sonarqube.ws.client.HttpException: Error 404 on https://sonarcloud.io/api/alm_integration/show_pullrequest?project=exporo_pat-microservices&pullrequestKey=1292 : {"errors":[{"msg":"The pullrequest could not be found"}]}
	at org.sonarqube.ws.client.BaseResponse.failIfNotSuccessful(BaseResponse.java:22)
	at org.sonar.scanner.bootstrap.DefaultScannerWsClient.failIfUnauthorized(DefaultScannerWsClient.java:86)
	at org.sonar.scanner.bootstrap.DefaultScannerWsClient.call(DefaultScannerWsClient.java:61)
	at com.sonarsource.branch.pr.PullRequestClient.getPullRequest(PullRequestClient.java:32)
	at com.sonarsource.branch.PrBranchConfigurationBuilder.buildForBoundProject(PrBranchConfigurationBuilder.java:68)
	at com.sonarsource.branch.PrBranchConfigurationBuilder.build(PrBranchConfigurationBuilder.java:56)
	at com.sonarsource.branch.BranchConfigurationLoaderImpl.load(BranchConfigurationLoaderImpl.java:65)
	at org.sonar.scanner.scan.branch.BranchConfigurationProvider.provide(BranchConfigurationProvider.java:33)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
	at org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
	at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
	at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
	at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
	at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:50)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:130)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
08:46:05.226 ERROR: 
08:46:05.226 ERROR: Re-run SonarScanner using the -X switch to enable full debug logging.

Hi,

Thanks for this. So the core of the problem is that SonarCloud checks with your DevOps platform to… make sure the PR is there(?). Anyway, it submits a request to GitHub for the PR. And that request is failing:

Typically this is a permissions issue. So this is probably going to be about the GITHUB_TOKEN in your analysis environment & whether or not it has permissions to the project/PR in question.

 
HTH,
Ann

Hi I’m having exactly the same issue, please how can I resolve this