Coverage not shown in SonarCloud for PR scan

Template for a good new topic, formatted with Markdown:

  • ALM used (GitHub, Bitbucket Cloud, Azure DevOps) - Bitbucket
  • CI system used (Bitbucket Cloud, Azure DevOps, Travis CI, Circle CI) - Bitbucket Cloud
  • Scanner command used when applicable (private details masked)
  • Languages of the repository - Python
  • Only if the SonarCloud project is public, the URL
    • And if you need help with pull request decoration, then the URL to the PR too
  • Error observed (wrap logs/code around with triple quotes ``` for proper formatting)
  • Steps to reproduce
  • Potential workaround

Do not share screenshots of logs – share the text itself (bonus points for being well-formatted)!

Scan is running it Bitbucket Pipeline successfully and the coverage artifact looks correct, but see There is not enough lines to compute coverage in the branch scan while it is shown on the master scan.

sonar.projectName=scenario-result
sonar.inclusions=/src/**/*.py
sonar.python.coverage.reportPaths=coverage-reports/coverage-scenario-result.xml
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.039
INFO: Run SCC (Tarjan) on 3313 nodes: Starting
INFO: Run SCC (Tarjan) on 3313 nodes: Time spent was 00:00:00.035
INFO: Tarjan found 3313 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.019
INFO: Variable Type Analysis #1: Time spent was 00:00:00.096
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.020
INFO: Run SCC (Tarjan) on 3299 nodes: Starting
INFO: Run SCC (Tarjan) on 3299 nodes: Time spent was 00:00:00.004
INFO: Tarjan found 3299 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.010
INFO: Variable Type Analysis #2: Time spent was 00:00:00.037
INFO: Create runtime call graph: Time spent was 00:00:00.141
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.476
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.039
INFO: All rules entry points : 2
INFO: Slice call graph: Starting
INFO: Retained UCFGs : 5
INFO: Slice call graph: Time spent was 00:00:00.001
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.005
INFO: Taint analysis for python: Starting
INFO: 0 / 5 UCFGs simulated, memory usage: 157 MB
INFO: 5 / 5 UCFGs simulated, memory usage: 161 MB
INFO: Taint analysis for python: Time spent was 00:00:00.104
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.004
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.006
INFO: python security sensor: Time spent was 00:00:01.350
INFO: python security sensor: Begin: 2025-03-26T19:18:52.604386513Z, End: 2025-03-26T19:18:53.955314802Z, Duration: 00:00:01.350
  Load type hierarchy and UCFGs: Begin: 2025-03-26T19:18:52.604731810Z, End: 2025-03-26T19:18:53.164083057Z, Duration: 00:00:00.559
    Load type hierarchy: Begin: 2025-03-26T19:18:52.604999479Z, End: 2025-03-26T19:18:52.743212601Z, Duration: 00:00:00.138
    Load UCFGs: Begin: 2025-03-26T19:18:52.743515714Z, End: 2025-03-26T19:18:53.163607917Z, Duration: 00:00:00.420
  Check cache: Begin: 2025-03-26T19:18:53.164256247Z, End: 2025-03-26T19:18:53.165714020Z, Duration: 00:00:00.001
    Load cache: Begin: 2025-03-26T19:18:53.164304929Z, End: 2025-03-26T19:18:53.164384768Z, Duration: 00:00:00.000
  Create runtime call graph: Begin: 2025-03-26T19:18:53.165949629Z, End: 2025-03-26T19:18:53.307103149Z, Duration: 00:00:00.141
    Variable Type Analysis #1: Begin: 2025-03-26T19:18:53.166787495Z, End: 2025-03-26T19:18:53.263466707Z, Duration: 00:00:00.096
      Create runtime type propagation graph: Begin: 2025-03-26T19:18:53.167886195Z, End: 2025-03-26T19:18:53.206940241Z, Duration: 00:00:00.039
      Run SCC (Tarjan) on 3313 nodes: Begin: 2025-03-26T19:18:53.207792327Z, End: 2025-03-26T19:18:53.242838803Z, Duration: 00:00:00.035
      Propagate runtime types to strongly connected components: Begin: 2025-03-26T19:18:53.243395844Z, End: 2025-03-26T19:18:53.263026074Z, Duration: 00:00:00.019
    Variable Type Analysis #2: Begin: 2025-03-26T19:18:53.266520693Z, End: 2025-03-26T19:18:53.304154145Z, Duration: 00:00:00.037
      Create runtime type propagation graph: Begin: 2025-03-26T19:18:53.266759328Z, End: 2025-03-26T19:18:53.287580826Z, Duration: 00:00:00.020
      Run SCC (Tarjan) on 3299 nodes: Begin: 2025-03-26T19:18:53.288014751Z, End: 2025-03-26T19:18:53.292674850Z, Duration: 00:00:00.004
      Propagate runtime types to strongly connected components: Begin: 2025-03-26T19:18:53.293154824Z, End: 2025-03-26T19:18:53.303251697Z, Duration: 00:00:00.010
  Load config: Begin: 2025-03-26T19:18:53.307409499Z, End: 2025-03-26T19:18:53.784268362Z, Duration: 00:00:00.476
  Compute entry points: Begin: 2025-03-26T19:18:53.785239085Z, End: 2025-03-26T19:18:53.824871200Z, Duration: 00:00:00.039
  Slice call graph: Begin: 2025-03-26T19:18:53.825453894Z, End: 2025-03-26T19:18:53.827428635Z, Duration: 00:00:00.001
  Live variable analysis: Begin: 2025-03-26T19:18:53.828747585Z, End: 2025-03-26T19:18:53.834479889Z, Duration: 00:00:00.005
  Taint analysis for python: Begin: 2025-03-26T19:18:53.835018481Z, End: 2025-03-26T19:18:53.939769608Z, Duration: 00:00:00.104
  Report issues: Begin: 2025-03-26T19:18:53.940007310Z, End: 2025-03-26T19:18:53.944998672Z, Duration: 00:00:00.004
  Store cache: Begin: 2025-03-26T19:18:53.946782645Z, End: 2025-03-26T19:18:53.953644911Z, Duration: 00:00:00.006
INFO: python security sensor peak memory: 231 MB
INFO: Sensor PythonSecuritySensor [security] (done) | time=1359ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: js security sensor: Time spent was 00:00:00.002
INFO: js security sensor: Begin: 2025-03-26T19:18:53.967386038Z, End: 2025-03-26T19:18:53.969661653Z, Duration: 00:00:00.002
  Load type hierarchy and UCFGs: Begin: 2025-03-26T19:18:53.968593215Z, End: 2025-03-26T19:18:53.969290525Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2025-03-26T19:18:53.968662372Z, End: 2025-03-26T19:18:53.968977498Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2025-03-26T19:18:53.969155400Z, End: 2025-03-26T19:18:53.969213345Z, Duration: 00:00:00.000
INFO: js security sensor peak memory: 231 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=6ms
INFO: Sensor KotlinSecuritySensor [security]
INFO: No taint analysis rules have been enabled, will not execute taint analysis.
INFO: kotlin security sensor: Time spent was 00:00:00.000
INFO: kotlin security sensor: Begin: 2025-03-26T19:18:53.973494171Z, End: 2025-03-26T19:18:53.974044765Z, Duration: 00:00:00.000
INFO: kotlin security sensor peak memory: 231 MB
INFO: Sensor KotlinSecuritySensor [security] (done) | time=1ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=1ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 9 source files to be analyzed
INFO: SCM Publisher 9/9 source files have been analyzed (done) | time=302ms
INFO: CPD Executor 6 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 4 files
INFO: CPD Executor CPD calculation finished (done) | time=94ms
INFO: SCM writing changed lines
WARN: Could not find ref: master in refs/heads, refs/remotes/upstream or refs/remotes/origin
INFO: SCM writing changed lines (done) | time=5ms
INFO: Analysis report generated in 911ms, dir size=292 KB
INFO: Analysis report compressed in 33ms, zip size=73 KB
INFO: Analysis report uploaded in 594ms
INFO: ANALYSIS SUCCESSFUL

Hi,

It’s unfortuante that we don’t have the top of the analysis log, but this part at the end is helpful:

Your screenshot shows we’re dealing with a branch. Since the screenshot doesn’t show New Code and Overall Code tabs, that means it’s a short-lived branch, where only the new code is analyzed.

Looking further at your screenshot, the Duplications card shows “1 New Lines(sic)”, which means that based on the SCM
metadata that was available to analysis, only one changed line was found in the branch.

Now, back to the coverage: was that single new line a line of code, or was it comments, whitespace, or non-code configuration?

 
Ann

Whoops, here are the full logs from a different branch:

INFO: Running the sonar scanner...
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: NONE
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.14 Amazon.com Inc. (64-bit)
INFO: Linux 6.1.79 amd64
INFO: SONAR_SCANNER_OPTS=-Xmx512m -Dsonar.python.bandit.reportPaths=bandit_report.json
INFO: Bitbucket Cloud Pipelines detected, no host variable set. Defaulting to sonarcloud.io.
INFO: User cache: /root/.sonar/cache
INFO: Analyzing on SonarQube server 11.8.0.412
INFO: Default locale: "en", source code encoding: "UTF-8" (analysis is platform dependent)
INFO: Load global settings
INFO: Load global settings (done) | time=455ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=171ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=756ms
INFO: Found an active CI vendor: 'Bitbucket Pipelines'
INFO: Detected project key 'teleadmin_opus-scenario-result-service' from 'Bitbucket Cloud Pipelines'
INFO: Detected organization key 'teleadmin' from 'Bitbucket Cloud Pipelines'
INFO: Load project settings for component key: 'teleadmin_opus-scenario-result-service'
INFO: Load project settings for component key: 'teleadmin_opus-scenario-result-service' (done) | time=237ms
INFO: Process project properties
INFO: Project key: teleadmin_opus-scenario-result-service
INFO: Base dir: /opt/atlassian/pipelines/agent/build
INFO: Working dir: /opt/atlassian/pipelines/agent/build/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=231ms
INFO: Check ALM binding of project 'teleadmin_opus-scenario-result-service'
INFO: Detected project binding: BOUND
INFO: Check ALM binding of project 'teleadmin_opus-scenario-result-service' (done) | time=114ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=132ms
INFO: Load branch configuration
INFO: Detected analysis for branch 'master'
INFO: Auto-configuring branch master
INFO: Load branch configuration (done) | time=4ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=281ms
INFO: Load active rules
INFO: Load active rules (done) | time=6591ms
INFO: Organization key: teleadmin
INFO: Branch name: master, type: long-lived
INFO: Preprocessing files...
INFO: 1 language detected in 13 preprocessed files
INFO: 54 files ignored because of inclusion/exclusion patterns
INFO: 0 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=3647ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=152ms
INFO: Indexing files...
INFO: Project configuration:
INFO:   Included sources: /src/**/*.py
INFO:   Excluded sources: **/build-wrapper-dump.json
INFO: 13 files indexed
INFO: Quality profile for py: Sonar way
INFO: ------------- Run sensors on module scenario-result
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=115ms
INFO: Sensor cache enabled
INFO: Resolved api base url 'https://api.sonarcloud.io' from host url 'https://sonarcloud.io'.
INFO: Load sensor cache
INFO: Load sensor cache (73 KB) | time=1572ms
INFO: Resolved api base url 'https://api.sonarcloud.io' from host url 'https://sonarcloud.io'.
INFO: Sensor Python Sensor [python]
WARN: Your code is analyzed as compatible with all Python 3 versions by default. You can get a more precise analysis by setting the exact Python version in your configuration via the parameter "sonar.python.version"
INFO: Starting global symbols computation
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: Starting rules execution
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: The Python analyzer was able to leverage cached data from previous analyses for 0 out of 13 files. These files were not parsed.
INFO: Sensor Python Sensor [python] (done) | time=3753ms
INFO: Sensor Cobertura Sensor for Python coverage [python]
INFO: Python test coverage
INFO: Parsing report '/opt/atlassian/pipelines/agent/build/coverage-reports/coverage-scenario-result.xml'
INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=187ms
INFO: Sensor PythonXUnitSensor [python]
INFO: Sensor PythonXUnitSensor [python] (done) | time=22ms
INFO: Sensor Import of Bandit issues [python]
INFO: Importing /opt/atlassian/pipelines/agent/build/bandit_report.json
INFO: Sensor Import of Bandit issues [python] (done) | time=21ms
INFO: Sensor Python Dependency Sensor [python]
INFO: Sensor Python Dependency Sensor [python] (done) | time=5ms
INFO: Sensor Python HTML templates processing [securitypythonfrontend]
INFO: Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=14ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3ms
INFO: Sensor Java Config Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor Java Config Sensor [iac] (done) | time=25ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=101ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=5ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=1ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=1ms
INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise]
INFO: Available processors: 2
INFO: Using 2 threads for analysis.
INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
  * The filename starts with "test"
  * The filename contains "test." or "tests."
  * Any directory in the file path is named: "doc", "docs", "test" or "tests"
  * Any directory in the file path has a name ending in "test" or "tests"
INFO: Using git CLI to retrieve untracked files
WARN: Analyzing only language associated files, make sure to run the analysis inside a git repository to make use of inclusions specified via "sonar.text.inclusions"
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=1140ms
INFO: Sensor javabugs [dbd]
INFO: Reading IR files from: /opt/atlassian/pipelines/agent/build/.scannerwork/ir/java
INFO: No IR files have been included for analysis.
INFO: Sensor javabugs [dbd] (done) | time=5ms
INFO: Sensor pythonbugs [dbd]
INFO: Reading IR files from: /opt/atlassian/pipelines/agent/build/.scannerwork/ir/python
INFO: Analyzing 43 functions to detect bugs.
INFO: Sensor pythonbugs [dbd] (done) | time=442ms
INFO: Sensor JavaSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/java
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.001
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.003
INFO: No UCFGs have been included for analysis.
INFO: java security sensor: Time spent was 00:00:00.035
INFO: java security sensor: Begin: 2025-03-27T20:41:18.898050387Z, End: 2025-03-27T20:41:18.934024410Z, Duration: 00:00:00.035
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.904241838Z, End: 2025-03-27T20:41:18.907477604Z, Duration: 00:00:00.003
    Load type hierarchy: Begin: 2025-03-27T20:41:18.904412142Z, End: 2025-03-27T20:41:18.906139745Z, Duration: 00:00:00.001
    Load UCFGs: Begin: 2025-03-27T20:41:18.906600990Z, End: 2025-03-27T20:41:18.907278614Z, Duration: 00:00:00.000
INFO: java security sensor peak memory: 211 MB
INFO: Sensor JavaSecuritySensor [security] (done) | time=40ms
INFO: Sensor CSharpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6547, S6549, S6639, S6641, S6680, S6776, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/ucfg2/cs
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: csharp security sensor: Time spent was 00:00:00.002
INFO: csharp security sensor: Begin: 2025-03-27T20:41:18.936306466Z, End: 2025-03-27T20:41:18.938371682Z, Duration: 00:00:00.002
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.936828765Z, End: 2025-03-27T20:41:18.937425801Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2025-03-27T20:41:18.936850439Z, End: 2025-03-27T20:41:18.937069104Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2025-03-27T20:41:18.937256207Z, End: 2025-03-27T20:41:18.937318035Z, Duration: 00:00:00.000
INFO: csharp security sensor peak memory: 211 MB
INFO: Sensor CSharpSecuritySensor [security] (done) | time=3ms
INFO: Sensor PhpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/php
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001
INFO: No UCFGs have been included for analysis.
INFO: php security sensor: Time spent was 00:00:00.002
INFO: php security sensor: Begin: 2025-03-27T20:41:18.940181486Z, End: 2025-03-27T20:41:18.942196861Z, Duration: 00:00:00.002
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.940567612Z, End: 2025-03-27T20:41:18.941729645Z, Duration: 00:00:00.001
    Load type hierarchy: Begin: 2025-03-27T20:41:18.940791783Z, End: 2025-03-27T20:41:18.941174765Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2025-03-27T20:41:18.941334797Z, End: 2025-03-27T20:41:18.941582210Z, Duration: 00:00:00.000
INFO: php security sensor peak memory: 211 MB
INFO: Sensor PhpSecuritySensor [security] (done) | time=4ms
INFO: Sensor PythonSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/python
INFO: Read 333 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.086
INFO: Load UCFGs: Starting
INFO: Reading UCFGs from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/python
INFO: Load UCFGs: Time spent was 00:00:00.380
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.468
INFO: Analyzing 1558 UCFGs to detect vulnerabilities.
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.000
INFO: Check cache: Time spent was 00:00:00.001
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.033
INFO: Run SCC (Tarjan) on 3325 nodes: Starting
INFO: Run SCC (Tarjan) on 3325 nodes: Time spent was 00:00:00.008
INFO: Tarjan found 3325 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.023
INFO: Variable Type Analysis #1: Time spent was 00:00:00.069
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.020
INFO: Run SCC (Tarjan) on 3311 nodes: Starting
INFO: Run SCC (Tarjan) on 3311 nodes: Time spent was 00:00:00.007
INFO: Tarjan found 3311 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.012
INFO: Variable Type Analysis #2: Time spent was 00:00:00.042
INFO: Create runtime call graph: Time spent was 00:00:00.120
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.447
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.032
INFO: All rules entry points : 3
INFO: Slice call graph: Starting
INFO: Retained UCFGs : 7
INFO: Slice call graph: Time spent was 00:00:00.001
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.007
INFO: Taint analysis for python: Starting
INFO: 0 / 7 UCFGs simulated, memory usage: 122 MB
INFO: 7 / 7 UCFGs simulated, memory usage: 126 MB
INFO: Taint analysis for python: Time spent was 00:00:00.117
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.003
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.004
INFO: python security sensor: Time spent was 00:00:01.212
INFO: python security sensor: Begin: 2025-03-27T20:41:18.943794760Z, End: 2025-03-27T20:41:20.156746062Z, Duration: 00:00:01.212
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.944180055Z, End: 2025-03-27T20:41:19.412279890Z, Duration: 00:00:00.468
    Load type hierarchy: Begin: 2025-03-27T20:41:18.944312889Z, End: 2025-03-27T20:41:19.030677312Z, Duration: 00:00:00.086
    Load UCFGs: Begin: 2025-03-27T20:41:19.031062617Z, End: 2025-03-27T20:41:19.411825929Z, Duration: 00:00:00.380
  Check cache: Begin: 2025-03-27T20:41:19.412434180Z, End: 2025-03-27T20:41:19.413746356Z, Duration: 00:00:00.001
    Load cache: Begin: 2025-03-27T20:41:19.412764637Z, End: 2025-03-27T20:41:19.412897110Z, Duration: 00:00:00.000
  Create runtime call graph: Begin: 2025-03-27T20:41:19.413929459Z, End: 2025-03-27T20:41:19.534748855Z, Duration: 00:00:00.120
    Variable Type Analysis #1: Begin: 2025-03-27T20:41:19.415771002Z, End: 2025-03-27T20:41:19.484928033Z, Duration: 00:00:00.069
      Create runtime type propagation graph: Begin: 2025-03-27T20:41:19.417679149Z, End: 2025-03-27T20:41:19.450865233Z, Duration: 00:00:00.033
      Run SCC (Tarjan) on 3325 nodes: Begin: 2025-03-27T20:41:19.451837472Z, End: 2025-03-27T20:41:19.460775188Z, Duration: 00:00:00.008
      Propagate runtime types to strongly connected components: Begin: 2025-03-27T20:41:19.461391286Z, End: 2025-03-27T20:41:19.484484669Z, Duration: 00:00:00.023
    Variable Type Analysis #2: Begin: 2025-03-27T20:41:19.488993226Z, End: 2025-03-27T20:41:19.531175064Z, Duration: 00:00:00.042
      Create runtime type propagation graph: Begin: 2025-03-27T20:41:19.489210280Z, End: 2025-03-27T20:41:19.509309191Z, Duration: 00:00:00.020
      Run SCC (Tarjan) on 3311 nodes: Begin: 2025-03-27T20:41:19.509832424Z, End: 2025-03-27T20:41:19.517546688Z, Duration: 00:00:00.007
      Propagate runtime types to strongly connected components: Begin: 2025-03-27T20:41:19.517925136Z, End: 2025-03-27T20:41:19.530779263Z, Duration: 00:00:00.012
  Load config: Begin: 2025-03-27T20:41:19.535556379Z, End: 2025-03-27T20:41:19.983309603Z, Duration: 00:00:00.447
  Compute entry points: Begin: 2025-03-27T20:41:19.983995007Z, End: 2025-03-27T20:41:20.016607888Z, Duration: 00:00:00.032
  Slice call graph: Begin: 2025-03-27T20:41:20.017540235Z, End: 2025-03-27T20:41:20.019019387Z, Duration: 00:00:00.001
  Live variable analysis: Begin: 2025-03-27T20:41:20.019672563Z, End: 2025-03-27T20:41:20.027306765Z, Duration: 00:00:00.007
  Taint analysis for python: Begin: 2025-03-27T20:41:20.028089420Z, End: 2025-03-27T20:41:20.146059073Z, Duration: 00:00:00.117
  Report issues: Begin: 2025-03-27T20:41:20.146440552Z, End: 2025-03-27T20:41:20.149830626Z, Duration: 00:00:00.003
  Store cache: Begin: 2025-03-27T20:41:20.151406874Z, End: 2025-03-27T20:41:20.155435753Z, Duration: 00:00:00.004
INFO: python security sensor peak memory: 214 MB
INFO: Sensor PythonSecuritySensor [security] (done) | time=1215ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001
INFO: No UCFGs have been included for analysis.
INFO: js security sensor: Time spent was 00:00:00.002
INFO: js security sensor: Begin: 2025-03-27T20:41:20.159155123Z, End: 2025-03-27T20:41:20.162076838Z, Duration: 00:00:00.002
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:20.160169263Z, End: 2025-03-27T20:41:20.161574519Z, Duration: 00:00:00.001
    Load type hierarchy: Begin: 2025-03-27T20:41:20.160359289Z, End: 2025-03-27T20:41:20.160849238Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2025-03-27T20:41:20.161090337Z, End: 2025-03-27T20:41:20.161310552Z, Duration: 00:00:00.000
INFO: js security sensor peak memory: 214 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=4ms
INFO: Sensor KotlinSecuritySensor [security]
INFO: No taint analysis rules have been enabled, will not execute taint analysis.
INFO: kotlin security sensor: Time spent was 00:00:00.000
INFO: kotlin security sensor: Begin: 2025-03-27T20:41:20.163489300Z, End: 2025-03-27T20:41:20.163893887Z, Duration: 00:00:00.000
INFO: kotlin security sensor peak memory: 214 MB
INFO: Sensor KotlinSecuritySensor [security] (done) | time=1ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=1ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 4 source files to be analyzed
INFO: SCM Publisher 4/4 source files have been analyzed (done) | time=225ms
INFO: CPD Executor 7 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 6 files
INFO: CPD Executor CPD calculation finished (done) | time=15ms
INFO: Analysis report generated in 355ms, dir size=293 KB
INFO: Analysis report compressed in 87ms, zip size=77 KB
INFO: Analysis report uploaded in 374ms
INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=teleadmin_opus-scenario-result-service&branch=master
INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZXZVoazzUcoFBtKGI66
INFO: Sensor cache published successfully
INFO: Analysis total time: 25.809 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 32.161s
INFO: Final Memory: 71M/221M
INFO: ------------------------------------------------------------------------
✔ SonarCloud analysis was successful.

There were around 100 new lines of code added on this branch along with test coverage, but the UI still shows not enough lines and 0 New Lines.

Hi,

It’s not clear to me that the new screenshot and the new log go together.

For this branch

I would expect to see the New Code and Overall Code tabs in the UI. E.G.

Instead, this looks like a PR analysis:

 
Ann

Here’s the correct log:

INFO: Running the sonar scanner...
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: NONE
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.14 Amazon.com Inc. (64-bit)
INFO: Linux 6.1.79 amd64
INFO: SONAR_SCANNER_OPTS=-Xmx512m -Dsonar.python.bandit.reportPaths=bandit_report.json
INFO: Bitbucket Cloud Pipelines detected, no host variable set. Defaulting to sonarcloud.io.
INFO: User cache: /root/.sonar/cache
INFO: Analyzing on SonarQube server 11.8.0.412
INFO: Default locale: "en", source code encoding: "UTF-8" (analysis is platform dependent)
INFO: Load global settings
INFO: Load global settings (done) | time=480ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=160ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=782ms
INFO: Found an active CI vendor: 'Bitbucket Pipelines'
INFO: Detected project key 'teleadmin_opus-scenario-result-service' from 'Bitbucket Cloud Pipelines'
INFO: Detected organization key 'teleadmin' from 'Bitbucket Cloud Pipelines'
INFO: Load project settings for component key: 'teleadmin_opus-scenario-result-service'
INFO: Load project settings for component key: 'teleadmin_opus-scenario-result-service' (done) | time=259ms
INFO: Process project properties
INFO: Project key: teleadmin_opus-scenario-result-service
INFO: Base dir: /opt/atlassian/pipelines/agent/build
INFO: Working dir: /opt/atlassian/pipelines/agent/build/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=235ms
INFO: Check ALM binding of project 'teleadmin_opus-scenario-result-service'
INFO: Detected project binding: BOUND
INFO: Check ALM binding of project 'teleadmin_opus-scenario-result-service' (done) | time=107ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=118ms
INFO: Load branch configuration
INFO: Detected analysis for branch 'DIQ-218'
INFO: Auto-configuring branch DIQ-218
INFO: Load branch configuration (done) | time=4ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=331ms
INFO: Load active rules
INFO: Load active rules (done) | time=6683ms
INFO: Organization key: teleadmin
INFO: Branch name: DIQ-218, type: short-lived
INFO: Preprocessing files...
INFO: 1 language detected in 13 preprocessed files
INFO: 54 files ignored because of inclusion/exclusion patterns
INFO: 0 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=3450ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=142ms
INFO: SCM collecting changed files in the branch
WARN: Could not find ref: master in refs/heads, refs/remotes/upstream or refs/remotes/origin
INFO: SCM collecting changed files in the branch (done) | time=341ms
INFO: Indexing files...
INFO: Project configuration:
INFO:   Included sources: /src/**/*.py
INFO:   Excluded sources: **/build-wrapper-dump.json
INFO: 13 files indexed
INFO: Quality profile for py: Sonar way
INFO: ------------- Run sensors on module scenario-result
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=115ms
INFO: Sensor cache enabled
INFO: Resolved api base url 'https://api.sonarcloud.io' from host url 'https://sonarcloud.io'.
INFO: Load sensor cache
INFO: Load sensor cache (76 KB) | time=1912ms
INFO: Resolved api base url 'https://api.sonarcloud.io' from host url 'https://sonarcloud.io'.
INFO: Sensor Python Sensor [python]
WARN: Your code is analyzed as compatible with all Python 3 versions by default. You can get a more precise analysis by setting the exact Python version in your configuration via the parameter "sonar.python.version"
INFO: Starting global symbols computation
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: Starting rules execution
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: The Python analyzer was able to leverage cached data from previous analyses for 0 out of 13 files. These files were not parsed.
INFO: Sensor Python Sensor [python] (done) | time=3725ms
INFO: Sensor Cobertura Sensor for Python coverage [python]
INFO: Python test coverage
INFO: Parsing report '/opt/atlassian/pipelines/agent/build/coverage-reports/coverage-scenario-result.xml'
INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=180ms
INFO: Sensor PythonXUnitSensor [python]
INFO: Sensor PythonXUnitSensor [python] (done) | time=24ms
INFO: Sensor Import of Bandit issues [python]
INFO: Importing /opt/atlassian/pipelines/agent/build/bandit_report.json
INFO: Sensor Import of Bandit issues [python] (done) | time=27ms
INFO: Sensor Python Dependency Sensor [python]
INFO: Sensor Python Dependency Sensor [python] (done) | time=8ms
INFO: Sensor Python HTML templates processing [securitypythonfrontend]
INFO: Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=17ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=4ms
INFO: Sensor Java Config Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor Java Config Sensor [iac] (done) | time=42ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=197ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=5ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=1ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=1ms
INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise]
INFO: Available processors: 2
INFO: Using 2 threads for analysis.
INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
  * The filename starts with "test"
  * The filename contains "test." or "tests."
  * Any directory in the file path is named: "doc", "docs", "test" or "tests"
  * Any directory in the file path has a name ending in "test" or "tests"
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.000
INFO: Check cache: Time spent was 00:00:00.000
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.051
INFO: Run SCC (Tarjan) on 3325 nodes: Starting
INFO: Run SCC (Tarjan) on 3325 nodes: Time spent was 00:00:00.011
INFO: Tarjan found 3325 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.022
INFO: Variable Type Analysis #1: Time spent was 00:00:00.089
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.023
INFO: Run SCC (Tarjan) on 3311 nodes: Starting
INFO: Run SCC (Tarjan) on 3311 nodes: Time spent was 00:00:00.004
INFO: Tarjan found 3311 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.012
INFO: Variable Type Analysis #2: Time spent was 00:00:00.042
INFO: Create runtime call graph: Time spent was 00:00:00.140
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.467
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.040
INFO: All rules entry points : 3
INFO: Slice call graph: Starting
INFO: Retained UCFGs : 7
INFO: Slice call graph: Time spent was 00:00:00.001
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.005
INFO: Taint analysis for python: Starting
INFO: 0 / 7 UCFGs simulated, memory usage: 179 MB
INFO: 7 / 7 UCFGs simulated, memory usage: 183 MB
INFO: Taint analysis for python: Time spent was 00:00:00.099
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.004
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.006
INFO: python security sensor: Time spent was 00:00:01.379
INFO: python security sensor: Begin: 2025-03-27T20:04:31.368469949Z, End: 2025-03-27T20:04:32.747907543Z, Duration: 00:00:01.379
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:04:31.368744022Z, End: 2025-03-27T20:04:31.973592563Z, Duration: 00:00:00.604
    Load type hierarchy: Begin: 2025-03-27T20:04:31.368760891Z, End: 2025-03-27T20:04:31.530144526Z, Duration: 00:00:00.161
    Load UCFGs: Begin: 2025-03-27T20:04:31.530923366Z, End: 2025-03-27T20:04:31.973236042Z, Duration: 00:00:00.442
  Check cache: Begin: 2025-03-27T20:04:31.973685772Z, End: 2025-03-27T20:04:31.974171312Z, Duration: 00:00:00.000
    Load cache: Begin: 2025-03-27T20:04:31.973708776Z, End: 2025-03-27T20:04:31.973746605Z, Duration: 00:00:00.000
  Create runtime call graph: Begin: 2025-03-27T20:04:31.974789148Z, End: 2025-03-27T20:04:32.115108348Z, Duration: 00:00:00.140
    Variable Type Analysis #1: Begin: 2025-03-27T20:04:31.975608681Z, End: 2025-03-27T20:04:32.064884900Z, Duration: 00:00:00.089
      Create runtime type propagation graph: Begin: 2025-03-27T20:04:31.976586423Z, End: 2025-03-27T20:04:32.028582029Z, Duration: 00:00:00.051
      Run SCC (Tarjan) on 3325 nodes: Begin: 2025-03-27T20:04:32.029648762Z, End: 2025-03-27T20:04:32.041615305Z, Duration: 00:00:00.011
      Propagate runtime types to strongly connected components: Begin: 2025-03-27T20:04:32.041980539Z, End: 2025-03-27T20:04:32.064592398Z, Duration: 00:00:00.022
    Variable Type Analysis #2: Begin: 2025-03-27T20:04:32.068496697Z, End: 2025-03-27T20:04:32.111037434Z, Duration: 00:00:00.042
      Create runtime type propagation graph: Begin: 2025-03-27T20:04:32.068580812Z, End: 2025-03-27T20:04:32.092206876Z, Duration: 00:00:00.023
      Run SCC (Tarjan) on 3311 nodes: Begin: 2025-03-27T20:04:32.092529280Z, End: 2025-03-27T20:04:32.097196063Z, Duration: 00:00:00.004
      Propagate runtime types to strongly connected components: Begin: 2025-03-27T20:04:32.097850238Z, End: 2025-03-27T20:04:32.110697086Z, Duration: 00:00:00.012
  Load config: Begin: 2025-03-27T20:04:32.115347945Z, End: 2025-03-27T20:04:32.582878192Z, Duration: 00:00:00.467
  Compute entry points: Begin: 2025-03-27T20:04:32.583336429Z, End: 2025-03-27T20:04:32.623875737Z, Duration: 00:00:00.040
  Slice call graph: Begin: 2025-03-27T20:04:32.624220059Z, End: 2025-03-27T20:04:32.626057540Z, Duration: 00:00:00.001
  Live variable analysis: Begin: 2025-03-27T20:04:32.626252090Z, End: 2025-03-27T20:04:32.631428484Z, Duration: 00:00:00.005
  Taint analysis for python: Begin: 2025-03-27T20:04:32.631810753Z, End: 2025-03-27T20:04:32.731385764Z, Duration: 00:00:00.099
  Report issues: Begin: 2025-03-27T20:04:32.731591918Z, End: 2025-03-27T20:04:32.736369279Z, Duration: 00:00:00.004
  Store cache: Begin: 2025-03-27T20:04:32.738045369Z, End: 2025-03-27T20:04:32.745042293Z, Duration: 00:00:00.006
INFO: python security sensor peak memory: 253 MB
INFO: Sensor PythonSecuritySensor [security] (done) | time=1386ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: js security sensor: Time spent was 00:00:00.001
INFO: js security sensor: Begin: 2025-03-27T20:04:32.758320473Z, End: 2025-03-27T20:04:32.760176916Z, Duration: 00:00:00.001
  Load type hierarchy and UCFGs: Begin: 2025-03-27T20:04:32.759387311Z, End: 2025-03-27T20:04:32.759842006Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2025-03-27T20:04:32.759410553Z, End: 2025-03-27T20:04:32.759614043Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2025-03-27T20:04:32.759750771Z, End: 2025-03-27T20:04:32.759789562Z, Duration: 00:00:00.000
INFO: js security sensor peak memory: 253 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=2ms
INFO: Sensor KotlinSecuritySensor [security]
INFO: No taint analysis rules have been enabled, will not execute taint analysis.
INFO: kotlin security sensor: Time spent was 00:00:00.000
INFO: kotlin security sensor: Begin: 2025-03-27T20:04:32.761013036Z, End: 2025-03-27T20:04:32.761351561Z, Duration: 00:00:00.000
INFO: kotlin security sensor peak memory: 253 MB
INFO: Sensor KotlinSecuritySensor [security] (done) | time=4ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=2ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 4 source files to be analyzed
INFO: SCM Publisher 4/4 source files have been analyzed (done) | time=107ms
INFO: CPD Executor 7 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 6 files
INFO: CPD Executor CPD calculation finished (done) | time=11ms
INFO: SCM writing changed lines
WARN: Could not find ref: master in refs/heads, refs/remotes/upstream or refs/remotes/origin
INFO: SCM writing changed lines (done) | time=4ms
INFO: Analysis report generated in 310ms, dir size=284 KB
INFO: Analysis report compressed in 32ms, zip size=68 KB
INFO: Analysis report uploaded in 394ms
INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=teleadmin_opus-scenario-result-service&branch=DIQ-218&resolved=false
INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZXZNNc0hN1MGpvqA4BR
INFO: Sensor cache published successfully
INFO: Analysis total time: 26.698 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 38.005s
INFO: Final Memory: 71M/244M
INFO: ------------------------------------------------------------------------
✔ SonarCloud analysis was successful.

Hi,

Again, we’re dealing with a short-lived branch, where the prerequisites are not in place:

And I’m also back to this:

 
Ann