Whoops, here are the full logs from a different branch:
INFO: Running the sonar scanner...
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: NONE
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.14 Amazon.com Inc. (64-bit)
INFO: Linux 6.1.79 amd64
INFO: SONAR_SCANNER_OPTS=-Xmx512m -Dsonar.python.bandit.reportPaths=bandit_report.json
INFO: Bitbucket Cloud Pipelines detected, no host variable set. Defaulting to sonarcloud.io.
INFO: User cache: /root/.sonar/cache
INFO: Analyzing on SonarQube server 11.8.0.412
INFO: Default locale: "en", source code encoding: "UTF-8" (analysis is platform dependent)
INFO: Load global settings
INFO: Load global settings (done) | time=455ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=171ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=756ms
INFO: Found an active CI vendor: 'Bitbucket Pipelines'
INFO: Detected project key 'teleadmin_opus-scenario-result-service' from 'Bitbucket Cloud Pipelines'
INFO: Detected organization key 'teleadmin' from 'Bitbucket Cloud Pipelines'
INFO: Load project settings for component key: 'teleadmin_opus-scenario-result-service'
INFO: Load project settings for component key: 'teleadmin_opus-scenario-result-service' (done) | time=237ms
INFO: Process project properties
INFO: Project key: teleadmin_opus-scenario-result-service
INFO: Base dir: /opt/atlassian/pipelines/agent/build
INFO: Working dir: /opt/atlassian/pipelines/agent/build/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=231ms
INFO: Check ALM binding of project 'teleadmin_opus-scenario-result-service'
INFO: Detected project binding: BOUND
INFO: Check ALM binding of project 'teleadmin_opus-scenario-result-service' (done) | time=114ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=132ms
INFO: Load branch configuration
INFO: Detected analysis for branch 'master'
INFO: Auto-configuring branch master
INFO: Load branch configuration (done) | time=4ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=281ms
INFO: Load active rules
INFO: Load active rules (done) | time=6591ms
INFO: Organization key: teleadmin
INFO: Branch name: master, type: long-lived
INFO: Preprocessing files...
INFO: 1 language detected in 13 preprocessed files
INFO: 54 files ignored because of inclusion/exclusion patterns
INFO: 0 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=3647ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=152ms
INFO: Indexing files...
INFO: Project configuration:
INFO: Included sources: /src/**/*.py
INFO: Excluded sources: **/build-wrapper-dump.json
INFO: 13 files indexed
INFO: Quality profile for py: Sonar way
INFO: ------------- Run sensors on module scenario-result
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=115ms
INFO: Sensor cache enabled
INFO: Resolved api base url 'https://api.sonarcloud.io' from host url 'https://sonarcloud.io'.
INFO: Load sensor cache
INFO: Load sensor cache (73 KB) | time=1572ms
INFO: Resolved api base url 'https://api.sonarcloud.io' from host url 'https://sonarcloud.io'.
INFO: Sensor Python Sensor [python]
WARN: Your code is analyzed as compatible with all Python 3 versions by default. You can get a more precise analysis by setting the exact Python version in your configuration via the parameter "sonar.python.version"
INFO: Starting global symbols computation
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: Starting rules execution
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: The Python analyzer was able to leverage cached data from previous analyses for 0 out of 13 files. These files were not parsed.
INFO: Sensor Python Sensor [python] (done) | time=3753ms
INFO: Sensor Cobertura Sensor for Python coverage [python]
INFO: Python test coverage
INFO: Parsing report '/opt/atlassian/pipelines/agent/build/coverage-reports/coverage-scenario-result.xml'
INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=187ms
INFO: Sensor PythonXUnitSensor [python]
INFO: Sensor PythonXUnitSensor [python] (done) | time=22ms
INFO: Sensor Import of Bandit issues [python]
INFO: Importing /opt/atlassian/pipelines/agent/build/bandit_report.json
INFO: Sensor Import of Bandit issues [python] (done) | time=21ms
INFO: Sensor Python Dependency Sensor [python]
INFO: Sensor Python Dependency Sensor [python] (done) | time=5ms
INFO: Sensor Python HTML templates processing [securitypythonfrontend]
INFO: Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=14ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3ms
INFO: Sensor Java Config Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor Java Config Sensor [iac] (done) | time=25ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=101ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=5ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=1ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=1ms
INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise]
INFO: Available processors: 2
INFO: Using 2 threads for analysis.
INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
* The filename starts with "test"
* The filename contains "test." or "tests."
* Any directory in the file path is named: "doc", "docs", "test" or "tests"
* Any directory in the file path has a name ending in "test" or "tests"
INFO: Using git CLI to retrieve untracked files
WARN: Analyzing only language associated files, make sure to run the analysis inside a git repository to make use of inclusions specified via "sonar.text.inclusions"
INFO: 13 source files to be analyzed
INFO: 13/13 source files have been analyzed
INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=1140ms
INFO: Sensor javabugs [dbd]
INFO: Reading IR files from: /opt/atlassian/pipelines/agent/build/.scannerwork/ir/java
INFO: No IR files have been included for analysis.
INFO: Sensor javabugs [dbd] (done) | time=5ms
INFO: Sensor pythonbugs [dbd]
INFO: Reading IR files from: /opt/atlassian/pipelines/agent/build/.scannerwork/ir/python
INFO: Analyzing 43 functions to detect bugs.
INFO: Sensor pythonbugs [dbd] (done) | time=442ms
INFO: Sensor JavaSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/java
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.001
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.003
INFO: No UCFGs have been included for analysis.
INFO: java security sensor: Time spent was 00:00:00.035
INFO: java security sensor: Begin: 2025-03-27T20:41:18.898050387Z, End: 2025-03-27T20:41:18.934024410Z, Duration: 00:00:00.035
Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.904241838Z, End: 2025-03-27T20:41:18.907477604Z, Duration: 00:00:00.003
Load type hierarchy: Begin: 2025-03-27T20:41:18.904412142Z, End: 2025-03-27T20:41:18.906139745Z, Duration: 00:00:00.001
Load UCFGs: Begin: 2025-03-27T20:41:18.906600990Z, End: 2025-03-27T20:41:18.907278614Z, Duration: 00:00:00.000
INFO: java security sensor peak memory: 211 MB
INFO: Sensor JavaSecuritySensor [security] (done) | time=40ms
INFO: Sensor CSharpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6547, S6549, S6639, S6641, S6680, S6776, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/ucfg2/cs
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: csharp security sensor: Time spent was 00:00:00.002
INFO: csharp security sensor: Begin: 2025-03-27T20:41:18.936306466Z, End: 2025-03-27T20:41:18.938371682Z, Duration: 00:00:00.002
Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.936828765Z, End: 2025-03-27T20:41:18.937425801Z, Duration: 00:00:00.000
Load type hierarchy: Begin: 2025-03-27T20:41:18.936850439Z, End: 2025-03-27T20:41:18.937069104Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2025-03-27T20:41:18.937256207Z, End: 2025-03-27T20:41:18.937318035Z, Duration: 00:00:00.000
INFO: csharp security sensor peak memory: 211 MB
INFO: Sensor CSharpSecuritySensor [security] (done) | time=3ms
INFO: Sensor PhpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/php
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001
INFO: No UCFGs have been included for analysis.
INFO: php security sensor: Time spent was 00:00:00.002
INFO: php security sensor: Begin: 2025-03-27T20:41:18.940181486Z, End: 2025-03-27T20:41:18.942196861Z, Duration: 00:00:00.002
Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.940567612Z, End: 2025-03-27T20:41:18.941729645Z, Duration: 00:00:00.001
Load type hierarchy: Begin: 2025-03-27T20:41:18.940791783Z, End: 2025-03-27T20:41:18.941174765Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2025-03-27T20:41:18.941334797Z, End: 2025-03-27T20:41:18.941582210Z, Duration: 00:00:00.000
INFO: php security sensor peak memory: 211 MB
INFO: Sensor PhpSecuritySensor [security] (done) | time=4ms
INFO: Sensor PythonSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839, S7044
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/python
INFO: Read 333 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.086
INFO: Load UCFGs: Starting
INFO: Reading UCFGs from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/python
INFO: Load UCFGs: Time spent was 00:00:00.380
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.468
INFO: Analyzing 1558 UCFGs to detect vulnerabilities.
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.000
INFO: Check cache: Time spent was 00:00:00.001
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.033
INFO: Run SCC (Tarjan) on 3325 nodes: Starting
INFO: Run SCC (Tarjan) on 3325 nodes: Time spent was 00:00:00.008
INFO: Tarjan found 3325 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.023
INFO: Variable Type Analysis #1: Time spent was 00:00:00.069
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.020
INFO: Run SCC (Tarjan) on 3311 nodes: Starting
INFO: Run SCC (Tarjan) on 3311 nodes: Time spent was 00:00:00.007
INFO: Tarjan found 3311 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.012
INFO: Variable Type Analysis #2: Time spent was 00:00:00.042
INFO: Create runtime call graph: Time spent was 00:00:00.120
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.447
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.032
INFO: All rules entry points : 3
INFO: Slice call graph: Starting
INFO: Retained UCFGs : 7
INFO: Slice call graph: Time spent was 00:00:00.001
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.007
INFO: Taint analysis for python: Starting
INFO: 0 / 7 UCFGs simulated, memory usage: 122 MB
INFO: 7 / 7 UCFGs simulated, memory usage: 126 MB
INFO: Taint analysis for python: Time spent was 00:00:00.117
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.003
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.004
INFO: python security sensor: Time spent was 00:00:01.212
INFO: python security sensor: Begin: 2025-03-27T20:41:18.943794760Z, End: 2025-03-27T20:41:20.156746062Z, Duration: 00:00:01.212
Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:18.944180055Z, End: 2025-03-27T20:41:19.412279890Z, Duration: 00:00:00.468
Load type hierarchy: Begin: 2025-03-27T20:41:18.944312889Z, End: 2025-03-27T20:41:19.030677312Z, Duration: 00:00:00.086
Load UCFGs: Begin: 2025-03-27T20:41:19.031062617Z, End: 2025-03-27T20:41:19.411825929Z, Duration: 00:00:00.380
Check cache: Begin: 2025-03-27T20:41:19.412434180Z, End: 2025-03-27T20:41:19.413746356Z, Duration: 00:00:00.001
Load cache: Begin: 2025-03-27T20:41:19.412764637Z, End: 2025-03-27T20:41:19.412897110Z, Duration: 00:00:00.000
Create runtime call graph: Begin: 2025-03-27T20:41:19.413929459Z, End: 2025-03-27T20:41:19.534748855Z, Duration: 00:00:00.120
Variable Type Analysis #1: Begin: 2025-03-27T20:41:19.415771002Z, End: 2025-03-27T20:41:19.484928033Z, Duration: 00:00:00.069
Create runtime type propagation graph: Begin: 2025-03-27T20:41:19.417679149Z, End: 2025-03-27T20:41:19.450865233Z, Duration: 00:00:00.033
Run SCC (Tarjan) on 3325 nodes: Begin: 2025-03-27T20:41:19.451837472Z, End: 2025-03-27T20:41:19.460775188Z, Duration: 00:00:00.008
Propagate runtime types to strongly connected components: Begin: 2025-03-27T20:41:19.461391286Z, End: 2025-03-27T20:41:19.484484669Z, Duration: 00:00:00.023
Variable Type Analysis #2: Begin: 2025-03-27T20:41:19.488993226Z, End: 2025-03-27T20:41:19.531175064Z, Duration: 00:00:00.042
Create runtime type propagation graph: Begin: 2025-03-27T20:41:19.489210280Z, End: 2025-03-27T20:41:19.509309191Z, Duration: 00:00:00.020
Run SCC (Tarjan) on 3311 nodes: Begin: 2025-03-27T20:41:19.509832424Z, End: 2025-03-27T20:41:19.517546688Z, Duration: 00:00:00.007
Propagate runtime types to strongly connected components: Begin: 2025-03-27T20:41:19.517925136Z, End: 2025-03-27T20:41:19.530779263Z, Duration: 00:00:00.012
Load config: Begin: 2025-03-27T20:41:19.535556379Z, End: 2025-03-27T20:41:19.983309603Z, Duration: 00:00:00.447
Compute entry points: Begin: 2025-03-27T20:41:19.983995007Z, End: 2025-03-27T20:41:20.016607888Z, Duration: 00:00:00.032
Slice call graph: Begin: 2025-03-27T20:41:20.017540235Z, End: 2025-03-27T20:41:20.019019387Z, Duration: 00:00:00.001
Live variable analysis: Begin: 2025-03-27T20:41:20.019672563Z, End: 2025-03-27T20:41:20.027306765Z, Duration: 00:00:00.007
Taint analysis for python: Begin: 2025-03-27T20:41:20.028089420Z, End: 2025-03-27T20:41:20.146059073Z, Duration: 00:00:00.117
Report issues: Begin: 2025-03-27T20:41:20.146440552Z, End: 2025-03-27T20:41:20.149830626Z, Duration: 00:00:00.003
Store cache: Begin: 2025-03-27T20:41:20.151406874Z, End: 2025-03-27T20:41:20.155435753Z, Duration: 00:00:00.004
INFO: python security sensor peak memory: 214 MB
INFO: Sensor PythonSecuritySensor [security] (done) | time=1215ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /opt/atlassian/pipelines/agent/build/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001
INFO: No UCFGs have been included for analysis.
INFO: js security sensor: Time spent was 00:00:00.002
INFO: js security sensor: Begin: 2025-03-27T20:41:20.159155123Z, End: 2025-03-27T20:41:20.162076838Z, Duration: 00:00:00.002
Load type hierarchy and UCFGs: Begin: 2025-03-27T20:41:20.160169263Z, End: 2025-03-27T20:41:20.161574519Z, Duration: 00:00:00.001
Load type hierarchy: Begin: 2025-03-27T20:41:20.160359289Z, End: 2025-03-27T20:41:20.160849238Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2025-03-27T20:41:20.161090337Z, End: 2025-03-27T20:41:20.161310552Z, Duration: 00:00:00.000
INFO: js security sensor peak memory: 214 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=4ms
INFO: Sensor KotlinSecuritySensor [security]
INFO: No taint analysis rules have been enabled, will not execute taint analysis.
INFO: kotlin security sensor: Time spent was 00:00:00.000
INFO: kotlin security sensor: Begin: 2025-03-27T20:41:20.163489300Z, End: 2025-03-27T20:41:20.163893887Z, Duration: 00:00:00.000
INFO: kotlin security sensor peak memory: 214 MB
INFO: Sensor KotlinSecuritySensor [security] (done) | time=1ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=1ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 4 source files to be analyzed
INFO: SCM Publisher 4/4 source files have been analyzed (done) | time=225ms
INFO: CPD Executor 7 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 6 files
INFO: CPD Executor CPD calculation finished (done) | time=15ms
INFO: Analysis report generated in 355ms, dir size=293 KB
INFO: Analysis report compressed in 87ms, zip size=77 KB
INFO: Analysis report uploaded in 374ms
INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=teleadmin_opus-scenario-result-service&branch=master
INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZXZVoazzUcoFBtKGI66
INFO: Sensor cache published successfully
INFO: Analysis total time: 25.809 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 32.161s
INFO: Final Memory: 71M/221M
INFO: ------------------------------------------------------------------------
✔ SonarCloud analysis was successful.
There were around 100 new lines of code added on this branch along with test coverage, but the UI still shows not enough lines
and 0 New Lines
.