Environment:
- Java: JetBrains s.r.o. 17.0.8
- OS: Windows 10 amd64
- IDE: IntelliJ IDEA 2023.2.2
- SonarLint: 10.0.1.77000
java.lang.IllegalStateException: Unable to extract rules metadata
at o.ss.sl.core.rule.extractor.RulesDefinitionExtractor.extractRules(RulesDefinitionExtractor.java:42)
at o.ss.sl.core.AbstractSonarLintEngine.loadPluginMetadata(AbstractSonarLintEngine.java:77)
at o.ss.sl.core.ConnectedSonarLintEngineImpl.loadAnalysisContext(ConnectedSonarLintEngineImpl.java:123)
at o.ss.sl.core.ConnectedSonarLintEngineImpl.start(ConnectedSonarLintEngineImpl.java:115)
at o.ss.sl.core.ConnectedSonarLintEngineImpl.<init>(ConnectedSonarLintEngineImpl.java:105)
at o.sl.ij.core.SonarLintEngineFactory.createEngine(SonarLintEngineFactory.java:62)
at o.sl.ij.core.DefaultEngineManager.lambda$createConnectedEngine$2(DefaultEngineManager.java:118)
at java.base/java.util.Optional.map(Optional.java:260)
at o.sl.ij.core.DefaultEngineManager.createConnectedEngine(DefaultEngineManager.java:118)
at java.base/java.util.HashMap.computeIfAbsent(HashMap.java:1220)
at o.sl.ij.core.DefaultEngineManager.getConnectedEngine(DefaultEngineManager.java:112)
at o.sl.ij.core.ProjectBindingManager.getConnectedEngineSkipChecks(ProjectBindingManager.java:102)
at o.sl.ij.core.ProjectBindingManager.getValidConnectedEngine(ProjectBindingManager.java:135)
at o.sl.ij.finding.issue.vulnerabilities.TaintVulnerabilitiesLoader.getTaintVulnerabilitiesByOpenedFiles(TaintVulnerabilitiesLoader.kt:42)
at o.sl.ij.finding.issue.vulnerabilities.TaintVulnerabilitiesPresenter$presentTaintVulnerabilitiesForOpenFiles$1.run(TaintVulnerabilitiesPresenter.kt:116)