Gitlab merge request has not code

Hi, when I make an MR, there is no code inside the MR, but when it goes to the quality gate the code does appear.

.gitlab-ci.yml

sonarcloud-check:
  image:
    name: sonarsource/sonar-scanner-cli:latest
    entrypoint: [""]
  cache:
    key: "${CI_JOB_NAME}"
    paths:
      - .sonar/cache
  script:
      - sonar-scanner
  stage: Test
  only:
    - merge_requests
    - master
    - develop
    - main

Hi,

What actually changed in the MR? Were there changes to code?

 
Thx,
Ann

If I make small changes to see if it analyzes, and perhaps also add changes that I know are a problem and it doesn’t analyze it either.

Hi,

Are these small changes you’re making to code or are they to things like configuration files?

 
Ann

in the code

Hi,

Can you share the analysis log?

The analysis / scanner log is what’s output from the analysis command. Hopefully, the log you provide - redacted as necessary - will include that command as well.

This guide will help you find them.

 
Thx,
Ann

yes, this?

and this is the example of changes

Hi,

I’m looking for the full text of the analysis log. Your screenshot is partial (and log screenshots are hard to deal with). Please copy/paste the full text of the analysis log, starting from the analysis command itself.

 
Thx,
Ann

e[0KRunning with gitlab-runner 17.4.0~pre.110.g27400594 (27400594)e[0;m
e[0K  on blue-4.saas-linux-small-amd64.runners-manager.gitlab.com/default J2nyww-s, system ID: s_cf1798852952e[0;m
section_start:1726585728:prepare_executor
e[0Ke[0Ke[36;1mPreparing the "docker+machine" executore[0;me[0;m
e[0KUsing Docker executor with image sonarsource/sonar-scanner-cli:latest ...e[0;m
e[0KPulling docker image sonarsource/sonar-scanner-cli:latest ...e[0;m
e[0KUsing docker image sha256:28ccb3e6dcd60822ea19a882cd9b47f204326ab78235403847ea5737491e8281 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:0bc49076468d2955948867620b2d98d67f0d59c0fd4a5ef1f0afc55cf86f2079 ...e[0;m
section_end:1726585737:prepare_executor
e[0Ksection_start:1726585737:prepare_script
e[0Ke[0Ke[36;1mPreparing environmente[0;me[0;m
Running on runner-j2nyww-s-project-43618124-concurrent-0 via runner-j2nyww-s-s-l-s-amd64-1726585688-bfc6bdc3...
section_end:1726585740:prepare_script
e[0Ksection_start:1726585740:get_sources
e[0Ke[0Ke[36;1mGetting source from Git repositorye[0;me[0;m
e[32;1mFetching changes...e[0;m
Initialized empty Git repository in /builds/buenbit/svc-shadow/.git/
e[32;1mCreated fresh repository.e[0;m
e[32;1mChecking out 18d7e496 as detached HEAD (ref is refs/merge-requests/84/head)...e[0;m

e[32;1mSkipping Git submodules setupe[0;m
e[32;1m$ git remote set-url origin "${CI_REPOSITORY_URL}"e[0;m
section_end:1726585741:get_sources
e[0Ksection_start:1726585741:restore_cache
e[0Ke[0Ke[36;1mRestoring cachee[0;me[0;m
e[32;1mChecking cache for sonarqube-check-non_protected...e[0;m
e[0;33mWARNING: file does not exist                      e[0;m 
e[0;33mFailed to extract cachee[0;m
section_end:1726585742:restore_cache
e[0Ksection_start:1726585742:step_script
e[0Ke[0Ke[36;1mExecuting "step_script" stage of the job scripte[0;me[0;m
e[0KUsing docker image sha256:28ccb3e6dcd60822ea19a882cd9b47f204326ab78235403847ea5737491e8281 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:0bc49076468d2955948867620b2d98d67f0d59c0fd4a5ef1f0afc55cf86f2079 ...e[0;m
e[32;1m$ sonar-scanner -Dsonar.qualitygate.wait=truee[0;m
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /builds/buenbit/svc-shadow/sonar-project.properties
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.11 Alpine (64-bit)
INFO: Linux 5.15.154+ amd64
INFO: User cache: /builds/buenbit/svc-shadow/.sonar/cache
INFO: Analyzing on SonarQube server 11.2.0.186
INFO: Default locale: "en_US", source code encoding: "UTF-8"
INFO: Load global settings
INFO: Load global settings (done) | time=514ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=560ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=906ms
INFO: Found an active CI vendor: 'Gitlab CI'
INFO: Load project settings for component key: 'buenbit_svc-shadow'
INFO: Load project settings for component key: 'buenbit_svc-shadow' (done) | time=531ms
INFO: Process project properties
INFO: Project key: buenbit_svc-shadow
INFO: Base dir: /builds/buenbit/svc-shadow
INFO: Working dir: /builds/buenbit/svc-shadow/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=252ms
INFO: Check ALM binding of project 'buenbit_svc-shadow'
INFO: Detected project binding: BOUND
INFO: Check ALM binding of project 'buenbit_svc-shadow' (done) | time=230ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=545ms
INFO: Load branch configuration
INFO: Auto-configuring pull request 84
INFO: Load branch configuration (done) | time=681ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=1029ms
INFO: Load active rules
INFO: Load active rules (done) | time=13341ms
INFO: Organization key: bbsckey01
INFO: Pull request 84 for merge into main from JONIAGUIRRE95-main-patch-96014
INFO: Preprocessing files...
INFO: 5 languages detected in 19 preprocessed files
INFO: 0 files ignored because of inclusion/exclusion patterns
INFO: 0 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=2193ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=314ms
INFO: SCM collecting changed files in the branch
INFO: SCM collecting changed files in the branch (done) | time=158ms
INFO: Indexing files...
INFO: Project configuration:
INFO:   Excluded sources: **/build-wrapper-dump.json
INFO: 19 files indexed
INFO: Quality profile for docker: Sonar way
INFO: Quality profile for java: Sonar way
INFO: Quality profile for json: Sonar way
INFO: Quality profile for xml: Sonar way
INFO: Quality profile for yaml: Sonar way
INFO: ------------- Run sensors on module buenbit_svc-shadow
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=232ms
INFO: Sensor cache enabled
INFO: Load sensor cache
INFO: Load sensor cache (1 KB) | time=1816ms
INFO: Sensor JavaSensor [java]
INFO: The Java analyzer is running in a context where unchanged files can be skipped. Full analysis is performed for changed files, optimized analysis for unchanged files.
INFO: Server-side caching is enabled. The Java analyzer was able to leverage cached data from previous analyses for 0 out of 4 files. These files will not be parsed.
INFO: Using ECJ batch to parse 4 Main java source files with batch size 104 KB.
INFO: Starting batch processing.
ERROR: Unable to parse source file : 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java'
ERROR: Parse error at line 6 column 0: Syntax error on tokens, delete these tokens
INFO: 100% analyzed
INFO: Batch processing: Done.
INFO: Optimized analysis for 3 of 4 files.
WARN: Dependencies/libraries were not provided for analysis of SOURCE files. The 'sonar.java.libraries' property is empty. Verify your configuration, as you might end up with less precise results.
WARN: Unresolved imports/types have been detected during analysis. Enable DEBUG mode to see them.
WARN: Use of preview features have been detected during analysis. Enable DEBUG mode to see them.
INFO: No "Test" source files to scan.
INFO: No "Generated" source files to scan.
INFO: Sensor JavaSensor [java] (done) | time=1536ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3ms
INFO: Sensor IaC CloudFormation Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=45ms
INFO: Sensor IaC Kubernetes Sensor [iac]
INFO: 0 source files to be parsed
INFO: 0/0 source files have been parsed
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: 0 source files to be checked
INFO: 0/0 source files have been checked
INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=97ms
INFO: Sensor IaC AzureResourceManager Sensor [iac]
INFO: Sensor IaC AzureResourceManager Sensor is restricted to changed files only
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=139ms
INFO: Sensor Java Config Sensor [iac]
INFO: 5 source files to be analyzed
INFO: 5/5 source files have been analyzed
INFO: Sensor Java Config Sensor [iac] (done) | time=13ms
INFO: Sensor JavaScript inside YAML analysis [javascript]
INFO: No input files found for analysis
INFO: Hit the cache for 0 out of 0
INFO: Miss the cache for 0 out of 0
INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=16ms
INFO: Sensor CSS Rules [javascript]
INFO: Sensor CSS Rules is restricted to changed files only
INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
INFO: Sensor CSS Rules [javascript] (done) | time=1ms
INFO: Sensor ThymeLeaf template sensor [securityjavafrontend]
INFO: Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=1ms
INFO: Sensor SurefireSensor [java]
INFO: parsing [/builds/buenbit/svc-shadow/target/surefire-reports]
INFO: Sensor SurefireSensor [java] (done) | time=2ms
INFO: Sensor XML Sensor [xml]
INFO: Sensor XML Sensor is restricted to changed files only
INFO: Sensor XML Sensor [xml] (done) | time=3ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: Sensor IaC Docker Sensor is restricted to changed files only
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=64ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=4ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=5ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=8ms
INFO: Sensor javabugs [dbd]
INFO: Reading IR files from: /builds/buenbit/svc-shadow/.scannerwork/ir/java
INFO: Analyzing 33 functions to detect bugs.
INFO: Sensor javabugs [dbd] (done) | time=301ms
INFO: Sensor pythonbugs [dbd]
INFO: Reading IR files from: /builds/buenbit/svc-shadow/.scannerwork/ir/python
INFO: No IR files have been included for analysis.
INFO: Sensor pythonbugs [dbd] (done) | time=0ms
INFO: Sensor TextAndSecretsSensor [text]
INFO: Sensor TextAndSecretsSensor is restricted to changed files only
INFO: Available processors: 2
INFO: Using 2 threads for analysis.
INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
  * The filename starts with "test"
  * The filename contains "test." or "tests."
  * Any directory in the file path is named: "doc", "docs", "test" or "tests"
  * Any directory in the file path has a name ending in "test" or "tests"

INFO: Using git CLI to retrieve untracked files
WARN: Analyzing only language associated files, make sure to run the analysis inside a git repository to make use of inclusions specified via "sonar.text.inclusions"
INFO: Sensor TextAndSecretsSensor [text] (done) | time=744ms
INFO: Sensor JavaSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/java
INFO: Read 6 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.034
INFO: Load UCFGs: Starting
INFO: Reading UCFGs from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/java
INFO: Load UCFGs: Time spent was 00:00:00.064
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.100
INFO: Analyzing 26 UCFGs to detect vulnerabilities.
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.000
INFO: Check cache: Time spent was 00:00:00.000
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.003
INFO: Run SCC (Tarjan) on 47 nodes: Starting
INFO: Run SCC (Tarjan) on 47 nodes: Time spent was 00:00:00.000
INFO: Tarjan found 47 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.000
INFO: Variable Type Analysis #1: Time spent was 00:00:00.006
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.001
INFO: Run SCC (Tarjan) on 47 nodes: Starting
INFO: Run SCC (Tarjan) on 47 nodes: Time spent was 00:00:00.000
INFO: Tarjan found 47 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.000
INFO: Variable Type Analysis #2: Time spent was 00:00:00.001
INFO: Create runtime call graph: Time spent was 00:00:00.010
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:01.976
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:01.073
INFO: No entry points found.
INFO: java security sensor: Time spent was 00:00:03.174
INFO: java security sensor: Begin: 2024-09-17T15:09:35.823624430Z, End: 2024-09-17T15:09:38.997651425Z, Duration: 00:00:03.174
  Load type hierarchy and UCFGs: Begin: 2024-09-17T15:09:35.825603030Z, End: 2024-09-17T15:09:35.925609006Z, Duration: 00:00:00.100
    Load type hierarchy: Begin: 2024-09-17T15:09:35.825683639Z, End: 2024-09-17T15:09:35.860609445Z, Duration: 00:00:00.034
    Load UCFGs: Begin: 2024-09-17T15:09:35.861001025Z, End: 2024-09-17T15:09:35.925434866Z, Duration: 00:00:00.064
  Check cache: Begin: 2024-09-17T15:09:35.925720156Z, End: 2024-09-17T15:09:35.926390836Z, Duration: 00:00:00.000
    Load cache: Begin: 2024-09-17T15:09:35.925748326Z, End: 2024-09-17T15:09:35.925926536Z, Duration: 00:00:00.000
  Create runtime call graph: Begin: 2024-09-17T15:09:35.926488946Z, End: 2024-09-17T15:09:35.937250404Z, Duration: 00:00:00.010
    Variable Type Analysis #1: Begin: 2024-09-17T15:09:35.927176856Z, End: 2024-09-17T15:09:35.934175345Z, Duration: 00:00:00.006
      Create runtime type propagation graph: Begin: 2024-09-17T15:09:35.928024746Z, End: 2024-09-17T15:09:35.931844805Z, Duration: 00:00:00.003
      Run SCC (Tarjan) on 47 nodes: Begin: 2024-09-17T15:09:35.932191185Z, End: 2024-09-17T15:09:35.933139335Z, Duration: 00:00:00.000
      Propagate runtime types to strongly connected components: Begin: 2024-09-17T15:09:35.933299645Z, End: 2024-09-17T15:09:35.934077955Z, Duration: 00:00:00.000
    Variable Type Analysis #2: Begin: 2024-09-17T15:09:35.934538255Z, End: 2024-09-17T15:09:35.936362945Z, Duration: 00:00:00.001
      Create runtime type propagation graph: Begin: 2024-09-17T15:09:35.934588605Z, End: 2024-09-17T15:09:35.935648065Z, Duration: 00:00:00.001
      Run SCC (Tarjan) on 47 nodes: Begin: 2024-09-17T15:09:35.935762945Z, End: 2024-09-17T15:09:35.935984805Z, Duration: 00:00:00.000
      Propagate runtime types to strongly connected components: Begin: 2024-09-17T15:09:35.936092505Z, End: 2024-09-17T15:09:35.936263805Z, Duration: 00:00:00.000
  Load config: Begin: 2024-09-17T15:09:35.937348684Z, End: 2024-09-17T15:09:37.914049930Z, Duration: 00:00:01.976
  Compute entry points: Begin: 2024-09-17T15:09:37.915525260Z, End: 2024-09-17T15:09:38.988901986Z, Duration: 00:00:01.073
INFO: java security sensor peak memory: 481 MB
INFO: Sensor JavaSecuritySensor [security] (done) | time=3178ms
INFO: Sensor CSharpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/ucfg2/cs
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: csharp security sensor: Time spent was 00:00:00.001
INFO: csharp security sensor: Begin: 2024-09-17T15:09:38.999811025Z, End: 2024-09-17T15:09:39.000909445Z, Duration: 00:00:00.001
  Load type hierarchy and UCFGs: Begin: 2024-09-17T15:09:39.000045825Z, End: 2024-09-17T15:09:39.000559725Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-17T15:09:39.000070115Z, End: 2024-09-17T15:09:39.000312475Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-17T15:09:39.000431435Z, End: 2024-09-17T15:09:39.000478245Z, Duration: 00:00:00.000
INFO: csharp security sensor peak memory: 481 MB
INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
INFO: Sensor PhpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/php
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: php security sensor: Time spent was 00:00:00.000
INFO: php security sensor: Begin: 2024-09-17T15:09:39.001679534Z, End: 2024-09-17T15:09:39.002557074Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-09-17T15:09:39.001814194Z, End: 2024-09-17T15:09:39.002231005Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-17T15:09:39.001860765Z, End: 2024-09-17T15:09:39.001997054Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-17T15:09:39.002100694Z, End: 2024-09-17T15:09:39.002135505Z, Duration: 00:00:00.000
INFO: php security sensor peak memory: 481 MB
INFO: Sensor PhpSecuritySensor [security] (done) | time=2ms
INFO: Sensor PythonSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/python
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: python security sensor: Time spent was 00:00:00.000
INFO: python security sensor: Begin: 2024-09-17T15:09:39.003292444Z, End: 2024-09-17T15:09:39.004187294Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-09-17T15:09:39.003438784Z, End: 2024-09-17T15:09:39.003871474Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-17T15:09:39.003478504Z, End: 2024-09-17T15:09:39.003610124Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-17T15:09:39.003727674Z, End: 2024-09-17T15:09:39.003762054Z, Duration: 00:00:00.000
INFO: python security sensor peak memory: 481 MB
INFO: Sensor PythonSecuritySensor [security] (done) | time=1ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S5146, S3649, S5131, S5147, S6287, S2083, S6105, S2076, S2631, S5696, S5144, S5883, S5334, S6350, S6096
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: js security sensor: Time spent was 00:00:00.000
INFO: js security sensor: Begin: 2024-09-17T15:09:39.004926474Z, End: 2024-09-17T15:09:39.005833124Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-09-17T15:09:39.005147294Z, End: 2024-09-17T15:09:39.005509734Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-17T15:09:39.005170854Z, End: 2024-09-17T15:09:39.005288414Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-17T15:09:39.005398454Z, End: 2024-09-17T15:09:39.005434364Z, Duration: 00:00:00.000
INFO: js security sensor peak memory: 481 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=2ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=7ms
INFO: Sensor Java CPD Block Indexer
INFO: Sensor Java CPD Block Indexer (done) | time=28ms
INFO: CPD Executor 3 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 1 file
INFO: CPD Executor CPD calculation finished (done) | time=5ms
INFO: SCM writing changed lines
INFO: SCM writing changed lines (done) | time=15ms
INFO: Analysis report generated in 211ms, dir size=265 KB
INFO: Analysis report compressed in 26ms, zip size=54 KB
INFO: Analysis report uploaded in 967ms
INFO: ------------- Check Quality Gate status
INFO: Waiting for the analysis report to be processed (max 300s)
INFO: QUALITY GATE STATUS: PASSED - View details on https://sonarcloud.io/dashboard?id=buenbit_svc-shadow&pullRequest=84
INFO: Analysis total time: 37.437 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 43.069s
INFO: Final Memory: 37M/130M
INFO: ------------------------------------------------------------------------
section_end:1726585786:step_script
e[0Ksection_start:1726585786:archive_cache
e[0Ke[0Ke[36;1mSaving cache for successful jobe[0;me[0;m
e[32;1mCreating cache sonarqube-check-non_protected...e[0;m
.sonar/cache: found 68 matching artifact files and directoriese[0;m 
Uploading cache.zip to https://storage.googleapis.com/gitlab-com-runners-cache/project/43618124/sonarqube-check-non_protectede[0;m 
e[32;1mCreated cachee[0;m
section_end:1726585793:archive_cache
e[0Ksection_start:1726585793:cleanup_file_variables
e[0Ke[0Ke[36;1mCleaning up project directory and file based variablese[0;me[0;m
section_end:1726585794:cleanup_file_variables
e[0Ke[32;1mJob succeedede[0;m

Hi,

It looks like you’re analyzing a Java project with the vanilla SonarScanner CLI. While that’s possible, more configuration is needed. We can try to default source and test file detection, but not the libraries:

And to be quite honest, I’m not sure what impact that missing information is having in a PR context, where:

Nonetheless, it looks like files were analyzed:

Even though:

So I would expect to see something. Could you enable debug logging (see link above) and post the new log?

 
Thx,
Ann

Here the log with debuggin.

avatarBuenbit
svc-shadow
Jobs
#7879487620
sonarcloud-check
Passed
Started
1 minute ago
by

JONATHAN AGUIRRE
Search visible log output
Running with gitlab-runner 17.4.0~pre.110.g27400594 (27400594)
  on blue-2.saas-linux-small-amd64.runners-manager.gitlab.com/default XxUrkriX, system ID: s_f46a988edce4
Preparing the "docker+machine" executor
00:09
Using Docker executor with image sonarsource/sonar-scanner-cli:latest ...
Pulling docker image sonarsource/sonar-scanner-cli:latest ...
Using docker image sha256:28ccb3e6dcd60822ea19a882cd9b47f204326ab78235403847ea5737491e8281 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:0bc49076468d2955948867620b2d98d67f0d59c0fd4a5ef1f0afc55cf86f2079 ...
Preparing environment
00:03
Running on runner-xxurkrix-project-43618124-concurrent-0 via runner-xxurkrix-s-l-s-amd64-1726844205-2d82980a...
Getting source from Git repository
00:01
Fetching changes with git depth set to 20...
Initialized empty Git repository in /builds/buenbit/svc-shadow/.git/
Created fresh repository.
Checking out f63b8f85 as detached HEAD (ref is refs/merge-requests/89/head)...
Skipping Git submodules setup
$ git remote set-url origin "${CI_REPOSITORY_URL}"
Restoring cache
00:10
Checking cache for sonarcloud-check-non_protected...
Downloading cache from https://storage.googleapis.com/gitlab-com-runners-cache/project/43618124/sonarcloud-check-non_protected  ETag="5ca78ddf3cc4308b29516071c38837dc"
Successfully extracted cache
Executing "step_script" stage of the job script
00:34
Using docker image sha256:28ccb3e6dcd60822ea19a882cd9b47f204326ab78235403847ea5737491e8281 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:0bc49076468d2955948867620b2d98d67f0d59c0fd4a5ef1f0afc55cf86f2079 ...
$ sonar-scanner -X
14:57:52.863 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
14:57:52.877 INFO: Project root configuration file: /builds/buenbit/svc-shadow/sonar-project.properties
14:57:52.906 INFO: SonarScanner 5.0.1.3006
14:57:52.906 INFO: Java 17.0.11 Alpine (64-bit)
14:57:52.906 INFO: Linux 5.15.154+ amd64
14:57:53.083 DEBUG: keyStore is : 
14:57:53.084 DEBUG: keyStore type is : pkcs12
14:57:53.084 DEBUG: keyStore provider is : 
14:57:53.084 DEBUG: init keystore
14:57:53.085 DEBUG: init keymanager of type SunX509
14:57:53.205 DEBUG: Create: /opt/sonar-scanner/.sonar/cache
14:57:53.206 INFO: User cache: /opt/sonar-scanner/.sonar/cache
14:57:53.206 DEBUG: Create: /opt/sonar-scanner/.sonar/cache/_tmp
14:57:53.209 DEBUG: Extract sonar-scanner-api-batch in temp...
14:57:53.212 DEBUG: Get bootstrap index...
14:57:53.213 DEBUG: Download: https://sonarcloud.io/batch/index
14:57:53.653 DEBUG: Get bootstrap completed
14:57:53.656 DEBUG: Download https://sonarcloud.io/batch/file?name=sonarcloud-scanner-engine-11.3.0.200.jar to /opt/sonar-scanner/.sonar/cache/_tmp/fileCache16323836302219378261.tmp
14:57:54.633 DEBUG: Create isolated classloader...
14:57:54.645 DEBUG: Start temp cleaning...
14:57:54.648 DEBUG: Temp cleaning done
14:57:54.648 DEBUG: Execution getVersion
14:57:54.662 INFO: Analyzing on SonarQube server 11.3.0.200
14:57:54.663 INFO: Default locale: "en_US", source code encoding: "UTF-8"
14:57:54.663 DEBUG: Work directory: /builds/buenbit/svc-shadow/.scannerwork
14:57:54.666 DEBUG: Execution execute
14:57:54.899 DEBUG: JVM max available memory: 1 GB
14:57:55.091 DEBUG: Sonar User Home: /opt/sonar-scanner/.sonar
14:57:55.092 DEBUG: Initialize DefaultScannerWsClient
14:57:55.492 DEBUG: Loaded [441] system trusted certificates
14:57:55.588 INFO: Load global settings
14:57:55.601 DEBUG: --> GET https://sonarcloud.io/api/settings/values.protobuf
14:57:56.140 DEBUG: <-- 200 https://sonarcloud.io/api/settings/values.protobuf (538ms, unknown-length body)
14:57:56.152 INFO: Load global settings (done) | time=565ms
14:57:56.157 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
14:57:56.160 DEBUG: Initialize DownloadPluginsScannerWsClient
14:57:56.349 DEBUG: Loaded [441] system trusted certificates
14:57:56.354 DEBUG: Create : /opt/sonar-scanner/.sonar/_tmp
14:57:56.354 DEBUG: User cache: /opt/sonar-scanner/.sonar/cache
14:57:56.360 INFO: Loading required plugins
14:57:56.360 INFO: Load plugins index
14:57:56.361 DEBUG: --> GET https://sonarcloud.io/api/plugins/installed
14:57:56.510 DEBUG: <-- 200 https://sonarcloud.io/api/plugins/installed (149ms, unknown-length body)
14:57:56.545 INFO: Load plugins index (done) | time=185ms
14:57:56.546 INFO: Load/download plugins
14:57:56.547 DEBUG: Download plugin 'iac' to '/opt/sonar-scanner/.sonar/_tmp/fileCache569188061798334514.tmp'
14:57:56.548 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/iac/versions/70a523f9e2c4ec08ad8f855332ccb50e.jar
14:57:56.645 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/iac/versions/70a523f9e2c4ec08ad8f855332ccb50e.jar (97ms, 17669077-byte body)
14:57:57.102 DEBUG: Download plugin 'jacoco' to '/opt/sonar-scanner/.sonar/_tmp/fileCache1444957855897369404.tmp'
14:57:57.103 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar
14:57:57.118 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar (14ms, 23258-byte body)
14:57:57.122 DEBUG: Download plugin 'license' to '/opt/sonar-scanner/.sonar/_tmp/fileCache89285963539071582.tmp'
14:57:57.122 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/license/versions/ef248e22aceb48d4860acc6600c4a812.jar
14:57:57.137 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/license/versions/ef248e22aceb48d4860acc6600c4a812.jar (14ms, 17404-byte body)
14:57:57.141 DEBUG: Download plugin 'text' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7669263291650073140.tmp'
14:57:57.141 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/text/versions/11a9b9e5d76fe507aaf1738f48e0b383.jar
14:57:57.156 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/text/versions/11a9b9e5d76fe507aaf1738f48e0b383.jar (14ms, 7022155-byte body)
14:57:57.294 DEBUG: Download plugin 'xml' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9344476523661234397.tmp'
14:57:57.295 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar
14:57:57.310 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar (14ms, 2507592-byte body)
14:57:57.371 INFO: Load/download plugins (done) | time=825ms
14:57:57.372 DEBUG: Plugins not loaded because they are optional: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, dart]
14:57:57.407 DEBUG: Plugins loaded:
14:57:57.407 DEBUG:   * JaCoCo 1.3.0.1538 (jacoco)
14:57:57.407 DEBUG:   * License for SonarLint 8.0.0.56719 (license)
14:57:57.407 DEBUG:   * IaC Code Quality and Security 1.35.0.12330 (iac)
14:57:57.407 DEBUG:   * Text Code Quality and Security 2.15.0.3845 (text)
14:57:57.408 DEBUG:   * XML Code Quality and Security 2.10.0.4108 (xml)
14:57:57.408 DEBUG: --> GET https://sonarcloud.io/api/server/version
14:57:57.551 DEBUG: <-- 200 https://sonarcloud.io/api/server/version (143ms, 11-byte body)
14:57:57.554 DEBUG: Updated analysis started with a difference of -69 milliseconds
14:57:57.565 DEBUG: Started at Fri Sep 20 14:57:56 GMT 2024
14:57:57.782 DEBUG: register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$290/0x00007fc31f2fea70@7f8633ae with shutdown hook
14:57:57.809 INFO: Found an active CI vendor: 'Gitlab CI'
14:57:57.819 INFO: Load project settings for component key: 'buenbit_svc-shadow'
14:57:57.820 DEBUG: --> GET https://sonarcloud.io/api/settings/values.protobuf?component=buenbit_svc-shadow
14:57:57.990 DEBUG: <-- 200 https://sonarcloud.io/api/settings/values.protobuf?component=buenbit_svc-shadow (170ms, unknown-length body)
14:57:57.995 INFO: Load project settings for component key: 'buenbit_svc-shadow' (done) | time=176ms
14:57:58.005 INFO: Process project properties
14:57:58.014 DEBUG: Process project properties (done) | time=9ms
14:57:58.017 INFO: Project key: buenbit_svc-shadow
14:57:58.018 INFO: Base dir: /builds/buenbit/svc-shadow
14:57:58.020 INFO: Working dir: /builds/buenbit/svc-shadow/.scannerwork
14:57:58.021 DEBUG: Project global encoding: UTF-8, default locale: en_US
14:57:58.023 DEBUG: Creating module hierarchy
14:57:58.024 DEBUG:   Init module 'buenbit_svc-shadow'
14:57:58.024 DEBUG:     Base dir: /builds/buenbit/svc-shadow
14:57:58.024 DEBUG:     Working dir: /builds/buenbit/svc-shadow/.scannerwork
14:57:58.025 DEBUG:     Module global encoding: UTF-8, default locale: en_US
14:57:58.028 INFO: Load project branches
14:57:58.029 DEBUG: --> GET https://sonarcloud.io/api/project_branches/list?project=buenbit_svc-shadow
14:57:58.204 DEBUG: <-- 200 https://sonarcloud.io/api/project_branches/list?project=buenbit_svc-shadow (174ms, unknown-length body)
14:57:58.208 INFO: Load project branches (done) | time=180ms
14:57:58.212 INFO: Check ALM binding of project 'buenbit_svc-shadow'
14:57:58.214 DEBUG: --> GET https://sonarcloud.io/api/alm_integration/is_project_bound?project=buenbit_svc-shadow
14:57:58.362 DEBUG: <-- 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=buenbit_svc-shadow (147ms, unknown-length body)
14:57:58.365 INFO: Detected project binding: BOUND
14:57:58.366 INFO: Check ALM binding of project 'buenbit_svc-shadow' (done) | time=154ms
14:57:58.368 INFO: Load project pull requests
14:57:58.369 DEBUG: --> GET https://sonarcloud.io/api/project_pull_requests/list?project=buenbit_svc-shadow
14:57:58.553 DEBUG: <-- 200 https://sonarcloud.io/api/project_pull_requests/list?project=buenbit_svc-shadow (183ms, unknown-length body)
14:57:58.559 INFO: Load project pull requests (done) | time=191ms
14:57:58.562 INFO: Load branch configuration
14:57:58.564 INFO: Auto-configuring pull request 89
14:57:58.566 DEBUG: --> GET https://sonarcloud.io/api/alm_integration/show_pullrequest?project=buenbit_svc-shadow&pullrequestKey=89
14:58:02.025 DEBUG: <-- 200 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=buenbit_svc-shadow&pullrequestKey=89 (3458ms, unknown-length body)
14:58:02.029 INFO: Load branch configuration (done) | time=3467ms
14:58:02.042 INFO: Load quality profiles
14:58:02.045 DEBUG: --> GET https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=buenbit_svc-shadow&organization=bbsckey01
14:58:02.765 DEBUG: <-- 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=buenbit_svc-shadow&organization=bbsckey01 (719ms, 4761-byte body)
14:58:02.793 INFO: Load quality profiles (done) | time=752ms
14:58:02.800 INFO: Load active rules
14:58:02.802 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mB&ps=500&p=1
14:58:02.967 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mB&ps=500&p=1 (164ms, 5852-byte body)
14:58:02.994 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lr&ps=500&p=1
14:58:03.157 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lr&ps=500&p=1 (162ms, 7272-byte body)
14:58:03.163 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l3&ps=500&p=1
14:58:03.555 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l3&ps=500&p=1 (391ms, 8119-byte body)
14:58:03.562 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lo&ps=500&p=1
14:58:03.719 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lo&ps=500&p=1 (156ms, 11-byte body)
14:58:03.720 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lz&ps=500&p=1
14:58:04.158 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lz&ps=500&p=1 (437ms, unknown-length body)
14:58:04.438 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mD&ps=500&p=1
14:58:04.636 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mD&ps=500&p=1 (197ms, unknown-length body)
14:58:04.672 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ln&ps=500&p=1
14:58:04.834 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ln&ps=500&p=1 (160ms, unknown-length body)
14:58:04.838 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ls&ps=500&p=1
14:58:05.001 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ls&ps=500&p=1 (163ms, unknown-length body)
14:58:05.004 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lq&ps=500&p=1
14:58:05.410 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lq&ps=500&p=1 (406ms, unknown-length body)
14:58:05.527 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmg4Z_un-6v83iBv&ps=500&p=1
14:58:05.696 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmg4Z_un-6v83iBv&ps=500&p=1 (168ms, unknown-length body)
14:58:05.700 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5x5A4M0h26275huV&ps=500&p=1
14:58:05.868 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5x5A4M0h26275huV&ps=500&p=1 (168ms, 2798-byte body)
14:58:05.870 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=1
14:58:06.096 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=1 (225ms, unknown-length body)
14:58:06.235 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=2
14:58:06.445 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=2 (209ms, unknown-length body)
14:58:06.448 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lv&ps=500&p=1
14:58:06.609 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lv&ps=500&p=1 (160ms, unknown-length body)
14:58:06.612 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lm&ps=500&p=1
14:58:06.774 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lm&ps=500&p=1 (161ms, unknown-length body)
14:58:06.776 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lk&ps=500&p=1
14:58:06.951 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lk&ps=500&p=1 (174ms, 6000-byte body)
14:58:06.954 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l4&ps=500&p=1
14:58:07.113 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l4&ps=500&p=1 (159ms, 11-byte body)
14:58:07.115 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8phcUjvLIw7iVnR&ps=500&p=1
14:58:07.326 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8phcUjvLIw7iVnR&ps=500&p=1 (211ms, unknown-length body)
14:58:07.451 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lp&ps=500&p=1
14:58:07.615 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lp&ps=500&p=1 (163ms, 288-byte body)
14:58:07.616 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43ll&ps=500&p=1
14:58:07.791 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43ll&ps=500&p=1 (174ms, unknown-length body)
14:58:07.798 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l6&ps=500&p=1
14:58:07.960 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l6&ps=500&p=1 (162ms, 7589-byte body)
14:58:07.962 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ly&ps=500&p=1
14:58:08.133 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ly&ps=500&p=1 (170ms, unknown-length body)
14:58:08.136 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l5&ps=500&p=1
14:58:08.300 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l5&ps=500&p=1 (164ms, 11-byte body)
14:58:08.301 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lj&ps=500&p=1
14:58:08.516 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lj&ps=500&p=1 (214ms, unknown-length body)
14:58:08.643 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l-&ps=500&p=1
14:58:08.842 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l-&ps=500&p=1 (198ms, unknown-length body)
14:58:08.853 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l7&ps=500&p=1
14:58:09.027 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l7&ps=500&p=1 (174ms, 6405-byte body)
14:58:09.029 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lu&ps=500&p=1
14:58:09.204 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lu&ps=500&p=1 (174ms, unknown-length body)
14:58:09.210 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lf&ps=500&p=1
14:58:09.369 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lf&ps=500&p=1 (159ms, 7367-byte body)
14:58:09.371 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mE&ps=500&p=1
14:58:09.532 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mE&ps=500&p=1 (160ms, 4412-byte body)
14:58:09.533 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lw&ps=500&p=1
14:58:09.693 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lw&ps=500&p=1 (159ms, unknown-length body)
14:58:09.695 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43le&ps=500&p=1
14:58:09.862 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43le&ps=500&p=1 (166ms, 6266-byte body)
14:58:09.863 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lt&ps=500&p=1
14:58:10.035 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lt&ps=500&p=1 (172ms, unknown-length body)
14:58:10.042 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l0&ps=500&p=1
14:58:10.225 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l0&ps=500&p=1 (182ms, 8036-byte body)
14:58:10.226 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lx&ps=500&p=1
14:58:10.441 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lx&ps=500&p=1 (214ms, unknown-length body)
14:58:10.457 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43li&ps=500&p=1
14:58:10.628 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43li&ps=500&p=1 (170ms, unknown-length body)
14:58:10.632 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l9&ps=500&p=1
14:58:10.809 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l9&ps=500&p=1 (177ms, unknown-length body)
14:58:10.823 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l8&ps=500&p=1
14:58:10.995 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l8&ps=500&p=1 (172ms, unknown-length body)
14:58:10.997 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-k6VEjuu3U2UCbc1&ps=500&p=1
14:58:11.168 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-k6VEjuu3U2UCbc1&ps=500&p=1 (170ms, unknown-length body)
14:58:11.170 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l1&ps=500&p=1
14:58:11.337 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l1&ps=500&p=1 (166ms, unknown-length body)
14:58:11.339 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mA&ps=500&p=1
14:58:11.525 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mA&ps=500&p=1 (185ms, unknown-length body)
14:58:11.532 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l_&ps=500&p=1
14:58:11.731 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l_&ps=500&p=1 (198ms, unknown-length body)
14:58:11.768 INFO: Load active rules (done) | time=8968ms
14:58:11.819 DEBUG: --> GET https://sonarcloud.io/api/languages/list
14:58:11.961 DEBUG: <-- 200 https://sonarcloud.io/api/languages/list (141ms, unknown-length body)
14:58:11.977 INFO: Organization key: bbsckey01
14:58:11.979 INFO: Pull request 89 for merge into main from JONIAGUIRRE95-main-patch-53280
14:58:11.989 DEBUG: Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes : 
14:58:11.991 DEBUG: Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
14:58:11.991 DEBUG: Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
14:58:11.992 DEBUG: Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
14:58:11.992 DEBUG: Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
14:58:11.993 DEBUG: Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
14:58:11.993 DEBUG: Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
14:58:11.993 DEBUG: Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
14:58:11.994 DEBUG: Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb
14:58:11.994 DEBUG: Declared patterns of language Dart were converted to sonar.lang.patterns.dart : **/*.dart
14:58:11.994 DEBUG: Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
14:58:11.995 DEBUG: Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
14:58:11.996 DEBUG: Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
14:58:11.996 DEBUG: Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
14:58:11.997 DEBUG: Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl,**/*.config
14:58:11.997 DEBUG: Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
14:58:11.997 DEBUG: Declared patterns of language IPython Notebooks were converted to sonar.lang.patterns.ipynb : **/*.ipynb
14:58:11.997 DEBUG: Declared patterns of language Text were converted to sonar.lang.patterns.text : 
14:58:11.998 DEBUG: Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
14:58:11.998 DEBUG: Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation : 
14:58:11.998 DEBUG: Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
14:58:11.999 DEBUG: Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
14:58:11.999 DEBUG: Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp,**/*.ixx,**/*.mxx,**/*.cppm,**/*.ccm,**/*.cxxm,**/*.c++m
14:58:12.000 DEBUG: Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
14:58:12.000 DEBUG: Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
14:58:12.000 DEBUG: Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
14:58:12.001 DEBUG: Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
14:58:12.001 DEBUG: Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
14:58:12.001 DEBUG: Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
14:58:12.002 DEBUG: Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
14:58:12.002 DEBUG: Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets : 
14:58:12.002 DEBUG: Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
14:58:12.002 DEBUG: Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
14:58:12.003 DEBUG: Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol : 
14:58:12.003 DEBUG: Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
14:58:12.003 DEBUG: Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
14:58:12.004 DEBUG: Declared patterns of language AzureResourceManager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
14:58:12.004 DEBUG: Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
14:58:12.004 DEBUG: Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
14:58:12.005 DEBUG: Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
14:58:12.010 INFO: Preprocessing files...
14:58:12.041 DEBUG: loading config FileBasedConfig[/tmp/jgit/config]
14:58:12.043 DEBUG: readpipe [/usr/bin/git, --version],/usr/bin
14:58:12.059 DEBUG: readpipe may return 'git version 2.43.4'
14:58:12.059 DEBUG: remaining output:
14:58:12.060 DEBUG: readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
14:58:12.064 DEBUG: readpipe may return 'null'
14:58:12.064 DEBUG: remaining output:
14:58:12.068 DEBUG: readpipe rc=128
14:58:12.068 DEBUG: Exception caught during execution of command '[/usr/bin/git, config, --system, --show-origin, --list, -z]' in '/usr/bin', return code '128', error message 'fatal: unable to read config file '/etc/gitconfig': No such file or directory
'
14:58:12.069 DEBUG: loading config FileBasedConfig[/tmp/git/config]
14:58:12.069 DEBUG: loading config UserConfigFile[/home/scanner-cli/.gitconfig]
14:58:12.147 DEBUG: 25 non excluded files in this Git repository
14:58:12.231 INFO: 5 languages detected in 19 preprocessed files
14:58:12.231 INFO: 0 files ignored because of inclusion/exclusion patterns
14:58:12.232 INFO: 0 files ignored because of scm ignore settings
14:58:12.288 INFO: Loading plugins for detected languages
14:58:12.289 DEBUG: Detected languages: [java, xml, json, yaml, docker]
14:58:12.289 INFO: Load/download plugins
14:58:12.290 DEBUG: Download plugin 'dbd' to '/opt/sonar-scanner/.sonar/_tmp/fileCache16997034850791493082.tmp'
14:58:12.291 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/dbd/versions/932efda5090f80aee103897e18c68d4b.jar
14:58:12.309 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/dbd/versions/932efda5090f80aee103897e18c68d4b.jar (17ms, 2936117-byte body)
14:58:12.389 DEBUG: Download plugin 'dbdjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache13227061581644927067.tmp'
14:58:12.390 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/a0bb807aef8085b547cbe4c71cdd2317.jar
14:58:12.404 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/a0bb807aef8085b547cbe4c71cdd2317.jar (13ms, 1473767-byte body)
14:58:12.439 DEBUG: Download plugin 'javasymbolicexecution' to '/opt/sonar-scanner/.sonar/_tmp/fileCache3542951481799275616.tmp'
14:58:12.439 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/javasymbolicexecution/versions/b637ef58624974a8380d4225d86d2bcd.jar
14:58:12.454 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/javasymbolicexecution/versions/b637ef58624974a8380d4225d86d2bcd.jar (13ms, 11238045-byte body)
14:58:12.629 DEBUG: Download plugin 'java' to '/opt/sonar-scanner/.sonar/_tmp/fileCache8935889649866805062.tmp'
14:58:12.629 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/java/versions/a8e80e4cbda7272c93dcf83476f5b685.jar
14:58:12.643 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/java/versions/a8e80e4cbda7272c93dcf83476f5b685.jar (13ms, 19201293-byte body)
14:58:12.968 DEBUG: Download plugin 'javascript' to '/opt/sonar-scanner/.sonar/_tmp/fileCache10588694136237670041.tmp'
14:58:12.969 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/javascript/versions/99b28a588428e83639224d702c00b464.jar
14:58:12.984 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/javascript/versions/99b28a588428e83639224d702c00b464.jar (14ms, 86867260-byte body)
14:58:14.046 DEBUG: Download plugin 'security' to '/opt/sonar-scanner/.sonar/_tmp/fileCache10424991581482237631.tmp'
14:58:14.047 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/security/versions/cf92995300aa5330f567149c9d857219.jar
14:58:14.062 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/security/versions/cf92995300aa5330f567149c9d857219.jar (14ms, 12032952-byte body)
14:58:14.256 DEBUG: Download plugin 'securityjsfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache1509268698917763933.tmp'
14:58:14.257 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/71b2cc10618f5611bdaf3fd5b8045f4b.jar
14:58:14.271 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/71b2cc10618f5611bdaf3fd5b8045f4b.jar (13ms, 266669-byte body)
14:58:14.279 DEBUG: Download plugin 'securityjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11144917311663763191.tmp'
14:58:14.279 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/df976930a1264dc2bf77da62b750babf.jar
14:58:14.297 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/df976930a1264dc2bf77da62b750babf.jar (14ms, 9222613-byte body)
14:58:14.430 INFO: Load/download plugins (done) | time=2141ms
14:58:14.431 DEBUG: Optional language-specific plugins not loaded: [abap, sonarapex, csharp, cpp, cobol, dbdpythonfrontend, flex, go, web, jcl, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, securitycsharpfrontend, securityphpfrontend, securitypythonfrontend, dart]
14:58:14.582 DEBUG: Plugins loaded:
14:58:14.583 DEBUG:   * Vulnerability Rules for Java 10.7.0-M2.32758 (securityjavafrontend)
14:58:14.583 DEBUG:   * Vulnerability Analysis 10.7.0-M2.32758 (security)
14:58:14.583 DEBUG:   * Vulnerability Rules for JS 10.7.0-M2.32758 (securityjsfrontend)
14:58:14.583 DEBUG:   * Java Code Quality and Security 8.2.0.36672 (java)
14:58:14.584 DEBUG:   * Dataflow Bug Detection 1.30.0.10776 (dbd)
14:58:14.584 DEBUG:   * Dataflow Bug Detection Rules for Java 1.30.0.10776 (dbdjavafrontend)
14:58:14.584 DEBUG:   * Java Advanced Code Quality Analyzer 8.2.0.36672 (javasymbolicexecution)
14:58:14.584 DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 10.15.0.27423 (javascript)
14:58:14.791 INFO: Load project repositories
14:58:14.792 DEBUG: --> GET https://sonarcloud.io/batch/project.protobuf?key=buenbit_svc-shadow&branch=main
14:58:14.989 DEBUG: <-- 200 https://sonarcloud.io/batch/project.protobuf?key=buenbit_svc-shadow&branch=main (196ms, 1255-byte body)
14:58:14.997 INFO: Load project repositories (done) | time=206ms
14:58:14.999 INFO: SCM collecting changed files in the branch
14:58:15.003 WARN: Could not find ref: main in refs/heads, refs/remotes/upstream or refs/remotes/origin
14:58:15.003 DEBUG: All found refs are:
14:58:15.009 DEBUG: Ref[HEAD=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:15.009 DEBUG: Ref[refs/pipelines/1462370584=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:15.009 INFO: SCM collecting changed files in the branch (done) | time=10ms
14:58:15.009 DEBUG: SCM information about changed files in the branch is not available
14:58:15.016 INFO: Indexing files...
14:58:15.016 INFO: Project configuration:
14:58:15.016 INFO:   Excluded sources: **/build-wrapper-dump.json
14:58:15.020 DEBUG: 'docker-compose.yml' indexed with language 'yaml'
14:58:15.022 DEBUG: 'new-svc-template.json' indexed with language 'json'
14:58:15.022 DEBUG: 'values-integration.yaml' indexed with language 'yaml'
14:58:15.023 DEBUG: 'pom.xml' indexed with language 'xml'
14:58:15.025 DEBUG: 'README.md' indexed with language 'null'
14:58:15.026 DEBUG: 'sonar-project.properties' indexed with language 'null'
14:58:15.027 DEBUG: 'Dockerfile' indexed with language 'docker'
14:58:15.029 DEBUG: 'src/main/resources/application-development.properties' indexed with language 'null'
14:58:15.032 DEBUG: 'src/main/resources/application-integration.properties' indexed with language 'null'
14:58:15.034 DEBUG: 'src/main/resources/application-production.properties' indexed with language 'null'
14:58:15.036 DEBUG: 'src/main/resources/application-staging.properties' indexed with language 'null'
14:58:15.039 DEBUG: 'src/main/resources/application.properties' indexed with language 'null'
14:58:15.039 DEBUG: 'src/main/java/com/buenbit/api/rep.java' indexed with language 'java'
14:58:15.040 DEBUG: 'src/main/java/com/buenbit/api/Application.java' indexed with language 'java'
14:58:15.041 DEBUG: 'src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java' indexed with language 'java'
14:58:15.041 DEBUG: 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java' indexed with language 'java'
14:58:15.042 DEBUG: 'values-production.yaml' indexed with language 'yaml'
14:58:15.043 DEBUG: 'test_issue_sonar' indexed with language 'null'
14:58:15.043 DEBUG: 'values-staging.yaml' indexed with language 'yaml'
14:58:15.045 INFO: 19 files indexed
14:58:15.054 DEBUG: Available languages:
14:58:15.055 DEBUG:   * Terraform => "terraform"
14:58:15.055 DEBUG:   * CloudFormation => "cloudformation"
14:58:15.055 DEBUG:   * Kubernetes => "kubernetes"
14:58:15.055 DEBUG:   * Docker => "docker"
14:58:15.055 DEBUG:   * AzureResourceManager => "azureresourcemanager"
14:58:15.056 DEBUG:   * YAML => "yaml"
14:58:15.056 DEBUG:   * JSON => "json"
14:58:15.056 DEBUG:   * Text => "text"
14:58:15.056 DEBUG:   * Secrets => "secrets"
14:58:15.056 DEBUG:   * XML => "xml"
14:58:15.057 DEBUG:   * Java => "java"
14:58:15.057 DEBUG:   * JavaScript => "js"
14:58:15.057 DEBUG:   * TypeScript => "ts"
14:58:15.057 DEBUG:   * CSS => "css"
14:58:15.058 INFO: Quality profile for docker: Sonar way
14:58:15.058 INFO: Quality profile for java: Sonar way
14:58:15.058 INFO: Quality profile for json: Sonar way
14:58:15.059 INFO: Quality profile for xml: Sonar way
14:58:15.059 INFO: Quality profile for yaml: Sonar way
14:58:15.059 INFO: ------------- Run sensors on module buenbit_svc-shadow
14:58:15.126 INFO: Load metrics repository
14:58:15.127 DEBUG: --> GET https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1
14:58:15.276 DEBUG: <-- 200 https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1 (149ms, unknown-length body)
14:58:15.283 INFO: Load metrics repository (done) | time=157ms
14:58:15.289 INFO: Sensor cache enabled
14:58:15.290 DEBUG: Initialize GenericWsClient
14:58:15.468 DEBUG: Loaded [441] system trusted certificates
14:58:15.475 INFO: Load sensor cache
14:58:15.476 DEBUG: --> GET https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=bbsckey01&project=buenbit_svc-shadow&branch=main
14:58:16.733 DEBUG: <-- 200 https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=bbsckey01&project=buenbit_svc-shadow&branch=main (1256ms, 1452-byte body)
14:58:16.763 DEBUG: --> GET https://analysis-sensorcache-eu-central-1-prod.s3.amazonaws.com/AYZLkmNGtE7r1_zs43lR/AZIAdSVXkIcrJ3YLggJx/AZIAdSVXkIcrJ3YLggJx?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=[MASKED]&X-Amz-Date=20240920T145816Z&X-Amz-Expires=15&X-Amz-SignedHeaders=host&X-Amz-Security-Token=[MASKED]&X-Amz-Signature=[MASKED]
14:58:17.235 DEBUG: <-- 200 OK https://analysis-sensorcache-eu-central-1-prod.s3.amazonaws.com/AYZLkmNGtE7r1_zs43lR/AZIAdSVXkIcrJ3YLggJx/AZIAdSVXkIcrJ3YLggJx?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=[MASKED]&X-Amz-Date=20240920T145816Z&X-Amz-Expires=15&X-Amz-SignedHeaders=host&X-Amz-Security-Token=[MASKED]&X-Amz-Signature=[MASKED] (471ms, 1553-byte body)
14:58:17.242 INFO: Load sensor cache (1 KB) | time=1767ms
14:58:17.579 DEBUG: Added 308 checks for language='ts', repository='typescript'
14:58:17.589 DEBUG: Added 15 checks for language='ts', repository='tssecurity'
14:58:17.597 DEBUG: Added 310 checks for language='js', repository='javascript'
14:58:17.600 DEBUG: Added 15 checks for language='js', repository='jssecurity'
14:58:17.604 DEBUG: No registered JsAnalysisConsumer.
14:58:18.392 DEBUG: 'Import external issues report' skipped because one of the required properties is missing
14:58:18.392 DEBUG: 'IaC Terraform Sensor' skipped because there is no related file in current project
14:58:18.393 DEBUG: 'JavaScript/TypeScript analysis' skipped because there is no related file in current project
14:58:18.394 DEBUG: 'JavaScript inside HTML analysis' skipped because there is no related file in current project
14:58:18.394 DEBUG: 'JavaScript/TypeScript Coverage' skipped because there is no related file in current project
14:58:18.395 DEBUG: 'Import of ESLint issues' skipped because one of the required properties is missing
14:58:18.395 DEBUG: 'Import of TSLint issues' skipped because one of the required properties is missing
14:58:18.395 DEBUG: 'CSS Metrics' skipped because there is no related file in current project
14:58:18.396 DEBUG: 'Import of stylelint issues' skipped because one of the required properties is missing
14:58:18.396 DEBUG: 'Import of Checkstyle issues' skipped because one of the required properties is missing
14:58:18.397 DEBUG: 'Import of PMD issues' skipped because one of the required properties is missing
14:58:18.397 DEBUG: 'Import of SpotBugs issues' skipped because one of the required properties is missing
14:58:18.398 DEBUG: 'Removed properties sensor' skipped because one of the required properties is missing
14:58:18.402 DEBUG: 'Generic Coverage Report' skipped because one of the required properties is missing
14:58:18.402 DEBUG: 'Generic Test Executions Report' skipped because one of the required properties is missing
14:58:18.403 DEBUG: Sensors : JavaSensor -> JaCoCo XML Report Importer -> IaC CloudFormation Sensor -> IaC Kubernetes Sensor -> IaC AzureResourceManager Sensor -> Java Config Sensor -> JavaScript inside YAML analysis -> CSS Rules -> ThymeLeaf template sensor -> SurefireSensor -> XML Sensor -> IaC Docker Sensor -> Serverless configuration file sensor -> AWS SAM template file sensor -> AWS SAM Inline template file sensor -> javabugs -> pythonbugs -> TextAndSecretsSensor -> JavaSecuritySensor -> CSharpSecuritySensor -> PhpSecuritySensor -> PythonSecuritySensor -> JsSecuritySensor
14:58:18.404 INFO: Sensor JavaSensor [java]
14:58:18.421 DEBUG: Property 'sonar.java.jdkHome' resolved with:
[]
14:58:18.422 DEBUG: Property 'sonar.java.libraries' resolved with:
[]
14:58:18.422 DEBUG: Property 'sonar.java.jdkHome' resolved with:
[]
14:58:18.422 DEBUG: Property 'sonar.java.test.libraries' resolved with:
[]
14:58:18.435 DEBUG: Found 0 JSP files.
14:58:18.438 INFO: The Java analyzer is running in a context where unchanged files can be skipped. Full analysis is performed for changed files, optimized analysis for unchanged files.
14:58:18.444 DEBUG: 'src/main/java/com/buenbit/api/Application.java' generated metadata with charset 'UTF-8'
14:58:18.446 DEBUG: Compatible cached data version '1.30.0.10776' found.
14:58:18.453 DEBUG: 'src/main/java/com/buenbit/api/rep.java' generated metadata with charset 'UTF-8'
14:58:18.454 DEBUG: 'src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java' generated metadata with charset 'UTF-8'
14:58:18.455 DEBUG: 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java' generated metadata with charset 'UTF-8'
14:58:18.456 INFO: Server-side caching is enabled. The Java analyzer was able to leverage cached data from previous analyses for 0 out of 4 files. These files will not be parsed.
14:58:18.458 INFO: Using ECJ batch to parse 4 Main java source files with batch size 104 KB.
14:58:18.623 INFO: Starting batch processing.
14:58:19.646 DEBUG: Incomplete Semantic, method invocation 'run' line 18 col 27
14:58:19.700 DEBUG: Incomplete Semantic, method invocation 'run' line 18 col 27
14:58:19.969 DEBUG: Incomplete Semantic, unknown parameter type 'Address' line 47 col 10
14:58:19.973 DEBUG: Incomplete Semantic, unknown return type 'getType' line 74 col 22
14:58:20.034 DEBUG: Incomplete Semantic, unknown parameter type 'setType' line 134 col 15
14:58:20.064 ERROR: Unable to parse source file : 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java'
14:58:20.064 ERROR: Parse error at line 6 column 0: Syntax error on tokens, delete these tokens
14:58:20.086 INFO: 100% analyzed
14:58:20.086 INFO: Batch processing: Done.
14:58:20.087 INFO: Optimized analysis for 3 of 4 files.
14:58:20.106 WARN: Dependencies/libraries were not provided for analysis of SOURCE files. The 'sonar.java.libraries' property is empty. Verify your configuration, as you might end up with less precise results.
14:58:20.109 WARN: Unresolved imports/types have been detected during analysis. Enable DEBUG mode to see them.
14:58:20.110 DEBUG: Unresolved imports/types:
- AddressType cannot be resolved to a type
  * src/main/java/com/buenbit/api/rep.java
- BaseAuditableEntity cannot be resolved to a type
  * src/main/java/com/buenbit/api/rep.java
- Column cannot be resolved to a type
  * src/main/java/com/buenbit/api/rep.java
- Entity cannot be resolved to a type
  * src/main/java/com/buenbit/api/rep.java
- Enumerated cannot be resolved to a type
  * src/main/java/com/buenbit/api/rep.java
- RequestMapping cannot be resolved to a type
  * src/main/java/com/buenbit/api/Application.java
- RestController cannot be resolved to a type
  * src/main/java/com/buenbit/api/Application.java
- SpringBootApplication cannot be resolved to a type
  * src/main/java/com/buenbit/api/Application.java
- SpringBootTest cannot be resolved to a type
  * src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
- Test cannot be resolved to a type
  * src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
- The import javax.persistence cannot be resolved
  * src/main/java/com/buenbit/api/rep.java
- The import org.junit cannot be resolved
  * src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
- The import org.springframework cannot be resolved
  * src/main/java/com/buenbit/api/Application.java
  * src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
14:58:20.110 WARN: Use of preview features have been detected during analysis. Enable DEBUG mode to see them.
14:58:20.110 DEBUG: Use of preview features:
- EnumType cannot be resolved to a variable
  * src/main/java/com/buenbit/api/rep.java
- SpringApplication cannot be resolved
  * src/main/java/com/buenbit/api/Application.java
- The public type Address must be defined in its own file
  * src/main/java/com/buenbit/api/rep.java
14:58:20.111 INFO: No "Test" source files to scan.
14:58:20.111 INFO: No "Generated" source files to scan.
14:58:20.111 INFO: Sensor JavaSensor [java] (done) | time=1707ms
14:58:20.112 INFO: Sensor JaCoCo XML Report Importer [jacoco]
14:58:20.113 INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
14:58:20.114 INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
14:58:20.115 INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=2ms
14:58:20.115 INFO: Sensor IaC CloudFormation Sensor [iac]
14:58:20.117 DEBUG: 'values-integration.yaml' generated metadata with charset 'UTF-8'
14:58:20.118 DEBUG: File without identifier 'AWSTemplateFormatVersion': values-integration.yaml
14:58:20.118 DEBUG: 'values-staging.yaml' generated metadata with charset 'UTF-8'
14:58:20.119 DEBUG: File without identifier 'AWSTemplateFormatVersion': values-staging.yaml
14:58:20.119 DEBUG: 'docker-compose.yml' generated metadata with charset 'UTF-8'
14:58:20.120 DEBUG: File without identifier 'AWSTemplateFormatVersion': docker-compose.yml
14:58:20.120 DEBUG: 'new-svc-template.json' generated metadata with charset 'UTF-8'
14:58:20.121 DEBUG: File without identifier 'AWSTemplateFormatVersion': new-svc-template.json
14:58:20.121 DEBUG: 'values-production.yaml' generated metadata with charset 'UTF-8'
14:58:20.121 DEBUG: File without identifier 'AWSTemplateFormatVersion': values-production.yaml
14:58:20.135 INFO: 0 source files to be analyzed
14:58:20.142 INFO: 0/0 source files have been analyzed
14:58:20.142 INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=27ms
14:58:20.143 INFO: Sensor IaC Kubernetes Sensor [iac]
14:58:20.145 DEBUG: Checking conditions for enabling Helm analysis: isHelmActivationFlagTrue=true, isHelmEvaluatorExecutableAvailable=true
14:58:20.145 DEBUG: Initializing Helm processor
14:58:20.237 DEBUG: File without Kubernetes identifier: values-integration.yaml
14:58:20.238 DEBUG: File without Kubernetes identifier: values-staging.yaml
14:58:20.238 DEBUG: File without Kubernetes identifier: docker-compose.yml
14:58:20.239 DEBUG: File without Kubernetes identifier: values-production.yaml
14:58:20.251 INFO: 0 source files to be parsed
14:58:20.251 INFO: 0/0 source files have been parsed
14:58:20.252 INFO: 0 source files to be analyzed
14:58:20.252 INFO: 0/0 source files have been analyzed
14:58:20.252 INFO: 0 source files to be checked
14:58:20.252 INFO: 0/0 source files have been checked
14:58:20.252 INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=109ms
14:58:20.253 INFO: Sensor IaC AzureResourceManager Sensor [iac]
14:58:20.253 INFO: Sensor IaC AzureResourceManager Sensor is restricted to changed files only
14:58:20.253 DEBUG: File without identifier 'https://schema.management.azure.com/schemas/': new-svc-template.json
14:58:20.357 INFO: 0 source files to be analyzed
14:58:20.358 INFO: 0/0 source files have been analyzed
14:58:20.358 INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=105ms
14:58:20.359 INFO: Sensor Java Config Sensor [iac]
14:58:20.361 DEBUG: 'src/main/resources/application-integration.properties' generated metadata with charset 'UTF-8'
14:58:20.361 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-integration.properties
14:58:20.362 DEBUG: 'src/main/resources/application-development.properties' generated metadata with charset 'UTF-8'
14:58:20.362 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-development.properties
14:58:20.362 DEBUG: 'src/main/resources/application-staging.properties' generated metadata with charset 'UTF-8'
14:58:20.362 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-staging.properties
14:58:20.363 DEBUG: 'src/main/resources/application.properties' generated metadata with charset 'UTF-8'
14:58:20.363 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application.properties
14:58:20.363 DEBUG: 'src/main/resources/application-production.properties' generated metadata with charset 'UTF-8'
14:58:20.363 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-production.properties
14:58:20.371 INFO: 5 source files to be analyzed
14:58:20.371 INFO: 5/5 source files have been analyzed
14:58:20.371 INFO: Sensor Java Config Sensor [iac] (done) | time=12ms
14:58:20.372 INFO: Sensor JavaScript inside YAML analysis [javascript]
14:58:20.381 INFO: No input files found for analysis
14:58:20.382 INFO: Hit the cache for 0 out of 0
14:58:20.383 INFO: Miss the cache for 0 out of 0
14:58:20.383 INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=11ms
14:58:20.384 INFO: Sensor CSS Rules [javascript]
14:58:20.384 INFO: Sensor CSS Rules is restricted to changed files only
14:58:20.385 INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
14:58:20.385 INFO: Sensor CSS Rules [javascript] (done) | time=1ms
14:58:20.385 INFO: Sensor ThymeLeaf template sensor [securityjavafrontend]
14:58:20.386 INFO: Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=1ms
14:58:20.386 INFO: Sensor SurefireSensor [java]
14:58:20.387 INFO: parsing [/builds/buenbit/svc-shadow/target/surefire-reports]
14:58:20.388 INFO: Sensor SurefireSensor [java] (done) | time=2ms
14:58:20.388 INFO: Sensor XML Sensor [xml]
14:58:20.388 INFO: Sensor XML Sensor is restricted to changed files only
14:58:20.390 DEBUG: 'pom.xml' generated metadata with charset 'UTF-8'
14:58:20.391 INFO: Sensor XML Sensor [xml] (done) | time=3ms
14:58:20.391 INFO: Sensor IaC Docker Sensor [iac]
14:58:20.391 INFO: Sensor IaC Docker Sensor is restricted to changed files only
14:58:20.393 DEBUG: 'Dockerfile' generated metadata with charset 'UTF-8'
14:58:20.462 INFO: 0 source files to be analyzed
14:58:20.463 INFO: 0/0 source files have been analyzed
14:58:20.463 INFO: Sensor IaC Docker Sensor [iac] (done) | time=72ms
14:58:20.463 INFO: Sensor Serverless configuration file sensor [security]
14:58:20.464 INFO: 0 Serverless function entries were found in the project
14:58:20.467 INFO: 0 Serverless function handlers were kept as entrypoints
14:58:20.467 INFO: Sensor Serverless configuration file sensor [security] (done) | time=4ms
14:58:20.468 INFO: Sensor AWS SAM template file sensor [security]
14:58:20.472 DEBUG: 0 SAM template configuration files were found in the project. 0 SAM function entries were found in total. 0 were kept as potential entrypoints.
14:58:20.472 INFO: Sensor AWS SAM template file sensor [security] (done) | time=4ms
14:58:20.473 INFO: Sensor AWS SAM Inline template file sensor [security]
14:58:20.480 DEBUG: 0 SAM Inline template configuration files were found in the project. 0 SAM Inline function entries were found in total. 0 were kept as potential entrypoints.
14:58:20.480 INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=7ms
14:58:20.480 INFO: Sensor javabugs [dbd]
14:58:20.517 INFO: Reading IR files from: /builds/buenbit/svc-shadow/.scannerwork/ir/java
14:58:20.524 INFO: Analyzing 33 functions to detect bugs.
14:58:20.791 INFO: Sensor javabugs [dbd] (done) | time=311ms
14:58:20.792 INFO: Sensor pythonbugs [dbd]
14:58:20.792 DEBUG: Could not load type definitions from /builds/buenbit/svc-shadow/.scannerwork/ir/python/collected.typedefs: /builds/buenbit/svc-shadow/.scannerwork/ir/python/collected.typedefs (No such file or directory)
14:58:20.792 INFO: Reading IR files from: /builds/buenbit/svc-shadow/.scannerwork/ir/python
14:58:20.792 INFO: No IR files have been included for analysis.
14:58:20.792 INFO: Sensor pythonbugs [dbd] (done) | time=0ms
14:58:20.793 INFO: Sensor TextAndSecretsSensor [text]
14:58:20.794 INFO: Sensor TextAndSecretsSensor is restricted to changed files only
14:58:20.798 INFO: Available processors: 2
14:58:20.799 INFO: Using 2 threads for analysis.
14:58:21.456 INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
  * The filename starts with "test"
  * The filename contains "test." or "tests."
  * Any directory in the file path is named: "doc", "docs", "test" or "tests"
  * Any directory in the file path has a name ending in "test" or "tests"
14:58:21.496 DEBUG: git --version returned: git version 2.43.4
14:58:21.497 INFO: Using git CLI to retrieve untracked files
14:58:21.501 DEBUG: Process [git, status, --untracked-files=all, --porcelain] exited with code 128
14:58:21.501 DEBUG: Unable to retrieve git status
14:58:21.502 WARN: Analyzing only language associated files, make sure to run the analysis inside a git repository to make use of inclusions specified via "sonar.text.inclusions"
14:58:21.502 DEBUG: There are no files to be analyzed
14:58:21.502 INFO: Sensor TextAndSecretsSensor [text] (done) | time=709ms
14:58:21.503 INFO: Sensor JavaSecuritySensor [security]
14:58:21.507 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
14:58:21.508 INFO: Load type hierarchy and UCFGs: Starting
14:58:21.508 INFO: Load type hierarchy: Starting
14:58:21.509 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/java
14:58:21.543 INFO: Read 6 type definitions
14:58:21.548 INFO: Load type hierarchy: Time spent was 00:00:00.039
14:58:21.548 INFO: Load UCFGs: Starting
14:58:21.549 INFO: Reading UCFGs from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/java
14:58:21.624 INFO: Load UCFGs: Time spent was 00:00:00.075
14:58:21.624 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.115
14:58:21.624 INFO: Analyzing 26 UCFGs to detect vulnerabilities.
14:58:21.624 INFO: Check cache: Starting
14:58:21.625 INFO: Load cache: Starting
14:58:21.627 INFO: Load cache: Time spent was 00:00:00.000
14:58:21.628 INFO: Check cache: Time spent was 00:00:00.003
14:58:21.628 INFO: Create runtime call graph: Starting
14:58:21.629 INFO: Variable Type Analysis #1: Starting
14:58:21.630 INFO: Create runtime type propagation graph: Starting
14:58:21.634 INFO: Create runtime type propagation graph: Time spent was 00:00:00.004
14:58:21.635 INFO: Run SCC (Tarjan) on 47 nodes: Starting
14:58:21.637 INFO: Run SCC (Tarjan) on 47 nodes: Time spent was 00:00:00.001
14:58:21.638 INFO: Tarjan found 47 strongly connected components
14:58:21.638 INFO: Propagate runtime types to strongly connected components: Starting
14:58:21.639 INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.001
14:58:21.639 INFO: Variable Type Analysis #1: Time spent was 00:00:00.010
14:58:21.640 INFO: Variable Type Analysis #2: Starting
14:58:21.640 INFO: Create runtime type propagation graph: Starting
14:58:21.642 INFO: Create runtime type propagation graph: Time spent was 00:00:00.001
14:58:21.642 INFO: Run SCC (Tarjan) on 47 nodes: Starting
14:58:21.642 INFO: Run SCC (Tarjan) on 47 nodes: Time spent was 00:00:00.000
14:58:21.642 INFO: Tarjan found 47 strongly connected components
14:58:21.643 INFO: Propagate runtime types to strongly connected components: Starting
14:58:21.643 INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.000
14:58:21.645 INFO: Variable Type Analysis #2: Time spent was 00:00:00.003
14:58:21.646 INFO: Create runtime call graph: Time spent was 00:00:00.018
14:58:21.646 INFO: Load config: Starting
14:58:21.830 DEBUG: Loaded 1596 sources.
14:58:21.858 DEBUG: Loaded 192 sanitizers.
14:58:21.869 DEBUG: Loaded 40 validators.
14:58:22.552 DEBUG: Loaded 88766 passthroughs.
14:58:22.608 DEBUG: Loaded 0 collectionHandlers.
14:58:23.281 DEBUG: Loaded 61132 sinks.
14:58:23.315 DEBUG: Loaded 4 encoders.
14:58:23.317 DEBUG: Loaded 3 decoders.
14:58:23.335 INFO: Load config: Time spent was 00:00:01.688
14:58:23.335 INFO: Compute entry points: Starting
14:58:24.333 INFO: Compute entry points: Time spent was 00:00:00.996
14:58:24.333 INFO: No entry points found.
14:58:24.344 INFO: java security sensor: Time spent was 00:00:02.838
14:58:24.346 INFO: java security sensor: Begin: 2024-09-20T14:58:21.506291161Z, End: 2024-09-20T14:58:24.344363885Z, Duration: 00:00:02.838
  Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:21.508482652Z, End: 2024-09-20T14:58:21.624409153Z, Duration: 00:00:00.115
    Load type hierarchy: Begin: 2024-09-20T14:58:21.508772722Z, End: 2024-09-20T14:58:21.548217336Z, Duration: 00:00:00.039
    Load UCFGs: Begin: 2024-09-20T14:58:21.548729496Z, End: 2024-09-20T14:58:21.623870413Z, Duration: 00:00:00.075
  Check cache: Begin: 2024-09-20T14:58:21.624983213Z, End: 2024-09-20T14:58:21.628059614Z, Duration: 00:00:00.003
    Load cache: Begin: 2024-09-20T14:58:21.625187933Z, End: 2024-09-20T14:58:21.625494383Z, Duration: 00:00:00.000
  Create runtime call graph: Begin: 2024-09-20T14:58:21.628303364Z, End: 2024-09-20T14:58:21.646304621Z, Duration: 00:00:00.018
    Variable Type Analysis #1: Begin: 2024-09-20T14:58:21.629287035Z, End: 2024-09-20T14:58:21.639671658Z, Duration: 00:00:00.010
      Create runtime type propagation graph: Begin: 2024-09-20T14:58:21.630522195Z, End: 2024-09-20T14:58:21.634537016Z, Duration: 00:00:00.004
      Run SCC (Tarjan) on 47 nodes: Begin: 2024-09-20T14:58:21.635445987Z, End: 2024-09-20T14:58:21.636745887Z, Duration: 00:00:00.001
      Propagate runtime types to strongly connected components: Begin: 2024-09-20T14:58:21.638292358Z, End: 2024-09-20T14:58:21.639360328Z, Duration: 00:00:00.001
    Variable Type Analysis #2: Begin: 2024-09-20T14:58:21.640231798Z, End: 2024-09-20T14:58:21.644089610Z, Duration: 00:00:00.003
      Create runtime type propagation graph: Begin: 2024-09-20T14:58:21.640401738Z, End: 2024-09-20T14:58:21.641907529Z, Duration: 00:00:00.001
      Run SCC (Tarjan) on 47 nodes: Begin: 2024-09-20T14:58:21.642301919Z, End: 2024-09-20T14:58:21.642665499Z, Duration: 00:00:00.000
      Propagate runtime types to strongly connected components: Begin: 2024-09-20T14:58:21.643074569Z, End: 2024-09-20T14:58:21.643851980Z, Duration: 00:00:00.000
  Load config: Begin: 2024-09-20T14:58:21.646549381Z, End: 2024-09-20T14:58:23.335343138Z, Duration: 00:00:01.688
  Compute entry points: Begin: 2024-09-20T14:58:23.335974238Z, End: 2024-09-20T14:58:24.332935671Z, Duration: 00:00:00.996
14:58:24.346 INFO: java security sensor peak memory: 498 MB
14:58:24.347 DEBUG: Debug information:
14:58:24.347 INFO: Sensor JavaSecuritySensor [security] (done) | time=2844ms
14:58:24.347 INFO: Sensor CSharpSecuritySensor [security]
14:58:24.347 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
14:58:24.348 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.348 INFO: Load type hierarchy: Starting
14:58:24.348 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/ucfg2/cs
14:58:24.348 INFO: Read 0 type definitions
14:58:24.348 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.348 INFO: Load UCFGs: Starting
14:58:24.348 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.348 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.348 INFO: No UCFGs have been included for analysis.
14:58:24.349 INFO: csharp security sensor: Time spent was 00:00:00.001
14:58:24.349 INFO: csharp security sensor: Begin: 2024-09-20T14:58:24.347748336Z, End: 2024-09-20T14:58:24.349130617Z, Duration: 00:00:00.001
  Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.348024436Z, End: 2024-09-20T14:58:24.348702066Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-20T14:58:24.348052236Z, End: 2024-09-20T14:58:24.348311406Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-20T14:58:24.348538786Z, End: 2024-09-20T14:58:24.348594726Z, Duration: 00:00:00.000
14:58:24.349 INFO: csharp security sensor peak memory: 498 MB
14:58:24.349 DEBUG: Debug information:
14:58:24.349 INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
14:58:24.349 INFO: Sensor PhpSecuritySensor [security]
14:58:24.350 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
14:58:24.350 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.350 INFO: Load type hierarchy: Starting
14:58:24.350 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/php
14:58:24.350 INFO: Read 0 type definitions
14:58:24.350 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.350 INFO: Load UCFGs: Starting
14:58:24.350 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.350 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.350 INFO: No UCFGs have been included for analysis.
14:58:24.351 INFO: php security sensor: Time spent was 00:00:00.000
14:58:24.351 INFO: php security sensor: Begin: 2024-09-20T14:58:24.350029777Z, End: 2024-09-20T14:58:24.351001478Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.350211207Z, End: 2024-09-20T14:58:24.350631527Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-20T14:58:24.350240657Z, End: 2024-09-20T14:58:24.350392037Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-20T14:58:24.350503657Z, End: 2024-09-20T14:58:24.350555487Z, Duration: 00:00:00.000
14:58:24.351 INFO: php security sensor peak memory: 498 MB
14:58:24.351 DEBUG: Debug information:
14:58:24.351 INFO: Sensor PhpSecuritySensor [security] (done) | time=2ms
14:58:24.351 INFO: Sensor PythonSecuritySensor [security]
14:58:24.351 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
14:58:24.352 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.352 INFO: Load type hierarchy: Starting
14:58:24.352 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/python
14:58:24.352 INFO: Read 0 type definitions
14:58:24.352 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.352 INFO: Load UCFGs: Starting
14:58:24.352 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.352 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.352 INFO: No UCFGs have been included for analysis.
14:58:24.352 INFO: python security sensor: Time spent was 00:00:00.000
14:58:24.353 INFO: python security sensor: Begin: 2024-09-20T14:58:24.351811268Z, End: 2024-09-20T14:58:24.352773318Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.352005258Z, End: 2024-09-20T14:58:24.352402228Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-20T14:58:24.352031448Z, End: 2024-09-20T14:58:24.352158208Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-20T14:58:24.352273318Z, End: 2024-09-20T14:58:24.352304058Z, Duration: 00:00:00.000
14:58:24.353 INFO: python security sensor peak memory: 498 MB
14:58:24.353 DEBUG: Debug information:
14:58:24.353 INFO: Sensor PythonSecuritySensor [security] (done) | time=2ms
14:58:24.353 INFO: Sensor JsSecuritySensor [security]
14:58:24.353 INFO: Enabled taint analysis rules: S2631, S5146, S2083, S6350, S6287, S5147, S5334, S5144, S6105, S5696, S3649, S5131, S5883, S2076, S6096
14:58:24.353 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.353 INFO: Load type hierarchy: Starting
14:58:24.353 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/js
14:58:24.353 INFO: Read 0 type definitions
14:58:24.354 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.354 INFO: Load UCFGs: Starting
14:58:24.354 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.354 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.354 INFO: No UCFGs have been included for analysis.
14:58:24.354 INFO: js security sensor: Time spent was 00:00:00.000
14:58:24.354 INFO: js security sensor: Begin: 2024-09-20T14:58:24.353524328Z, End: 2024-09-20T14:58:24.354510948Z, Duration: 00:00:00.000
  Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.353798748Z, End: 2024-09-20T14:58:24.354163399Z, Duration: 00:00:00.000
    Load type hierarchy: Begin: 2024-09-20T14:58:24.353820588Z, End: 2024-09-20T14:58:24.353943779Z, Duration: 00:00:00.000
    Load UCFGs: Begin: 2024-09-20T14:58:24.354060979Z, End: 2024-09-20T14:58:24.354095168Z, Duration: 00:00:00.000
14:58:24.354 INFO: js security sensor peak memory: 498 MB
14:58:24.355 DEBUG: Debug information:
14:58:24.355 INFO: Sensor JsSecuritySensor [security] (done) | time=2ms
14:58:24.359 INFO: ------------- Run sensors on project
14:58:24.512 DEBUG: 'Import external issues report from SARIF file.' skipped because one of the required properties is missing
14:58:24.513 DEBUG: Sensors : Zero Coverage Sensor -> Java CPD Block Indexer
14:58:24.513 INFO: Sensor Zero Coverage Sensor
14:58:24.520 INFO: Sensor Zero Coverage Sensor (done) | time=7ms
14:58:24.521 INFO: Sensor Java CPD Block Indexer
14:58:24.527 DEBUG: Populating index from src/main/java/com/buenbit/api/Application.java
14:58:24.532 DEBUG: Not enough content in 'src/main/java/com/buenbit/api/Application.java' to have CPD blocks, it will not be part of the duplication detection
14:58:24.532 DEBUG: Populating index from src/main/java/com/buenbit/api/rep.java
14:58:24.542 DEBUG: Populating index from src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
14:58:24.543 DEBUG: Not enough content in 'src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java' to have CPD blocks, it will not be part of the duplication detection
14:58:24.543 DEBUG: Populating index from src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java
14:58:24.544 DEBUG: Not enough content in 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java' to have CPD blocks, it will not be part of the duplication detection
14:58:24.544 INFO: Sensor Java CPD Block Indexer (done) | time=23ms
14:58:24.550 INFO: CPD Executor 3 files had no CPD blocks
14:58:24.550 INFO: CPD Executor Calculating CPD for 1 file
14:58:24.550 DEBUG: Detection of duplications for /builds/buenbit/svc-shadow/src/main/java/com/buenbit/api/rep.java
14:58:24.556 INFO: CPD Executor CPD calculation finished (done) | time=6ms
14:58:24.681 INFO: SCM writing changed lines
14:58:24.685 WARN: Could not find ref: main in refs/heads, refs/remotes/upstream or refs/remotes/origin
14:58:24.685 DEBUG: All found refs are:
14:58:24.686 DEBUG: Ref[HEAD=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:24.686 DEBUG: Ref[refs/pipelines/1462370584=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:24.686 DEBUG: SCM reported changed lines for 0 files in the branch
14:58:24.686 INFO: SCM writing changed lines (done) | time=5ms
14:58:24.692 DEBUG: Could not detect the dotnet / msbuild version
14:58:24.692 DEBUG: MSBuild version NOT found.
14:58:24.775 INFO: Analysis report generated in 218ms, dir size=266 KB
14:58:24.799 INFO: Analysis report compressed in 23ms, zip size=55 KB
14:58:24.799 INFO: Analysis report generated in /builds/buenbit/svc-shadow/.scannerwork/scanner-report
14:58:24.799 DEBUG: Upload report
14:58:24.805 DEBUG: --> POST https://sonarcloud.io/api/ce/submit?organization=bbsckey01&projectKey=buenbit_svc-shadow&characteristic=pullRequest%3D89 (56697-byte body)
14:58:25.468 DEBUG: <-- 200 https://sonarcloud.io/api/ce/submit?organization=bbsckey01&projectKey=buenbit_svc-shadow&characteristic=pullRequest%3D89 (662ms, 44-byte body)
14:58:25.470 INFO: Analysis report uploaded in 671ms
14:58:25.472 DEBUG: Report metadata written to /builds/buenbit/svc-shadow/.scannerwork/report-task.txt
14:58:25.472 INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=buenbit_svc-shadow&pullRequest=89
14:58:25.472 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
14:58:25.473 INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZIP8P-nfOS6l-AoYpyg
14:58:25.476 DEBUG: Post-jobs : 
14:58:25.480 INFO: Analysis total time: 27.911 s
14:58:25.483 INFO: ------------------------------------------------------------------------
14:58:25.483 INFO: EXECUTION SUCCESS
14:58:25.484 INFO: ------------------------------------------------------------------------
14:58:25.484 INFO: Total time: 32.630s
14:58:25.590 INFO: Final Memory: 37M/130M
14:58:25.591 INFO: ------------------------------------------------------------------------
14:58:25.596 DEBUG: Cleanup org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$290/0x00007fc31f2fea70@7f8633ae during JVM shutdown
Saving cache for successful job
00:01
Creating cache sonarcloud-check-non_protected...
.sonar/cache: found 137 matching artifact files and directories 
Archive is up to date!                             
Created cache
Cleaning up project directory and file based variables
00:00
Job succeeded

Hi,

Thanks for the log. Here’s what I’m seeing in this one:

14:57:56.546 INFO: Load/download plugins
14:57:56.547 DEBUG: Download plugin 'iac' to '/opt/sonar-scanner/.sonar/_tmp/fileCache569188061798334514.tmp'
14:57:56.548 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/iac/versions/70a523f9e2c4ec08ad8f855332ccb50e.jar
14:57:56.645 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/iac/versions/70a523f9e2c4ec08ad8f855332ccb50e.jar (97ms, 17669077-byte body)
14:57:57.102 DEBUG: Download plugin 'jacoco' to '/opt/sonar-scanner/.sonar/_tmp/fileCache1444957855897369404.tmp'
14:57:57.103 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar
14:57:57.118 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar (14ms, 23258-byte body)
14:57:57.122 DEBUG: Download plugin 'license' to '/opt/sonar-scanner/.sonar/_tmp/fileCache89285963539071582.tmp'
14:57:57.122 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/license/versions/ef248e22aceb48d4860acc6600c4a812.jar
14:57:57.137 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/license/versions/ef248e22aceb48d4860acc6600c4a812.jar (14ms, 17404-byte body)
14:57:57.141 DEBUG: Download plugin 'text' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7669263291650073140.tmp'
14:57:57.141 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/text/versions/11a9b9e5d76fe507aaf1738f48e0b383.jar
14:57:57.156 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/text/versions/11a9b9e5d76fe507aaf1738f48e0b383.jar (14ms, 7022155-byte body)
14:57:57.294 DEBUG: Download plugin 'xml' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9344476523661234397.tmp'
14:57:57.295 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar
14:57:57.310 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar (14ms, 2507592-byte body)
14:57:57.371 INFO: Load/download plugins (done) | time=825ms
14:57:57.372 DEBUG: Plugins not loaded because they are optional: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, dart]
14:57:57.407 DEBUG: Plugins loaded:
14:57:57.407 DEBUG:   * JaCoCo 1.3.0.1538 (jacoco)
14:57:57.407 DEBUG:   * License for SonarLint 8.0.0.56719 (license)
14:57:57.407 DEBUG:   * IaC Code Quality and Security 1.35.0.12330 (iac)
14:57:57.407 DEBUG:   * Text Code Quality and Security 2.15.0.3845 (text)
14:57:57.408 DEBUG:   * XML Code Quality and Security 2.10.0.4108 (xml)

Analysis didn’t see any Java to analyze in this one. What actually changed in the MR?

 
Ann