Here the log with debuggin.
avatarBuenbit
svc-shadow
Jobs
#7879487620
sonarcloud-check
Passed
Started
1 minute ago
by
JONATHAN AGUIRRE
Search visible log output
Running with gitlab-runner 17.4.0~pre.110.g27400594 (27400594)
on blue-2.saas-linux-small-amd64.runners-manager.gitlab.com/default XxUrkriX, system ID: s_f46a988edce4
Preparing the "docker+machine" executor
00:09
Using Docker executor with image sonarsource/sonar-scanner-cli:latest ...
Pulling docker image sonarsource/sonar-scanner-cli:latest ...
Using docker image sha256:28ccb3e6dcd60822ea19a882cd9b47f204326ab78235403847ea5737491e8281 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:0bc49076468d2955948867620b2d98d67f0d59c0fd4a5ef1f0afc55cf86f2079 ...
Preparing environment
00:03
Running on runner-xxurkrix-project-43618124-concurrent-0 via runner-xxurkrix-s-l-s-amd64-1726844205-2d82980a...
Getting source from Git repository
00:01
Fetching changes with git depth set to 20...
Initialized empty Git repository in /builds/buenbit/svc-shadow/.git/
Created fresh repository.
Checking out f63b8f85 as detached HEAD (ref is refs/merge-requests/89/head)...
Skipping Git submodules setup
$ git remote set-url origin "${CI_REPOSITORY_URL}"
Restoring cache
00:10
Checking cache for sonarcloud-check-non_protected...
Downloading cache from https://storage.googleapis.com/gitlab-com-runners-cache/project/43618124/sonarcloud-check-non_protected ETag="5ca78ddf3cc4308b29516071c38837dc"
Successfully extracted cache
Executing "step_script" stage of the job script
00:34
Using docker image sha256:28ccb3e6dcd60822ea19a882cd9b47f204326ab78235403847ea5737491e8281 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:0bc49076468d2955948867620b2d98d67f0d59c0fd4a5ef1f0afc55cf86f2079 ...
$ sonar-scanner -X
14:57:52.863 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
14:57:52.877 INFO: Project root configuration file: /builds/buenbit/svc-shadow/sonar-project.properties
14:57:52.906 INFO: SonarScanner 5.0.1.3006
14:57:52.906 INFO: Java 17.0.11 Alpine (64-bit)
14:57:52.906 INFO: Linux 5.15.154+ amd64
14:57:53.083 DEBUG: keyStore is :
14:57:53.084 DEBUG: keyStore type is : pkcs12
14:57:53.084 DEBUG: keyStore provider is :
14:57:53.084 DEBUG: init keystore
14:57:53.085 DEBUG: init keymanager of type SunX509
14:57:53.205 DEBUG: Create: /opt/sonar-scanner/.sonar/cache
14:57:53.206 INFO: User cache: /opt/sonar-scanner/.sonar/cache
14:57:53.206 DEBUG: Create: /opt/sonar-scanner/.sonar/cache/_tmp
14:57:53.209 DEBUG: Extract sonar-scanner-api-batch in temp...
14:57:53.212 DEBUG: Get bootstrap index...
14:57:53.213 DEBUG: Download: https://sonarcloud.io/batch/index
14:57:53.653 DEBUG: Get bootstrap completed
14:57:53.656 DEBUG: Download https://sonarcloud.io/batch/file?name=sonarcloud-scanner-engine-11.3.0.200.jar to /opt/sonar-scanner/.sonar/cache/_tmp/fileCache16323836302219378261.tmp
14:57:54.633 DEBUG: Create isolated classloader...
14:57:54.645 DEBUG: Start temp cleaning...
14:57:54.648 DEBUG: Temp cleaning done
14:57:54.648 DEBUG: Execution getVersion
14:57:54.662 INFO: Analyzing on SonarQube server 11.3.0.200
14:57:54.663 INFO: Default locale: "en_US", source code encoding: "UTF-8"
14:57:54.663 DEBUG: Work directory: /builds/buenbit/svc-shadow/.scannerwork
14:57:54.666 DEBUG: Execution execute
14:57:54.899 DEBUG: JVM max available memory: 1 GB
14:57:55.091 DEBUG: Sonar User Home: /opt/sonar-scanner/.sonar
14:57:55.092 DEBUG: Initialize DefaultScannerWsClient
14:57:55.492 DEBUG: Loaded [441] system trusted certificates
14:57:55.588 INFO: Load global settings
14:57:55.601 DEBUG: --> GET https://sonarcloud.io/api/settings/values.protobuf
14:57:56.140 DEBUG: <-- 200 https://sonarcloud.io/api/settings/values.protobuf (538ms, unknown-length body)
14:57:56.152 INFO: Load global settings (done) | time=565ms
14:57:56.157 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
14:57:56.160 DEBUG: Initialize DownloadPluginsScannerWsClient
14:57:56.349 DEBUG: Loaded [441] system trusted certificates
14:57:56.354 DEBUG: Create : /opt/sonar-scanner/.sonar/_tmp
14:57:56.354 DEBUG: User cache: /opt/sonar-scanner/.sonar/cache
14:57:56.360 INFO: Loading required plugins
14:57:56.360 INFO: Load plugins index
14:57:56.361 DEBUG: --> GET https://sonarcloud.io/api/plugins/installed
14:57:56.510 DEBUG: <-- 200 https://sonarcloud.io/api/plugins/installed (149ms, unknown-length body)
14:57:56.545 INFO: Load plugins index (done) | time=185ms
14:57:56.546 INFO: Load/download plugins
14:57:56.547 DEBUG: Download plugin 'iac' to '/opt/sonar-scanner/.sonar/_tmp/fileCache569188061798334514.tmp'
14:57:56.548 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/iac/versions/70a523f9e2c4ec08ad8f855332ccb50e.jar
14:57:56.645 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/iac/versions/70a523f9e2c4ec08ad8f855332ccb50e.jar (97ms, 17669077-byte body)
14:57:57.102 DEBUG: Download plugin 'jacoco' to '/opt/sonar-scanner/.sonar/_tmp/fileCache1444957855897369404.tmp'
14:57:57.103 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar
14:57:57.118 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/jacoco/versions/04bba36a445c3713a632aa358be2f99c.jar (14ms, 23258-byte body)
14:57:57.122 DEBUG: Download plugin 'license' to '/opt/sonar-scanner/.sonar/_tmp/fileCache89285963539071582.tmp'
14:57:57.122 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/license/versions/ef248e22aceb48d4860acc6600c4a812.jar
14:57:57.137 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/license/versions/ef248e22aceb48d4860acc6600c4a812.jar (14ms, 17404-byte body)
14:57:57.141 DEBUG: Download plugin 'text' to '/opt/sonar-scanner/.sonar/_tmp/fileCache7669263291650073140.tmp'
14:57:57.141 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/text/versions/11a9b9e5d76fe507aaf1738f48e0b383.jar
14:57:57.156 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/text/versions/11a9b9e5d76fe507aaf1738f48e0b383.jar (14ms, 7022155-byte body)
14:57:57.294 DEBUG: Download plugin 'xml' to '/opt/sonar-scanner/.sonar/_tmp/fileCache9344476523661234397.tmp'
14:57:57.295 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar
14:57:57.310 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/xml/versions/dc7530956473c81946456a4a3587ff22.jar (14ms, 2507592-byte body)
14:57:57.371 INFO: Load/download plugins (done) | time=825ms
14:57:57.372 DEBUG: Plugins not loaded because they are optional: [abap, sonarapex, csharp, cpp, cobol, dbd, dbdjavafrontend, dbdpythonfrontend, flex, go, web, jcl, javasymbolicexecution, java, javascript, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, security, securitycsharpfrontend, securityjsfrontend, securityjavafrontend, securityphpfrontend, securitypythonfrontend, dart]
14:57:57.407 DEBUG: Plugins loaded:
14:57:57.407 DEBUG: * JaCoCo 1.3.0.1538 (jacoco)
14:57:57.407 DEBUG: * License for SonarLint 8.0.0.56719 (license)
14:57:57.407 DEBUG: * IaC Code Quality and Security 1.35.0.12330 (iac)
14:57:57.407 DEBUG: * Text Code Quality and Security 2.15.0.3845 (text)
14:57:57.408 DEBUG: * XML Code Quality and Security 2.10.0.4108 (xml)
14:57:57.408 DEBUG: --> GET https://sonarcloud.io/api/server/version
14:57:57.551 DEBUG: <-- 200 https://sonarcloud.io/api/server/version (143ms, 11-byte body)
14:57:57.554 DEBUG: Updated analysis started with a difference of -69 milliseconds
14:57:57.565 DEBUG: Started at Fri Sep 20 14:57:56 GMT 2024
14:57:57.782 DEBUG: register org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$290/0x00007fc31f2fea70@7f8633ae with shutdown hook
14:57:57.809 INFO: Found an active CI vendor: 'Gitlab CI'
14:57:57.819 INFO: Load project settings for component key: 'buenbit_svc-shadow'
14:57:57.820 DEBUG: --> GET https://sonarcloud.io/api/settings/values.protobuf?component=buenbit_svc-shadow
14:57:57.990 DEBUG: <-- 200 https://sonarcloud.io/api/settings/values.protobuf?component=buenbit_svc-shadow (170ms, unknown-length body)
14:57:57.995 INFO: Load project settings for component key: 'buenbit_svc-shadow' (done) | time=176ms
14:57:58.005 INFO: Process project properties
14:57:58.014 DEBUG: Process project properties (done) | time=9ms
14:57:58.017 INFO: Project key: buenbit_svc-shadow
14:57:58.018 INFO: Base dir: /builds/buenbit/svc-shadow
14:57:58.020 INFO: Working dir: /builds/buenbit/svc-shadow/.scannerwork
14:57:58.021 DEBUG: Project global encoding: UTF-8, default locale: en_US
14:57:58.023 DEBUG: Creating module hierarchy
14:57:58.024 DEBUG: Init module 'buenbit_svc-shadow'
14:57:58.024 DEBUG: Base dir: /builds/buenbit/svc-shadow
14:57:58.024 DEBUG: Working dir: /builds/buenbit/svc-shadow/.scannerwork
14:57:58.025 DEBUG: Module global encoding: UTF-8, default locale: en_US
14:57:58.028 INFO: Load project branches
14:57:58.029 DEBUG: --> GET https://sonarcloud.io/api/project_branches/list?project=buenbit_svc-shadow
14:57:58.204 DEBUG: <-- 200 https://sonarcloud.io/api/project_branches/list?project=buenbit_svc-shadow (174ms, unknown-length body)
14:57:58.208 INFO: Load project branches (done) | time=180ms
14:57:58.212 INFO: Check ALM binding of project 'buenbit_svc-shadow'
14:57:58.214 DEBUG: --> GET https://sonarcloud.io/api/alm_integration/is_project_bound?project=buenbit_svc-shadow
14:57:58.362 DEBUG: <-- 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=buenbit_svc-shadow (147ms, unknown-length body)
14:57:58.365 INFO: Detected project binding: BOUND
14:57:58.366 INFO: Check ALM binding of project 'buenbit_svc-shadow' (done) | time=154ms
14:57:58.368 INFO: Load project pull requests
14:57:58.369 DEBUG: --> GET https://sonarcloud.io/api/project_pull_requests/list?project=buenbit_svc-shadow
14:57:58.553 DEBUG: <-- 200 https://sonarcloud.io/api/project_pull_requests/list?project=buenbit_svc-shadow (183ms, unknown-length body)
14:57:58.559 INFO: Load project pull requests (done) | time=191ms
14:57:58.562 INFO: Load branch configuration
14:57:58.564 INFO: Auto-configuring pull request 89
14:57:58.566 DEBUG: --> GET https://sonarcloud.io/api/alm_integration/show_pullrequest?project=buenbit_svc-shadow&pullrequestKey=89
14:58:02.025 DEBUG: <-- 200 https://sonarcloud.io/api/alm_integration/show_pullrequest?project=buenbit_svc-shadow&pullrequestKey=89 (3458ms, unknown-length body)
14:58:02.029 INFO: Load branch configuration (done) | time=3467ms
14:58:02.042 INFO: Load quality profiles
14:58:02.045 DEBUG: --> GET https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=buenbit_svc-shadow&organization=bbsckey01
14:58:02.765 DEBUG: <-- 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=buenbit_svc-shadow&organization=bbsckey01 (719ms, 4761-byte body)
14:58:02.793 INFO: Load quality profiles (done) | time=752ms
14:58:02.800 INFO: Load active rules
14:58:02.802 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mB&ps=500&p=1
14:58:02.967 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mB&ps=500&p=1 (164ms, 5852-byte body)
14:58:02.994 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lr&ps=500&p=1
14:58:03.157 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lr&ps=500&p=1 (162ms, 7272-byte body)
14:58:03.163 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l3&ps=500&p=1
14:58:03.555 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l3&ps=500&p=1 (391ms, 8119-byte body)
14:58:03.562 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lo&ps=500&p=1
14:58:03.719 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lo&ps=500&p=1 (156ms, 11-byte body)
14:58:03.720 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lz&ps=500&p=1
14:58:04.158 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lz&ps=500&p=1 (437ms, unknown-length body)
14:58:04.438 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mD&ps=500&p=1
14:58:04.636 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mD&ps=500&p=1 (197ms, unknown-length body)
14:58:04.672 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ln&ps=500&p=1
14:58:04.834 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ln&ps=500&p=1 (160ms, unknown-length body)
14:58:04.838 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ls&ps=500&p=1
14:58:05.001 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ls&ps=500&p=1 (163ms, unknown-length body)
14:58:05.004 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lq&ps=500&p=1
14:58:05.410 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lq&ps=500&p=1 (406ms, unknown-length body)
14:58:05.527 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmg4Z_un-6v83iBv&ps=500&p=1
14:58:05.696 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZHgMmg4Z_un-6v83iBv&ps=500&p=1 (168ms, unknown-length body)
14:58:05.700 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5x5A4M0h26275huV&ps=500&p=1
14:58:05.868 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFU5x5A4M0h26275huV&ps=500&p=1 (168ms, 2798-byte body)
14:58:05.870 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=1
14:58:06.096 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=1 (225ms, unknown-length body)
14:58:06.235 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=2
14:58:06.445 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mC&ps=500&p=2 (209ms, unknown-length body)
14:58:06.448 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lv&ps=500&p=1
14:58:06.609 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lv&ps=500&p=1 (160ms, unknown-length body)
14:58:06.612 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lm&ps=500&p=1
14:58:06.774 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lm&ps=500&p=1 (161ms, unknown-length body)
14:58:06.776 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lk&ps=500&p=1
14:58:06.951 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lk&ps=500&p=1 (174ms, 6000-byte body)
14:58:06.954 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l4&ps=500&p=1
14:58:07.113 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l4&ps=500&p=1 (159ms, 11-byte body)
14:58:07.115 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8phcUjvLIw7iVnR&ps=500&p=1
14:58:07.326 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AZFvm8phcUjvLIw7iVnR&ps=500&p=1 (211ms, unknown-length body)
14:58:07.451 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lp&ps=500&p=1
14:58:07.615 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lp&ps=500&p=1 (163ms, 288-byte body)
14:58:07.616 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43ll&ps=500&p=1
14:58:07.791 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43ll&ps=500&p=1 (174ms, unknown-length body)
14:58:07.798 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l6&ps=500&p=1
14:58:07.960 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l6&ps=500&p=1 (162ms, 7589-byte body)
14:58:07.962 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ly&ps=500&p=1
14:58:08.133 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43ly&ps=500&p=1 (170ms, unknown-length body)
14:58:08.136 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l5&ps=500&p=1
14:58:08.300 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l5&ps=500&p=1 (164ms, 11-byte body)
14:58:08.301 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lj&ps=500&p=1
14:58:08.516 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lj&ps=500&p=1 (214ms, unknown-length body)
14:58:08.643 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l-&ps=500&p=1
14:58:08.842 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l-&ps=500&p=1 (198ms, unknown-length body)
14:58:08.853 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l7&ps=500&p=1
14:58:09.027 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l7&ps=500&p=1 (174ms, 6405-byte body)
14:58:09.029 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lu&ps=500&p=1
14:58:09.204 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lu&ps=500&p=1 (174ms, unknown-length body)
14:58:09.210 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lf&ps=500&p=1
14:58:09.369 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43lf&ps=500&p=1 (159ms, 7367-byte body)
14:58:09.371 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mE&ps=500&p=1
14:58:09.532 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mE&ps=500&p=1 (160ms, 4412-byte body)
14:58:09.533 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lw&ps=500&p=1
14:58:09.693 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lw&ps=500&p=1 (159ms, unknown-length body)
14:58:09.695 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43le&ps=500&p=1
14:58:09.862 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43le&ps=500&p=1 (166ms, 6266-byte body)
14:58:09.863 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lt&ps=500&p=1
14:58:10.035 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lt&ps=500&p=1 (172ms, unknown-length body)
14:58:10.042 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l0&ps=500&p=1
14:58:10.225 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l0&ps=500&p=1 (182ms, 8036-byte body)
14:58:10.226 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lx&ps=500&p=1
14:58:10.441 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43lx&ps=500&p=1 (214ms, unknown-length body)
14:58:10.457 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43li&ps=500&p=1
14:58:10.628 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4utE7r1_zs43li&ps=500&p=1 (170ms, unknown-length body)
14:58:10.632 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l9&ps=500&p=1
14:58:10.809 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l9&ps=500&p=1 (177ms, unknown-length body)
14:58:10.823 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l8&ps=500&p=1
14:58:10.995 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l8&ps=500&p=1 (172ms, unknown-length body)
14:58:10.997 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-k6VEjuu3U2UCbc1&ps=500&p=1
14:58:11.168 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYk_-k6VEjuu3U2UCbc1&ps=500&p=1 (170ms, unknown-length body)
14:58:11.170 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l1&ps=500&p=1
14:58:11.337 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l1&ps=500&p=1 (166ms, unknown-length body)
14:58:11.339 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mA&ps=500&p=1
14:58:11.525 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43mA&ps=500&p=1 (185ms, unknown-length body)
14:58:11.532 DEBUG: --> GET https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l_&ps=500&p=1
14:58:11.731 DEBUG: <-- 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYZLkm4vtE7r1_zs43l_&ps=500&p=1 (198ms, unknown-length body)
14:58:11.768 INFO: Load active rules (done) | time=8968ms
14:58:11.819 DEBUG: --> GET https://sonarcloud.io/api/languages/list
14:58:11.961 DEBUG: <-- 200 https://sonarcloud.io/api/languages/list (141ms, unknown-length body)
14:58:11.977 INFO: Organization key: bbsckey01
14:58:11.979 INFO: Pull request 89 for merge into main from JONIAGUIRRE95-main-patch-53280
14:58:11.989 DEBUG: Declared patterns of language Kubernetes were converted to sonar.lang.patterns.kubernetes :
14:58:11.991 DEBUG: Declared patterns of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss,**/*.sass
14:58:11.991 DEBUG: Declared patterns of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
14:58:11.992 DEBUG: Declared patterns of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
14:58:11.992 DEBUG: Declared patterns of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.cjs,**/*.mjs,**/*.vue
14:58:11.993 DEBUG: Declared patterns of language Python were converted to sonar.lang.patterns.py : **/*.py
14:58:11.993 DEBUG: Declared patterns of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
14:58:11.993 DEBUG: Declared patterns of language Docker were converted to sonar.lang.patterns.docker : **/Dockerfile,**/*.dockerfile
14:58:11.994 DEBUG: Declared patterns of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb
14:58:11.994 DEBUG: Declared patterns of language Dart were converted to sonar.lang.patterns.dart : **/*.dart
14:58:11.994 DEBUG: Declared patterns of language JCL were converted to sonar.lang.patterns.jcl : **/*.jcl
14:58:11.995 DEBUG: Declared patterns of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
14:58:11.996 DEBUG: Declared patterns of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
14:58:11.996 DEBUG: Declared patterns of language Flex were converted to sonar.lang.patterns.flex : **/*.as
14:58:11.997 DEBUG: Declared patterns of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl,**/*.config
14:58:11.997 DEBUG: Declared patterns of language JSON were converted to sonar.lang.patterns.json : **/*.json
14:58:11.997 DEBUG: Declared patterns of language IPython Notebooks were converted to sonar.lang.patterns.ipynb : **/*.ipynb
14:58:11.997 DEBUG: Declared patterns of language Text were converted to sonar.lang.patterns.text :
14:58:11.998 DEBUG: Declared patterns of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
14:58:11.998 DEBUG: Declared patterns of language CloudFormation were converted to sonar.lang.patterns.cloudformation :
14:58:11.998 DEBUG: Declared patterns of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
14:58:11.999 DEBUG: Declared patterns of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
14:58:11.999 DEBUG: Declared patterns of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp,**/*.ixx,**/*.mxx,**/*.cppm,**/*.ccm,**/*.cxxm,**/*.c++m
14:58:12.000 DEBUG: Declared patterns of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
14:58:12.000 DEBUG: Declared patterns of language Go were converted to sonar.lang.patterns.go : **/*.go
14:58:12.000 DEBUG: Declared patterns of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt,**/*.kts
14:58:12.001 DEBUG: Declared patterns of language RPG were converted to sonar.lang.patterns.rpg : **/*.rpg,**/*.rpgle,**/*.sqlrpgle,**/*.rpg,**/*.rpgle,**/*.sqlrpgle
14:58:12.001 DEBUG: Declared patterns of language PL/I were converted to sonar.lang.patterns.pli : **/*.pli
14:58:12.001 DEBUG: Declared patterns of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
14:58:12.002 DEBUG: Declared patterns of language Vb were converted to sonar.lang.patterns.vb : **/*.bas,**/*.frm,**/*.ctl
14:58:12.002 DEBUG: Declared patterns of language Secrets were converted to sonar.lang.patterns.secrets :
14:58:12.002 DEBUG: Declared patterns of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
14:58:12.002 DEBUG: Declared patterns of language C# were converted to sonar.lang.patterns.cs : **/*.cs,**/*.razor
14:58:12.003 DEBUG: Declared patterns of language COBOL were converted to sonar.lang.patterns.cobol :
14:58:12.003 DEBUG: Declared patterns of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
14:58:12.003 DEBUG: Declared patterns of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
14:58:12.004 DEBUG: Declared patterns of language AzureResourceManager were converted to sonar.lang.patterns.azureresourcemanager : **/*.bicep
14:58:12.004 DEBUG: Declared patterns of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
14:58:12.004 DEBUG: Declared patterns of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
14:58:12.005 DEBUG: Declared patterns of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx,**/*.cts,**/*.mts
14:58:12.010 INFO: Preprocessing files...
14:58:12.041 DEBUG: loading config FileBasedConfig[/tmp/jgit/config]
14:58:12.043 DEBUG: readpipe [/usr/bin/git, --version],/usr/bin
14:58:12.059 DEBUG: readpipe may return 'git version 2.43.4'
14:58:12.059 DEBUG: remaining output:
14:58:12.060 DEBUG: readpipe [/usr/bin/git, config, --system, --show-origin, --list, -z],/usr/bin
14:58:12.064 DEBUG: readpipe may return 'null'
14:58:12.064 DEBUG: remaining output:
14:58:12.068 DEBUG: readpipe rc=128
14:58:12.068 DEBUG: Exception caught during execution of command '[/usr/bin/git, config, --system, --show-origin, --list, -z]' in '/usr/bin', return code '128', error message 'fatal: unable to read config file '/etc/gitconfig': No such file or directory
'
14:58:12.069 DEBUG: loading config FileBasedConfig[/tmp/git/config]
14:58:12.069 DEBUG: loading config UserConfigFile[/home/scanner-cli/.gitconfig]
14:58:12.147 DEBUG: 25 non excluded files in this Git repository
14:58:12.231 INFO: 5 languages detected in 19 preprocessed files
14:58:12.231 INFO: 0 files ignored because of inclusion/exclusion patterns
14:58:12.232 INFO: 0 files ignored because of scm ignore settings
14:58:12.288 INFO: Loading plugins for detected languages
14:58:12.289 DEBUG: Detected languages: [java, xml, json, yaml, docker]
14:58:12.289 INFO: Load/download plugins
14:58:12.290 DEBUG: Download plugin 'dbd' to '/opt/sonar-scanner/.sonar/_tmp/fileCache16997034850791493082.tmp'
14:58:12.291 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/dbd/versions/932efda5090f80aee103897e18c68d4b.jar
14:58:12.309 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/dbd/versions/932efda5090f80aee103897e18c68d4b.jar (17ms, 2936117-byte body)
14:58:12.389 DEBUG: Download plugin 'dbdjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache13227061581644927067.tmp'
14:58:12.390 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/a0bb807aef8085b547cbe4c71cdd2317.jar
14:58:12.404 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/dbdjavafrontend/versions/a0bb807aef8085b547cbe4c71cdd2317.jar (13ms, 1473767-byte body)
14:58:12.439 DEBUG: Download plugin 'javasymbolicexecution' to '/opt/sonar-scanner/.sonar/_tmp/fileCache3542951481799275616.tmp'
14:58:12.439 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/javasymbolicexecution/versions/b637ef58624974a8380d4225d86d2bcd.jar
14:58:12.454 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/javasymbolicexecution/versions/b637ef58624974a8380d4225d86d2bcd.jar (13ms, 11238045-byte body)
14:58:12.629 DEBUG: Download plugin 'java' to '/opt/sonar-scanner/.sonar/_tmp/fileCache8935889649866805062.tmp'
14:58:12.629 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/java/versions/a8e80e4cbda7272c93dcf83476f5b685.jar
14:58:12.643 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/java/versions/a8e80e4cbda7272c93dcf83476f5b685.jar (13ms, 19201293-byte body)
14:58:12.968 DEBUG: Download plugin 'javascript' to '/opt/sonar-scanner/.sonar/_tmp/fileCache10588694136237670041.tmp'
14:58:12.969 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/javascript/versions/99b28a588428e83639224d702c00b464.jar
14:58:12.984 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/javascript/versions/99b28a588428e83639224d702c00b464.jar (14ms, 86867260-byte body)
14:58:14.046 DEBUG: Download plugin 'security' to '/opt/sonar-scanner/.sonar/_tmp/fileCache10424991581482237631.tmp'
14:58:14.047 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/security/versions/cf92995300aa5330f567149c9d857219.jar
14:58:14.062 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/security/versions/cf92995300aa5330f567149c9d857219.jar (14ms, 12032952-byte body)
14:58:14.256 DEBUG: Download plugin 'securityjsfrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache1509268698917763933.tmp'
14:58:14.257 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/71b2cc10618f5611bdaf3fd5b8045f4b.jar
14:58:14.271 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/securityjsfrontend/versions/71b2cc10618f5611bdaf3fd5b8045f4b.jar (13ms, 266669-byte body)
14:58:14.279 DEBUG: Download plugin 'securityjavafrontend' to '/opt/sonar-scanner/.sonar/_tmp/fileCache11144917311663763191.tmp'
14:58:14.279 DEBUG: --> GET https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/df976930a1264dc2bf77da62b750babf.jar
14:58:14.297 DEBUG: <-- 200 https://scanner.sonarcloud.io/plugins/securityjavafrontend/versions/df976930a1264dc2bf77da62b750babf.jar (14ms, 9222613-byte body)
14:58:14.430 INFO: Load/download plugins (done) | time=2141ms
14:58:14.431 DEBUG: Optional language-specific plugins not loaded: [abap, sonarapex, csharp, cpp, cobol, dbdpythonfrontend, flex, go, web, jcl, kotlin, php, pli, plsql, python, rpg, ruby, sonarscala, swift, tsql, vbnet, vb, securitycsharpfrontend, securityphpfrontend, securitypythonfrontend, dart]
14:58:14.582 DEBUG: Plugins loaded:
14:58:14.583 DEBUG: * Vulnerability Rules for Java 10.7.0-M2.32758 (securityjavafrontend)
14:58:14.583 DEBUG: * Vulnerability Analysis 10.7.0-M2.32758 (security)
14:58:14.583 DEBUG: * Vulnerability Rules for JS 10.7.0-M2.32758 (securityjsfrontend)
14:58:14.583 DEBUG: * Java Code Quality and Security 8.2.0.36672 (java)
14:58:14.584 DEBUG: * Dataflow Bug Detection 1.30.0.10776 (dbd)
14:58:14.584 DEBUG: * Dataflow Bug Detection Rules for Java 1.30.0.10776 (dbdjavafrontend)
14:58:14.584 DEBUG: * Java Advanced Code Quality Analyzer 8.2.0.36672 (javasymbolicexecution)
14:58:14.584 DEBUG: * JavaScript/TypeScript/CSS Code Quality and Security 10.15.0.27423 (javascript)
14:58:14.791 INFO: Load project repositories
14:58:14.792 DEBUG: --> GET https://sonarcloud.io/batch/project.protobuf?key=buenbit_svc-shadow&branch=main
14:58:14.989 DEBUG: <-- 200 https://sonarcloud.io/batch/project.protobuf?key=buenbit_svc-shadow&branch=main (196ms, 1255-byte body)
14:58:14.997 INFO: Load project repositories (done) | time=206ms
14:58:14.999 INFO: SCM collecting changed files in the branch
14:58:15.003 WARN: Could not find ref: main in refs/heads, refs/remotes/upstream or refs/remotes/origin
14:58:15.003 DEBUG: All found refs are:
14:58:15.009 DEBUG: Ref[HEAD=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:15.009 DEBUG: Ref[refs/pipelines/1462370584=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:15.009 INFO: SCM collecting changed files in the branch (done) | time=10ms
14:58:15.009 DEBUG: SCM information about changed files in the branch is not available
14:58:15.016 INFO: Indexing files...
14:58:15.016 INFO: Project configuration:
14:58:15.016 INFO: Excluded sources: **/build-wrapper-dump.json
14:58:15.020 DEBUG: 'docker-compose.yml' indexed with language 'yaml'
14:58:15.022 DEBUG: 'new-svc-template.json' indexed with language 'json'
14:58:15.022 DEBUG: 'values-integration.yaml' indexed with language 'yaml'
14:58:15.023 DEBUG: 'pom.xml' indexed with language 'xml'
14:58:15.025 DEBUG: 'README.md' indexed with language 'null'
14:58:15.026 DEBUG: 'sonar-project.properties' indexed with language 'null'
14:58:15.027 DEBUG: 'Dockerfile' indexed with language 'docker'
14:58:15.029 DEBUG: 'src/main/resources/application-development.properties' indexed with language 'null'
14:58:15.032 DEBUG: 'src/main/resources/application-integration.properties' indexed with language 'null'
14:58:15.034 DEBUG: 'src/main/resources/application-production.properties' indexed with language 'null'
14:58:15.036 DEBUG: 'src/main/resources/application-staging.properties' indexed with language 'null'
14:58:15.039 DEBUG: 'src/main/resources/application.properties' indexed with language 'null'
14:58:15.039 DEBUG: 'src/main/java/com/buenbit/api/rep.java' indexed with language 'java'
14:58:15.040 DEBUG: 'src/main/java/com/buenbit/api/Application.java' indexed with language 'java'
14:58:15.041 DEBUG: 'src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java' indexed with language 'java'
14:58:15.041 DEBUG: 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java' indexed with language 'java'
14:58:15.042 DEBUG: 'values-production.yaml' indexed with language 'yaml'
14:58:15.043 DEBUG: 'test_issue_sonar' indexed with language 'null'
14:58:15.043 DEBUG: 'values-staging.yaml' indexed with language 'yaml'
14:58:15.045 INFO: 19 files indexed
14:58:15.054 DEBUG: Available languages:
14:58:15.055 DEBUG: * Terraform => "terraform"
14:58:15.055 DEBUG: * CloudFormation => "cloudformation"
14:58:15.055 DEBUG: * Kubernetes => "kubernetes"
14:58:15.055 DEBUG: * Docker => "docker"
14:58:15.055 DEBUG: * AzureResourceManager => "azureresourcemanager"
14:58:15.056 DEBUG: * YAML => "yaml"
14:58:15.056 DEBUG: * JSON => "json"
14:58:15.056 DEBUG: * Text => "text"
14:58:15.056 DEBUG: * Secrets => "secrets"
14:58:15.056 DEBUG: * XML => "xml"
14:58:15.057 DEBUG: * Java => "java"
14:58:15.057 DEBUG: * JavaScript => "js"
14:58:15.057 DEBUG: * TypeScript => "ts"
14:58:15.057 DEBUG: * CSS => "css"
14:58:15.058 INFO: Quality profile for docker: Sonar way
14:58:15.058 INFO: Quality profile for java: Sonar way
14:58:15.058 INFO: Quality profile for json: Sonar way
14:58:15.059 INFO: Quality profile for xml: Sonar way
14:58:15.059 INFO: Quality profile for yaml: Sonar way
14:58:15.059 INFO: ------------- Run sensors on module buenbit_svc-shadow
14:58:15.126 INFO: Load metrics repository
14:58:15.127 DEBUG: --> GET https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1
14:58:15.276 DEBUG: <-- 200 https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1 (149ms, unknown-length body)
14:58:15.283 INFO: Load metrics repository (done) | time=157ms
14:58:15.289 INFO: Sensor cache enabled
14:58:15.290 DEBUG: Initialize GenericWsClient
14:58:15.468 DEBUG: Loaded [441] system trusted certificates
14:58:15.475 INFO: Load sensor cache
14:58:15.476 DEBUG: --> GET https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=bbsckey01&project=buenbit_svc-shadow&branch=main
14:58:16.733 DEBUG: <-- 200 https://api.sonarcloud.io/analysis/sensor-cache/prepare-read?organization=bbsckey01&project=buenbit_svc-shadow&branch=main (1256ms, 1452-byte body)
14:58:16.763 DEBUG: --> GET https://analysis-sensorcache-eu-central-1-prod.s3.amazonaws.com/AYZLkmNGtE7r1_zs43lR/AZIAdSVXkIcrJ3YLggJx/AZIAdSVXkIcrJ3YLggJx?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=[MASKED]&X-Amz-Date=20240920T145816Z&X-Amz-Expires=15&X-Amz-SignedHeaders=host&X-Amz-Security-Token=[MASKED]&X-Amz-Signature=[MASKED]
14:58:17.235 DEBUG: <-- 200 OK https://analysis-sensorcache-eu-central-1-prod.s3.amazonaws.com/AYZLkmNGtE7r1_zs43lR/AZIAdSVXkIcrJ3YLggJx/AZIAdSVXkIcrJ3YLggJx?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=[MASKED]&X-Amz-Date=20240920T145816Z&X-Amz-Expires=15&X-Amz-SignedHeaders=host&X-Amz-Security-Token=[MASKED]&X-Amz-Signature=[MASKED] (471ms, 1553-byte body)
14:58:17.242 INFO: Load sensor cache (1 KB) | time=1767ms
14:58:17.579 DEBUG: Added 308 checks for language='ts', repository='typescript'
14:58:17.589 DEBUG: Added 15 checks for language='ts', repository='tssecurity'
14:58:17.597 DEBUG: Added 310 checks for language='js', repository='javascript'
14:58:17.600 DEBUG: Added 15 checks for language='js', repository='jssecurity'
14:58:17.604 DEBUG: No registered JsAnalysisConsumer.
14:58:18.392 DEBUG: 'Import external issues report' skipped because one of the required properties is missing
14:58:18.392 DEBUG: 'IaC Terraform Sensor' skipped because there is no related file in current project
14:58:18.393 DEBUG: 'JavaScript/TypeScript analysis' skipped because there is no related file in current project
14:58:18.394 DEBUG: 'JavaScript inside HTML analysis' skipped because there is no related file in current project
14:58:18.394 DEBUG: 'JavaScript/TypeScript Coverage' skipped because there is no related file in current project
14:58:18.395 DEBUG: 'Import of ESLint issues' skipped because one of the required properties is missing
14:58:18.395 DEBUG: 'Import of TSLint issues' skipped because one of the required properties is missing
14:58:18.395 DEBUG: 'CSS Metrics' skipped because there is no related file in current project
14:58:18.396 DEBUG: 'Import of stylelint issues' skipped because one of the required properties is missing
14:58:18.396 DEBUG: 'Import of Checkstyle issues' skipped because one of the required properties is missing
14:58:18.397 DEBUG: 'Import of PMD issues' skipped because one of the required properties is missing
14:58:18.397 DEBUG: 'Import of SpotBugs issues' skipped because one of the required properties is missing
14:58:18.398 DEBUG: 'Removed properties sensor' skipped because one of the required properties is missing
14:58:18.402 DEBUG: 'Generic Coverage Report' skipped because one of the required properties is missing
14:58:18.402 DEBUG: 'Generic Test Executions Report' skipped because one of the required properties is missing
14:58:18.403 DEBUG: Sensors : JavaSensor -> JaCoCo XML Report Importer -> IaC CloudFormation Sensor -> IaC Kubernetes Sensor -> IaC AzureResourceManager Sensor -> Java Config Sensor -> JavaScript inside YAML analysis -> CSS Rules -> ThymeLeaf template sensor -> SurefireSensor -> XML Sensor -> IaC Docker Sensor -> Serverless configuration file sensor -> AWS SAM template file sensor -> AWS SAM Inline template file sensor -> javabugs -> pythonbugs -> TextAndSecretsSensor -> JavaSecuritySensor -> CSharpSecuritySensor -> PhpSecuritySensor -> PythonSecuritySensor -> JsSecuritySensor
14:58:18.404 INFO: Sensor JavaSensor [java]
14:58:18.421 DEBUG: Property 'sonar.java.jdkHome' resolved with:
[]
14:58:18.422 DEBUG: Property 'sonar.java.libraries' resolved with:
[]
14:58:18.422 DEBUG: Property 'sonar.java.jdkHome' resolved with:
[]
14:58:18.422 DEBUG: Property 'sonar.java.test.libraries' resolved with:
[]
14:58:18.435 DEBUG: Found 0 JSP files.
14:58:18.438 INFO: The Java analyzer is running in a context where unchanged files can be skipped. Full analysis is performed for changed files, optimized analysis for unchanged files.
14:58:18.444 DEBUG: 'src/main/java/com/buenbit/api/Application.java' generated metadata with charset 'UTF-8'
14:58:18.446 DEBUG: Compatible cached data version '1.30.0.10776' found.
14:58:18.453 DEBUG: 'src/main/java/com/buenbit/api/rep.java' generated metadata with charset 'UTF-8'
14:58:18.454 DEBUG: 'src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java' generated metadata with charset 'UTF-8'
14:58:18.455 DEBUG: 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java' generated metadata with charset 'UTF-8'
14:58:18.456 INFO: Server-side caching is enabled. The Java analyzer was able to leverage cached data from previous analyses for 0 out of 4 files. These files will not be parsed.
14:58:18.458 INFO: Using ECJ batch to parse 4 Main java source files with batch size 104 KB.
14:58:18.623 INFO: Starting batch processing.
14:58:19.646 DEBUG: Incomplete Semantic, method invocation 'run' line 18 col 27
14:58:19.700 DEBUG: Incomplete Semantic, method invocation 'run' line 18 col 27
14:58:19.969 DEBUG: Incomplete Semantic, unknown parameter type 'Address' line 47 col 10
14:58:19.973 DEBUG: Incomplete Semantic, unknown return type 'getType' line 74 col 22
14:58:20.034 DEBUG: Incomplete Semantic, unknown parameter type 'setType' line 134 col 15
14:58:20.064 ERROR: Unable to parse source file : 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java'
14:58:20.064 ERROR: Parse error at line 6 column 0: Syntax error on tokens, delete these tokens
14:58:20.086 INFO: 100% analyzed
14:58:20.086 INFO: Batch processing: Done.
14:58:20.087 INFO: Optimized analysis for 3 of 4 files.
14:58:20.106 WARN: Dependencies/libraries were not provided for analysis of SOURCE files. The 'sonar.java.libraries' property is empty. Verify your configuration, as you might end up with less precise results.
14:58:20.109 WARN: Unresolved imports/types have been detected during analysis. Enable DEBUG mode to see them.
14:58:20.110 DEBUG: Unresolved imports/types:
- AddressType cannot be resolved to a type
* src/main/java/com/buenbit/api/rep.java
- BaseAuditableEntity cannot be resolved to a type
* src/main/java/com/buenbit/api/rep.java
- Column cannot be resolved to a type
* src/main/java/com/buenbit/api/rep.java
- Entity cannot be resolved to a type
* src/main/java/com/buenbit/api/rep.java
- Enumerated cannot be resolved to a type
* src/main/java/com/buenbit/api/rep.java
- RequestMapping cannot be resolved to a type
* src/main/java/com/buenbit/api/Application.java
- RestController cannot be resolved to a type
* src/main/java/com/buenbit/api/Application.java
- SpringBootApplication cannot be resolved to a type
* src/main/java/com/buenbit/api/Application.java
- SpringBootTest cannot be resolved to a type
* src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
- Test cannot be resolved to a type
* src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
- The import javax.persistence cannot be resolved
* src/main/java/com/buenbit/api/rep.java
- The import org.junit cannot be resolved
* src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
- The import org.springframework cannot be resolved
* src/main/java/com/buenbit/api/Application.java
* src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
14:58:20.110 WARN: Use of preview features have been detected during analysis. Enable DEBUG mode to see them.
14:58:20.110 DEBUG: Use of preview features:
- EnumType cannot be resolved to a variable
* src/main/java/com/buenbit/api/rep.java
- SpringApplication cannot be resolved
* src/main/java/com/buenbit/api/Application.java
- The public type Address must be defined in its own file
* src/main/java/com/buenbit/api/rep.java
14:58:20.111 INFO: No "Test" source files to scan.
14:58:20.111 INFO: No "Generated" source files to scan.
14:58:20.111 INFO: Sensor JavaSensor [java] (done) | time=1707ms
14:58:20.112 INFO: Sensor JaCoCo XML Report Importer [jacoco]
14:58:20.113 INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
14:58:20.114 INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
14:58:20.115 INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=2ms
14:58:20.115 INFO: Sensor IaC CloudFormation Sensor [iac]
14:58:20.117 DEBUG: 'values-integration.yaml' generated metadata with charset 'UTF-8'
14:58:20.118 DEBUG: File without identifier 'AWSTemplateFormatVersion': values-integration.yaml
14:58:20.118 DEBUG: 'values-staging.yaml' generated metadata with charset 'UTF-8'
14:58:20.119 DEBUG: File without identifier 'AWSTemplateFormatVersion': values-staging.yaml
14:58:20.119 DEBUG: 'docker-compose.yml' generated metadata with charset 'UTF-8'
14:58:20.120 DEBUG: File without identifier 'AWSTemplateFormatVersion': docker-compose.yml
14:58:20.120 DEBUG: 'new-svc-template.json' generated metadata with charset 'UTF-8'
14:58:20.121 DEBUG: File without identifier 'AWSTemplateFormatVersion': new-svc-template.json
14:58:20.121 DEBUG: 'values-production.yaml' generated metadata with charset 'UTF-8'
14:58:20.121 DEBUG: File without identifier 'AWSTemplateFormatVersion': values-production.yaml
14:58:20.135 INFO: 0 source files to be analyzed
14:58:20.142 INFO: 0/0 source files have been analyzed
14:58:20.142 INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=27ms
14:58:20.143 INFO: Sensor IaC Kubernetes Sensor [iac]
14:58:20.145 DEBUG: Checking conditions for enabling Helm analysis: isHelmActivationFlagTrue=true, isHelmEvaluatorExecutableAvailable=true
14:58:20.145 DEBUG: Initializing Helm processor
14:58:20.237 DEBUG: File without Kubernetes identifier: values-integration.yaml
14:58:20.238 DEBUG: File without Kubernetes identifier: values-staging.yaml
14:58:20.238 DEBUG: File without Kubernetes identifier: docker-compose.yml
14:58:20.239 DEBUG: File without Kubernetes identifier: values-production.yaml
14:58:20.251 INFO: 0 source files to be parsed
14:58:20.251 INFO: 0/0 source files have been parsed
14:58:20.252 INFO: 0 source files to be analyzed
14:58:20.252 INFO: 0/0 source files have been analyzed
14:58:20.252 INFO: 0 source files to be checked
14:58:20.252 INFO: 0/0 source files have been checked
14:58:20.252 INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=109ms
14:58:20.253 INFO: Sensor IaC AzureResourceManager Sensor [iac]
14:58:20.253 INFO: Sensor IaC AzureResourceManager Sensor is restricted to changed files only
14:58:20.253 DEBUG: File without identifier 'https://schema.management.azure.com/schemas/': new-svc-template.json
14:58:20.357 INFO: 0 source files to be analyzed
14:58:20.358 INFO: 0/0 source files have been analyzed
14:58:20.358 INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=105ms
14:58:20.359 INFO: Sensor Java Config Sensor [iac]
14:58:20.361 DEBUG: 'src/main/resources/application-integration.properties' generated metadata with charset 'UTF-8'
14:58:20.361 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-integration.properties
14:58:20.362 DEBUG: 'src/main/resources/application-development.properties' generated metadata with charset 'UTF-8'
14:58:20.362 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-development.properties
14:58:20.362 DEBUG: 'src/main/resources/application-staging.properties' generated metadata with charset 'UTF-8'
14:58:20.362 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-staging.properties
14:58:20.363 DEBUG: 'src/main/resources/application.properties' generated metadata with charset 'UTF-8'
14:58:20.363 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application.properties
14:58:20.363 DEBUG: 'src/main/resources/application-production.properties' generated metadata with charset 'UTF-8'
14:58:20.363 DEBUG: File without identifier 'AWSTemplateFormatVersion': src/main/resources/application-production.properties
14:58:20.371 INFO: 5 source files to be analyzed
14:58:20.371 INFO: 5/5 source files have been analyzed
14:58:20.371 INFO: Sensor Java Config Sensor [iac] (done) | time=12ms
14:58:20.372 INFO: Sensor JavaScript inside YAML analysis [javascript]
14:58:20.381 INFO: No input files found for analysis
14:58:20.382 INFO: Hit the cache for 0 out of 0
14:58:20.383 INFO: Miss the cache for 0 out of 0
14:58:20.383 INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=11ms
14:58:20.384 INFO: Sensor CSS Rules [javascript]
14:58:20.384 INFO: Sensor CSS Rules is restricted to changed files only
14:58:20.385 INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
14:58:20.385 INFO: Sensor CSS Rules [javascript] (done) | time=1ms
14:58:20.385 INFO: Sensor ThymeLeaf template sensor [securityjavafrontend]
14:58:20.386 INFO: Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=1ms
14:58:20.386 INFO: Sensor SurefireSensor [java]
14:58:20.387 INFO: parsing [/builds/buenbit/svc-shadow/target/surefire-reports]
14:58:20.388 INFO: Sensor SurefireSensor [java] (done) | time=2ms
14:58:20.388 INFO: Sensor XML Sensor [xml]
14:58:20.388 INFO: Sensor XML Sensor is restricted to changed files only
14:58:20.390 DEBUG: 'pom.xml' generated metadata with charset 'UTF-8'
14:58:20.391 INFO: Sensor XML Sensor [xml] (done) | time=3ms
14:58:20.391 INFO: Sensor IaC Docker Sensor [iac]
14:58:20.391 INFO: Sensor IaC Docker Sensor is restricted to changed files only
14:58:20.393 DEBUG: 'Dockerfile' generated metadata with charset 'UTF-8'
14:58:20.462 INFO: 0 source files to be analyzed
14:58:20.463 INFO: 0/0 source files have been analyzed
14:58:20.463 INFO: Sensor IaC Docker Sensor [iac] (done) | time=72ms
14:58:20.463 INFO: Sensor Serverless configuration file sensor [security]
14:58:20.464 INFO: 0 Serverless function entries were found in the project
14:58:20.467 INFO: 0 Serverless function handlers were kept as entrypoints
14:58:20.467 INFO: Sensor Serverless configuration file sensor [security] (done) | time=4ms
14:58:20.468 INFO: Sensor AWS SAM template file sensor [security]
14:58:20.472 DEBUG: 0 SAM template configuration files were found in the project. 0 SAM function entries were found in total. 0 were kept as potential entrypoints.
14:58:20.472 INFO: Sensor AWS SAM template file sensor [security] (done) | time=4ms
14:58:20.473 INFO: Sensor AWS SAM Inline template file sensor [security]
14:58:20.480 DEBUG: 0 SAM Inline template configuration files were found in the project. 0 SAM Inline function entries were found in total. 0 were kept as potential entrypoints.
14:58:20.480 INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=7ms
14:58:20.480 INFO: Sensor javabugs [dbd]
14:58:20.517 INFO: Reading IR files from: /builds/buenbit/svc-shadow/.scannerwork/ir/java
14:58:20.524 INFO: Analyzing 33 functions to detect bugs.
14:58:20.791 INFO: Sensor javabugs [dbd] (done) | time=311ms
14:58:20.792 INFO: Sensor pythonbugs [dbd]
14:58:20.792 DEBUG: Could not load type definitions from /builds/buenbit/svc-shadow/.scannerwork/ir/python/collected.typedefs: /builds/buenbit/svc-shadow/.scannerwork/ir/python/collected.typedefs (No such file or directory)
14:58:20.792 INFO: Reading IR files from: /builds/buenbit/svc-shadow/.scannerwork/ir/python
14:58:20.792 INFO: No IR files have been included for analysis.
14:58:20.792 INFO: Sensor pythonbugs [dbd] (done) | time=0ms
14:58:20.793 INFO: Sensor TextAndSecretsSensor [text]
14:58:20.794 INFO: Sensor TextAndSecretsSensor is restricted to changed files only
14:58:20.798 INFO: Available processors: 2
14:58:20.799 INFO: Using 2 threads for analysis.
14:58:21.456 INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true:
* The filename starts with "test"
* The filename contains "test." or "tests."
* Any directory in the file path is named: "doc", "docs", "test" or "tests"
* Any directory in the file path has a name ending in "test" or "tests"
14:58:21.496 DEBUG: git --version returned: git version 2.43.4
14:58:21.497 INFO: Using git CLI to retrieve untracked files
14:58:21.501 DEBUG: Process [git, status, --untracked-files=all, --porcelain] exited with code 128
14:58:21.501 DEBUG: Unable to retrieve git status
14:58:21.502 WARN: Analyzing only language associated files, make sure to run the analysis inside a git repository to make use of inclusions specified via "sonar.text.inclusions"
14:58:21.502 DEBUG: There are no files to be analyzed
14:58:21.502 INFO: Sensor TextAndSecretsSensor [text] (done) | time=709ms
14:58:21.503 INFO: Sensor JavaSecuritySensor [security]
14:58:21.507 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
14:58:21.508 INFO: Load type hierarchy and UCFGs: Starting
14:58:21.508 INFO: Load type hierarchy: Starting
14:58:21.509 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/java
14:58:21.543 INFO: Read 6 type definitions
14:58:21.548 INFO: Load type hierarchy: Time spent was 00:00:00.039
14:58:21.548 INFO: Load UCFGs: Starting
14:58:21.549 INFO: Reading UCFGs from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/java
14:58:21.624 INFO: Load UCFGs: Time spent was 00:00:00.075
14:58:21.624 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.115
14:58:21.624 INFO: Analyzing 26 UCFGs to detect vulnerabilities.
14:58:21.624 INFO: Check cache: Starting
14:58:21.625 INFO: Load cache: Starting
14:58:21.627 INFO: Load cache: Time spent was 00:00:00.000
14:58:21.628 INFO: Check cache: Time spent was 00:00:00.003
14:58:21.628 INFO: Create runtime call graph: Starting
14:58:21.629 INFO: Variable Type Analysis #1: Starting
14:58:21.630 INFO: Create runtime type propagation graph: Starting
14:58:21.634 INFO: Create runtime type propagation graph: Time spent was 00:00:00.004
14:58:21.635 INFO: Run SCC (Tarjan) on 47 nodes: Starting
14:58:21.637 INFO: Run SCC (Tarjan) on 47 nodes: Time spent was 00:00:00.001
14:58:21.638 INFO: Tarjan found 47 strongly connected components
14:58:21.638 INFO: Propagate runtime types to strongly connected components: Starting
14:58:21.639 INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.001
14:58:21.639 INFO: Variable Type Analysis #1: Time spent was 00:00:00.010
14:58:21.640 INFO: Variable Type Analysis #2: Starting
14:58:21.640 INFO: Create runtime type propagation graph: Starting
14:58:21.642 INFO: Create runtime type propagation graph: Time spent was 00:00:00.001
14:58:21.642 INFO: Run SCC (Tarjan) on 47 nodes: Starting
14:58:21.642 INFO: Run SCC (Tarjan) on 47 nodes: Time spent was 00:00:00.000
14:58:21.642 INFO: Tarjan found 47 strongly connected components
14:58:21.643 INFO: Propagate runtime types to strongly connected components: Starting
14:58:21.643 INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.000
14:58:21.645 INFO: Variable Type Analysis #2: Time spent was 00:00:00.003
14:58:21.646 INFO: Create runtime call graph: Time spent was 00:00:00.018
14:58:21.646 INFO: Load config: Starting
14:58:21.830 DEBUG: Loaded 1596 sources.
14:58:21.858 DEBUG: Loaded 192 sanitizers.
14:58:21.869 DEBUG: Loaded 40 validators.
14:58:22.552 DEBUG: Loaded 88766 passthroughs.
14:58:22.608 DEBUG: Loaded 0 collectionHandlers.
14:58:23.281 DEBUG: Loaded 61132 sinks.
14:58:23.315 DEBUG: Loaded 4 encoders.
14:58:23.317 DEBUG: Loaded 3 decoders.
14:58:23.335 INFO: Load config: Time spent was 00:00:01.688
14:58:23.335 INFO: Compute entry points: Starting
14:58:24.333 INFO: Compute entry points: Time spent was 00:00:00.996
14:58:24.333 INFO: No entry points found.
14:58:24.344 INFO: java security sensor: Time spent was 00:00:02.838
14:58:24.346 INFO: java security sensor: Begin: 2024-09-20T14:58:21.506291161Z, End: 2024-09-20T14:58:24.344363885Z, Duration: 00:00:02.838
Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:21.508482652Z, End: 2024-09-20T14:58:21.624409153Z, Duration: 00:00:00.115
Load type hierarchy: Begin: 2024-09-20T14:58:21.508772722Z, End: 2024-09-20T14:58:21.548217336Z, Duration: 00:00:00.039
Load UCFGs: Begin: 2024-09-20T14:58:21.548729496Z, End: 2024-09-20T14:58:21.623870413Z, Duration: 00:00:00.075
Check cache: Begin: 2024-09-20T14:58:21.624983213Z, End: 2024-09-20T14:58:21.628059614Z, Duration: 00:00:00.003
Load cache: Begin: 2024-09-20T14:58:21.625187933Z, End: 2024-09-20T14:58:21.625494383Z, Duration: 00:00:00.000
Create runtime call graph: Begin: 2024-09-20T14:58:21.628303364Z, End: 2024-09-20T14:58:21.646304621Z, Duration: 00:00:00.018
Variable Type Analysis #1: Begin: 2024-09-20T14:58:21.629287035Z, End: 2024-09-20T14:58:21.639671658Z, Duration: 00:00:00.010
Create runtime type propagation graph: Begin: 2024-09-20T14:58:21.630522195Z, End: 2024-09-20T14:58:21.634537016Z, Duration: 00:00:00.004
Run SCC (Tarjan) on 47 nodes: Begin: 2024-09-20T14:58:21.635445987Z, End: 2024-09-20T14:58:21.636745887Z, Duration: 00:00:00.001
Propagate runtime types to strongly connected components: Begin: 2024-09-20T14:58:21.638292358Z, End: 2024-09-20T14:58:21.639360328Z, Duration: 00:00:00.001
Variable Type Analysis #2: Begin: 2024-09-20T14:58:21.640231798Z, End: 2024-09-20T14:58:21.644089610Z, Duration: 00:00:00.003
Create runtime type propagation graph: Begin: 2024-09-20T14:58:21.640401738Z, End: 2024-09-20T14:58:21.641907529Z, Duration: 00:00:00.001
Run SCC (Tarjan) on 47 nodes: Begin: 2024-09-20T14:58:21.642301919Z, End: 2024-09-20T14:58:21.642665499Z, Duration: 00:00:00.000
Propagate runtime types to strongly connected components: Begin: 2024-09-20T14:58:21.643074569Z, End: 2024-09-20T14:58:21.643851980Z, Duration: 00:00:00.000
Load config: Begin: 2024-09-20T14:58:21.646549381Z, End: 2024-09-20T14:58:23.335343138Z, Duration: 00:00:01.688
Compute entry points: Begin: 2024-09-20T14:58:23.335974238Z, End: 2024-09-20T14:58:24.332935671Z, Duration: 00:00:00.996
14:58:24.346 INFO: java security sensor peak memory: 498 MB
14:58:24.347 DEBUG: Debug information:
14:58:24.347 INFO: Sensor JavaSecuritySensor [security] (done) | time=2844ms
14:58:24.347 INFO: Sensor CSharpSecuritySensor [security]
14:58:24.347 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
14:58:24.348 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.348 INFO: Load type hierarchy: Starting
14:58:24.348 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/ucfg2/cs
14:58:24.348 INFO: Read 0 type definitions
14:58:24.348 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.348 INFO: Load UCFGs: Starting
14:58:24.348 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.348 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.348 INFO: No UCFGs have been included for analysis.
14:58:24.349 INFO: csharp security sensor: Time spent was 00:00:00.001
14:58:24.349 INFO: csharp security sensor: Begin: 2024-09-20T14:58:24.347748336Z, End: 2024-09-20T14:58:24.349130617Z, Duration: 00:00:00.001
Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.348024436Z, End: 2024-09-20T14:58:24.348702066Z, Duration: 00:00:00.000
Load type hierarchy: Begin: 2024-09-20T14:58:24.348052236Z, End: 2024-09-20T14:58:24.348311406Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2024-09-20T14:58:24.348538786Z, End: 2024-09-20T14:58:24.348594726Z, Duration: 00:00:00.000
14:58:24.349 INFO: csharp security sensor peak memory: 498 MB
14:58:24.349 DEBUG: Debug information:
14:58:24.349 INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
14:58:24.349 INFO: Sensor PhpSecuritySensor [security]
14:58:24.350 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
14:58:24.350 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.350 INFO: Load type hierarchy: Starting
14:58:24.350 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/php
14:58:24.350 INFO: Read 0 type definitions
14:58:24.350 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.350 INFO: Load UCFGs: Starting
14:58:24.350 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.350 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.350 INFO: No UCFGs have been included for analysis.
14:58:24.351 INFO: php security sensor: Time spent was 00:00:00.000
14:58:24.351 INFO: php security sensor: Begin: 2024-09-20T14:58:24.350029777Z, End: 2024-09-20T14:58:24.351001478Z, Duration: 00:00:00.000
Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.350211207Z, End: 2024-09-20T14:58:24.350631527Z, Duration: 00:00:00.000
Load type hierarchy: Begin: 2024-09-20T14:58:24.350240657Z, End: 2024-09-20T14:58:24.350392037Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2024-09-20T14:58:24.350503657Z, End: 2024-09-20T14:58:24.350555487Z, Duration: 00:00:00.000
14:58:24.351 INFO: php security sensor peak memory: 498 MB
14:58:24.351 DEBUG: Debug information:
14:58:24.351 INFO: Sensor PhpSecuritySensor [security] (done) | time=2ms
14:58:24.351 INFO: Sensor PythonSecuritySensor [security]
14:58:24.351 INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
14:58:24.352 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.352 INFO: Load type hierarchy: Starting
14:58:24.352 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/python
14:58:24.352 INFO: Read 0 type definitions
14:58:24.352 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.352 INFO: Load UCFGs: Starting
14:58:24.352 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.352 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.352 INFO: No UCFGs have been included for analysis.
14:58:24.352 INFO: python security sensor: Time spent was 00:00:00.000
14:58:24.353 INFO: python security sensor: Begin: 2024-09-20T14:58:24.351811268Z, End: 2024-09-20T14:58:24.352773318Z, Duration: 00:00:00.000
Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.352005258Z, End: 2024-09-20T14:58:24.352402228Z, Duration: 00:00:00.000
Load type hierarchy: Begin: 2024-09-20T14:58:24.352031448Z, End: 2024-09-20T14:58:24.352158208Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2024-09-20T14:58:24.352273318Z, End: 2024-09-20T14:58:24.352304058Z, Duration: 00:00:00.000
14:58:24.353 INFO: python security sensor peak memory: 498 MB
14:58:24.353 DEBUG: Debug information:
14:58:24.353 INFO: Sensor PythonSecuritySensor [security] (done) | time=2ms
14:58:24.353 INFO: Sensor JsSecuritySensor [security]
14:58:24.353 INFO: Enabled taint analysis rules: S2631, S5146, S2083, S6350, S6287, S5147, S5334, S5144, S6105, S5696, S3649, S5131, S5883, S2076, S6096
14:58:24.353 INFO: Load type hierarchy and UCFGs: Starting
14:58:24.353 INFO: Load type hierarchy: Starting
14:58:24.353 INFO: Reading type hierarchy from: /builds/buenbit/svc-shadow/.scannerwork/ucfg2/js
14:58:24.353 INFO: Read 0 type definitions
14:58:24.354 INFO: Load type hierarchy: Time spent was 00:00:00.000
14:58:24.354 INFO: Load UCFGs: Starting
14:58:24.354 INFO: Load UCFGs: Time spent was 00:00:00.000
14:58:24.354 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
14:58:24.354 INFO: No UCFGs have been included for analysis.
14:58:24.354 INFO: js security sensor: Time spent was 00:00:00.000
14:58:24.354 INFO: js security sensor: Begin: 2024-09-20T14:58:24.353524328Z, End: 2024-09-20T14:58:24.354510948Z, Duration: 00:00:00.000
Load type hierarchy and UCFGs: Begin: 2024-09-20T14:58:24.353798748Z, End: 2024-09-20T14:58:24.354163399Z, Duration: 00:00:00.000
Load type hierarchy: Begin: 2024-09-20T14:58:24.353820588Z, End: 2024-09-20T14:58:24.353943779Z, Duration: 00:00:00.000
Load UCFGs: Begin: 2024-09-20T14:58:24.354060979Z, End: 2024-09-20T14:58:24.354095168Z, Duration: 00:00:00.000
14:58:24.354 INFO: js security sensor peak memory: 498 MB
14:58:24.355 DEBUG: Debug information:
14:58:24.355 INFO: Sensor JsSecuritySensor [security] (done) | time=2ms
14:58:24.359 INFO: ------------- Run sensors on project
14:58:24.512 DEBUG: 'Import external issues report from SARIF file.' skipped because one of the required properties is missing
14:58:24.513 DEBUG: Sensors : Zero Coverage Sensor -> Java CPD Block Indexer
14:58:24.513 INFO: Sensor Zero Coverage Sensor
14:58:24.520 INFO: Sensor Zero Coverage Sensor (done) | time=7ms
14:58:24.521 INFO: Sensor Java CPD Block Indexer
14:58:24.527 DEBUG: Populating index from src/main/java/com/buenbit/api/Application.java
14:58:24.532 DEBUG: Not enough content in 'src/main/java/com/buenbit/api/Application.java' to have CPD blocks, it will not be part of the duplication detection
14:58:24.532 DEBUG: Populating index from src/main/java/com/buenbit/api/rep.java
14:58:24.542 DEBUG: Populating index from src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java
14:58:24.543 DEBUG: Not enough content in 'src/test/java/com/example/springbootdocker/SpringBootDockerApplicationTests.java' to have CPD blocks, it will not be part of the duplication detection
14:58:24.543 DEBUG: Populating index from src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java
14:58:24.544 DEBUG: Not enough content in 'src/test/java/com/buenbit/api/SpringBootDockerApplicationTests.java' to have CPD blocks, it will not be part of the duplication detection
14:58:24.544 INFO: Sensor Java CPD Block Indexer (done) | time=23ms
14:58:24.550 INFO: CPD Executor 3 files had no CPD blocks
14:58:24.550 INFO: CPD Executor Calculating CPD for 1 file
14:58:24.550 DEBUG: Detection of duplications for /builds/buenbit/svc-shadow/src/main/java/com/buenbit/api/rep.java
14:58:24.556 INFO: CPD Executor CPD calculation finished (done) | time=6ms
14:58:24.681 INFO: SCM writing changed lines
14:58:24.685 WARN: Could not find ref: main in refs/heads, refs/remotes/upstream or refs/remotes/origin
14:58:24.685 DEBUG: All found refs are:
14:58:24.686 DEBUG: Ref[HEAD=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:24.686 DEBUG: Ref[refs/pipelines/1462370584=f63b8f8576f0efb917bafaffde10bad62a846d4a(-1)]
14:58:24.686 DEBUG: SCM reported changed lines for 0 files in the branch
14:58:24.686 INFO: SCM writing changed lines (done) | time=5ms
14:58:24.692 DEBUG: Could not detect the dotnet / msbuild version
14:58:24.692 DEBUG: MSBuild version NOT found.
14:58:24.775 INFO: Analysis report generated in 218ms, dir size=266 KB
14:58:24.799 INFO: Analysis report compressed in 23ms, zip size=55 KB
14:58:24.799 INFO: Analysis report generated in /builds/buenbit/svc-shadow/.scannerwork/scanner-report
14:58:24.799 DEBUG: Upload report
14:58:24.805 DEBUG: --> POST https://sonarcloud.io/api/ce/submit?organization=bbsckey01&projectKey=buenbit_svc-shadow&characteristic=pullRequest%3D89 (56697-byte body)
14:58:25.468 DEBUG: <-- 200 https://sonarcloud.io/api/ce/submit?organization=bbsckey01&projectKey=buenbit_svc-shadow&characteristic=pullRequest%3D89 (662ms, 44-byte body)
14:58:25.470 INFO: Analysis report uploaded in 671ms
14:58:25.472 DEBUG: Report metadata written to /builds/buenbit/svc-shadow/.scannerwork/report-task.txt
14:58:25.472 INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=buenbit_svc-shadow&pullRequest=89
14:58:25.472 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
14:58:25.473 INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZIP8P-nfOS6l-AoYpyg
14:58:25.476 DEBUG: Post-jobs :
14:58:25.480 INFO: Analysis total time: 27.911 s
14:58:25.483 INFO: ------------------------------------------------------------------------
14:58:25.483 INFO: EXECUTION SUCCESS
14:58:25.484 INFO: ------------------------------------------------------------------------
14:58:25.484 INFO: Total time: 32.630s
14:58:25.590 INFO: Final Memory: 37M/130M
14:58:25.591 INFO: ------------------------------------------------------------------------
14:58:25.596 DEBUG: Cleanup org.eclipse.jgit.util.FS$FileStoreAttributes$$Lambda$290/0x00007fc31f2fea70@7f8633ae during JVM shutdown
Saving cache for successful job
00:01
Creating cache sonarcloud-check-non_protected...
.sonar/cache: found 137 matching artifact files and directories
Archive is up to date!
Created cache
Cleaning up project directory and file based variables
00:00
Job succeeded