- ALM used - GitHub
- CI system used - GitHub
- Languages of the repository - TypeScript, JavaScript, HTML, CSS
- Error observed - SonarCloud never “sees” or refreshes the latest version of the code on the main develop branch, but does so on particular PR branches.
Hi @vladimirp5 , welcome to the community!
It seems there is some automatic branch configuration mismatch that fails the report submission after the scan. It is a known issue, but the cause remains unclear. Any new report is useful to give maybe the missing piece of information that will help us figure out what is happening.
On this purpose, could you please post here the following information:
- What is your repository default branch
- on Github
- and on SonarCloud?
-
Your GitHub workflow, expurged from the private details?
-
The complete logs of the SonarScanner execution from GitHub actions, expurged from the private details?
Hello,
-
The repository base was initially set as “master” but the branch itself was renamed to “main” and since about 2 weeks ago we changed it in sonar from “master” to “develop” in the hopes something will change.
-
Here’s the .yml with the relevant step
# SonarCloud analysis
- name: SonarCloud analysis
uses: sonarsource/sonarcloud-github-action@master
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- The logs only consist of generic uninteresting INFO lines, nothing outstanding there
Run sonarsource/sonarcloud-github-action@master
/usr/bin/docker run --name xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx --label 315fd0 --workdir /github/workspace --rm -e "GITHUB_USER" -e "ASKIA_GITHUB_TOKEN" -e "pnpm_cache_dir" -e "SONAR_TOKEN" -e "GITHUB_TOKEN" -e "INPUT_ARGS" -e "INPUT_PROJECTBASEDIR" -e "HOME" -e "GITHUB_JOB" -e "GITHUB_REF" -e "GITHUB_SHA" -e "GITHUB_REPOSITORY" -e "GITHUB_REPOSITORY_OWNER" -e "GITHUB_REPOSITORY_OWNER_ID" -e "GITHUB_RUN_ID" -e "GITHUB_RUN_NUMBER" -e "GITHUB_RETENTION_DAYS" -e "GITHUB_RUN_ATTEMPT" -e "GITHUB_REPOSITORY_ID" -e "GITHUB_ACTOR_ID" -e "GITHUB_ACTOR" -e "GITHUB_TRIGGERING_ACTOR" -e "GITHUB_WORKFLOW" -e "GITHUB_HEAD_REF" -e "GITHUB_BASE_REF" -e "GITHUB_EVENT_NAME" -e "GITHUB_SERVER_URL" -e "GITHUB_API_URL" -e "GITHUB_GRAPHQL_URL" -e "GITHUB_REF_NAME" -e "GITHUB_REF_PROTECTED" -e "GITHUB_REF_TYPE" -e "GITHUB_WORKFLOW_REF" -e "GITHUB_WORKFLOW_SHA" -e "GITHUB_WORKSPACE" -e "GITHUB_ACTION" -e "GITHUB_EVENT_PATH" -e "GITHUB_ACTION_REPOSITORY" -e "GITHUB_ACTION_REF" -e "GITHUB_PATH" -e "GITHUB_ENV" -e "GITHUB_STEP_SUMMARY" -e "GITHUB_STATE" -e "GITHUB_OUTPUT" -e "RUNNER_OS" -e "RUNNER_ARCH" -e "RUNNER_NAME" -e "RUNNER_ENVIRONMENT" -e "RUNNER_TOOL_CACHE" -e "RUNNER_TEMP" -e "RUNNER_WORKSPACE" -e "ACTIONS_RUNTIME_URL" -e "ACTIONS_RUNTIME_TOKEN" -e "ACTIONS_CACHE_URL" -e "ACTIONS_RESULTS_URL" -e GITHUB_ACTIONS=true -e CI=true --entrypoint "/entrypoint.sh" -v "/var/run/docker.sock":"/var/run/docker.sock" -v "/home/runner/work/_temp/_github_home":"/github/home" -v "/home/runner/work/_temp/_github_workflow":"/github/workflow" -v "/home/runner/work/_temp/_runner_file_commands":"/github/file_commands" -v "/home/runner/work/interviewer-webfront/interviewer-webfront":"/github/workspace" 315fd0:c457a9095ad24505a48d1fc20d430076
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /github/workspace/sonar-project.properties
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.8 Alpine (64-bit)
INFO: Linux 6.5.0-1017-azure amd64
INFO: User cache: /opt/sonar-scanner/.sonar/cache
INFO: Analyzing on SonarCloud
INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
INFO: Load global settings
INFO: Load global settings (done) | time=336ms
INFO: Server id: xxxxxxxxxxxxxx
INFO: User cache: /opt/sonar-scanner/.sonar/cache
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=336ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=767ms
INFO: Found an active CI vendor: 'Github Actions'
INFO: Load project settings for component key: 'interviewer-webfront'
INFO: Load project settings for component key: 'interviewer-webfront' (done) | time=317ms
INFO: Process project properties
INFO: Project key: interviewer-webfront
INFO: Base dir: /github/workspace
INFO: Working dir: /github/workspace/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=334ms
INFO: Check ALM binding of project 'interviewer-webfront'
INFO: Detected project binding: NOT_BOUND
INFO: Check ALM binding of project 'interviewer-webfront' (done) | time=297ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=387ms
INFO: Load branch configuration
INFO: Github event: push
INFO: Auto-configuring branch develop
INFO: Load branch configuration (done) | time=10ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=357ms
INFO: Load active rules
INFO: Load active rules (done) | time=10461ms
INFO: Organization key: askia
INFO: Branch name: develop, type: long-lived
INFO: Preprocessing files...
INFO: 7 languages detected in 501 preprocessed files
INFO: 20422 files ignored because of inclusion/exclusion patterns
INFO: 791 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=961ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=362ms
INFO: Indexing files...
INFO: Project configuration:
INFO: Excluded sources: **/build-wrapper-dump.json, **/node_modules/**, **/dist/**, **/.svelte-kit/**, **/reports/**, **/__tests__/**, **/i18n/**, **/__stories__/**, packages/icons/**, packages/styling/**, **/__testing-utils__/**, **/e2e/**, **/stubs/**, **/*.spec.ts
INFO: Included tests: **/*.spec.ts
INFO: 500 files indexed
INFO: Quality profile for css: Sonar way
INFO: Quality profile for docker: Sonar way
INFO: Quality profile for js: Sonar way
INFO: Quality profile for json: Sonar way
INFO: Quality profile for ts: Sonar way
INFO: Quality profile for web: Sonar way
INFO: Quality profile for yaml: Sonar way
INFO: ------------- Run sensors on module interviewer-webfront
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=525ms
INFO: Sensor cache enabled
INFO: Load sensor cache
INFO: Load sensor cache (896 KB) | time=1387ms
INFO: Sensor HTML [web]
INFO: Sensor HTML [web] (done) | time=106ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=2ms
INFO: Sensor IaC CloudFormation Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=123ms
INFO: Sensor IaC Kubernetes Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=65ms
INFO: Sensor IaC AzureResourceManager Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=120ms
INFO: Sensor JavaScript/TypeScript analysis [javascript]
INFO: Detected os: Linux arch: amd64 alpine: true. Platform: UNSUPPORTED
INFO: Using Node.js executable: 'node'.
INFO: Memory configuration: OS (7929 MB), Node.js (2096 MB).
INFO: Found 3 tsconfig.json file(s): [/github/workspace/tsconfig.json, /github/workspace/cypress/tsconfig.json, /github/workspace/.svelte-kit/tsconfig.json]
INFO: Creating TypeScript program
INFO: TypeScript configuration file /github/workspace/tsconfig.json
INFO: 277 source files to be analyzed
INFO: Creating TypeScript program (done) | time=4215ms
INFO: Starting analysis with current program
INFO: 56/277 files analyzed, current file: /github/workspace/src/lib/services/helpers/index.ts
INFO: 207/277 files analyzed, current file: /github/workspace/src/lib/services/structure/__tests__/utils.spec.ts
INFO: Analyzed 265 file(s) with current program
INFO: Creating TypeScript program
INFO: TypeScript configuration file /github/workspace/cypress/tsconfig.json
INFO: Creating TypeScript program (done) | time=894ms
INFO: Starting analysis with current program
INFO: Analyzed 0 file(s) with current program
INFO: Creating TypeScript program
INFO: TypeScript configuration file /github/workspace/.svelte-kit/tsconfig.json
INFO: Creating TypeScript program (done) | time=1359ms
INFO: Starting analysis with current program
INFO: Analyzed 0 file(s) with current program
INFO: Found 12 file(s) not part of any tsconfig.json: they will be analyzed without type information
INFO: 277/277 source files have been analyzed
INFO: Hit the cache for 0 out of 277
INFO: Miss the cache for 277 out of 277: ANALYSIS_MODE_INELIGIBLE [277/277]
INFO: Sensor JavaScript/TypeScript analysis [javascript] (done) | time=38626ms
INFO: Sensor JavaScript inside YAML analysis [javascript]
INFO: No input files found for analysis
INFO: Hit the cache for 0 out of 0
INFO: Miss the cache for 0 out of 0
INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=112ms
INFO: Sensor JavaScript inside HTML analysis [javascript]
INFO: 2 source files to be analyzed
INFO: 2/2 source files have been analyzed
INFO: Hit the cache for 0 out of 2
INFO: Miss the cache for 2 out of 2: ANALYSIS_MODE_INELIGIBLE [2/2]
INFO: Sensor JavaScript inside HTML analysis [javascript] (done) | time=1169ms
INFO: Sensor CSS Rules [javascript]
INFO: 14 source files to be analyzed
INFO: 14/14 source files have been analyzed
INFO: Hit the cache for 0 out of 0
INFO: Miss the cache for 0 out of 0
INFO: Sensor CSS Rules [javascript] (done) | time=562ms
INFO: Sensor JavaScript/TypeScript Coverage [javascript]
INFO: Merging coverage reports from sonar.javascript.lcov.reportPaths and sonar.typescript.lcov.reportPaths.
INFO: Analysing [/github/workspace/coverage/lcov.info]
INFO: Sensor JavaScript/TypeScript Coverage [javascript] (done) | time=121ms
INFO: Sensor CSS Metrics [javascript]
INFO: Sensor CSS Metrics [javascript] (done) | time=79ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: 1 source file to be analyzed
INFO: 1/1 source file has been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=166ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=9ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=18ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=17ms
INFO: Sensor TextAndSecretsSensor [text]
INFO: Available processors: 2
INFO: Using 2 threads for analysis.
INFO: 382 source files to be analyzed
INFO: 382/382 source files have been analyzed
INFO: Sensor TextAndSecretsSensor [text] (done) | time=4882ms
INFO: Sensor JavaSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/java
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.002
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.003
INFO: No UCFGs have been included for analysis.
INFO: java security sensor: Time spent was 00:00:00.006
INFO: Sensor JavaSecuritySensor [security] (done) | time=14ms
INFO: Sensor CSharpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/ucfg2/cs
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: csharp security sensor: Time spent was 00:00:00.001
INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
INFO: Sensor PhpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/php
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.001
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.002
INFO: No UCFGs have been included for analysis.
INFO: php security sensor: Time spent was 00:00:00.004
INFO: Sensor PhpSecuritySensor [security] (done) | time=5ms
INFO: Sensor PythonSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/python
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: python security sensor: Time spent was 00:00:00.001
INFO: Sensor PythonSecuritySensor [security] (done) | time=3ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S5144, S6350, S2076, S2631, S5147, S5334, S6287, S6105, S5131, S5146, S6096, S5696, S3649, S2083, S5883
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.005
INFO: Load UCFGs: Starting
INFO: Reading UCFGs from: /github/workspace/.scannerwork/ucfg2/js
INFO: Load UCFGs: Time spent was 00:00:00.746
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.752
INFO: Analyzing 801 UCFGs to detect vulnerabilities.
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.000
INFO: Check cache: Time spent was 00:00:00.000
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.105
INFO: Run SCC (Tarjan) on 7165 nodes: Starting
INFO: Run SCC (Tarjan) on 7165 nodes: Time spent was 00:00:00.015
INFO: Tarjan found 7165 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.026
INFO: Variable Type Analysis #1: Time spent was 00:00:00.149
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.095
INFO: Run SCC (Tarjan) on 7165 nodes: Starting
INFO: Run SCC (Tarjan) on 7165 nodes: Time spent was 00:00:00.009
INFO: Tarjan found 7165 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.017
INFO: Variable Type Analysis #2: Time spent was 00:00:00.124
INFO: Create runtime call graph: Time spent was 00:00:00.278
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.077
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.419
INFO: All rules entry points : 164
INFO: Slice call graph: Starting
INFO: Slice call graph: Time spent was 00:00:00.000
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.349
INFO: Taint analysis for js: Starting
INFO: 0 / 801 UCFGs simulated, memory usage: 105 MB
INFO: 66 / 801 UCFGs simulated, memory usage: 176 MB
INFO: 188 / 801 UCFGs simulated, memory usage: 285 MB
INFO: Taint analysis for js: Time spent was 00:00:02.607
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.004
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.029
INFO: js security sensor: Time spent was 00:00:04.523
INFO: js security sensor: Begin: 2024-04-08T08:20:03.491820652Z, End: 2024-04-08T08:20:08.014894679Z, Duration: 00:00:04.523
Load type hierarchy and UCFGs: Begin: 2024-04-08T08:20:03.492103948Z, End: 2024-04-08T08:20:04.244448562Z, Duration: 00:00:00.752
Load type hierarchy: Begin: 2024-04-08T08:20:03.492149653Z, End: 2024-04-08T08:20:03.497379134Z, Duration: 00:00:00.005
Load UCFGs: Begin: 2024-04-08T08:20:03.498001990Z, End: 2024-04-08T08:20:04.244270090Z, Duration: 00:00:00.746
Check cache: Begin: 2024-04-08T08:20:04.244547235Z, End: 2024-04-08T08:20:04.244914677Z, Duration: 00:00:00.000
Load cache: Begin: 2024-04-08T08:20:04.244579425Z, End: 2024-04-08T08:20:04.244619759Z, Duration: 00:00:00.000
Create runtime call graph: Begin: 2024-04-08T08:20:04.245017177Z, End: 2024-04-08T08:20:04.523636820Z, Duration: 00:00:00.278
Variable Type Analysis #1: Begin: 2024-04-08T08:20:04.245681650Z, End: 2024-04-08T08:20:04.395334665Z, Duration: 00:00:00.149
Create runtime type propagation graph: Begin: 2024-04-08T08:20:04.246485482Z, End: 2024-04-08T08:20:04.352083023Z, Duration: 00:00:00.105
Run SCC (Tarjan) on 7165 nodes: Begin: 2024-04-08T08:20:04.352743979Z, End: 2024-04-08T08:20:04.368042793Z, Duration: 00:00:00.015
Propagate runtime types to strongly connected components: Begin: 2024-04-08T08:20:04.368626937Z, End: 2024-04-08T08:20:04.395064183Z, Duration: 00:00:00.026
Variable Type Analysis #2: Begin: 2024-04-08T08:20:04.397037732Z, End: 2024-04-08T08:20:04.521218191Z, Duration: 00:00:00.124
Create runtime type propagation graph: Begin: 2024-04-08T08:20:04.397641843Z, End: 2024-04-08T08:20:04.493518062Z, Duration: 00:00:00.095
Run SCC (Tarjan) on 7165 nodes: Begin: 2024-04-08T08:20:04.493970852Z, End: 2024-04-08T08:20:04.503645307Z, Duration: 00:00:00.009
Propagate runtime types to strongly connected components: Begin: 2024-04-08T08:20:04.503859455Z, End: 2024-04-08T08:20:04.521082159Z, Duration: 00:00:00.017
Load config: Begin: 2024-04-08T08:20:04.523767412Z, End: 2024-04-08T08:20:04.601603681Z, Duration: 00:00:00.077
Compute entry points: Begin: 2024-04-08T08:20:04.602383257Z, End: 2024-04-08T08:20:05.021911059Z, Duration: 00:00:00.419
Slice call graph: Begin: 2024-04-08T08:20:05.022599286Z, End: 2024-04-08T08:20:05.022817061Z, Duration: 00:00:00.000
Live variable analysis: Begin: 2024-04-08T08:20:05.023047839Z, End: 2024-04-08T08:20:05.372397074Z, Duration: 00:00:00.349
Taint analysis for js: Begin: 2024-04-08T08:20:05.373061457Z, End: 2024-04-08T08:20:07.980864852Z, Duration: 00:00:02.607
Report issues: Begin: 2024-04-08T08:20:07.980949129Z, End: 2024-04-08T08:20:07.984992688Z, Duration: 00:00:00.004
Store cache: Begin: 2024-04-08T08:20:07.985107421Z, End: 2024-04-08T08:20:08.014747576Z, Duration: 00:00:00.029
INFO: js security sensor peak memory: 297 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=4526ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=15ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 382 source files to be analyzed
INFO: SCM Publisher 382/382 source files have been analyzed (done) | time=4028ms
INFO: CPD Executor 43 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 122 files
INFO: CPD Executor CPD calculation finished (done) | time=133ms
INFO: Analysis report generated in 238ms, dir size=3 MB
INFO: Analysis report compressed in 762ms, zip size=1 MB
INFO: Analysis report uploaded in 1316ms
INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=interviewer-webfront&branch=develop
INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AY68yyfBzDJTtU7BwiwI
INFO: Sensor cache published successfully
INFO: Time spent writing ucfgs 550ms
INFO: Analysis total time: 1:18.780 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 1:23.181s
INFO: Final Memory: 90M/307M
INFO: ------------------------------------------------------------------------
Thanks
Hello
- At the current moment it’s develop on both sides. However the last analysis/scan that was performed was done so while sonar was configured on master branch - but we changed it recently to develop.
- Nothing too interesting here, we use it as per Sonar documentation
# SonarCloud analysis
- name: SonarCloud analysis
uses: sonarsource/sonarcloud-github-action@master
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- Nothing too interesting here either
Run sonarsource/sonarcloud-github-action@master
/usr/bin/docker run --name xxxxxxxxxxxxxxxxxxxx --label 315fd0 --workdir /github/workspace --rm -e "GITHUB_USER" -e "ASKIA_GITHUB_TOKEN" -e "pnpm_cache_dir" -e "SONAR_TOKEN" -e "GITHUB_TOKEN" -e "INPUT_ARGS" -e "INPUT_PROJECTBASEDIR" -e "HOME" -e "GITHUB_JOB" -e "GITHUB_REF" -e "GITHUB_SHA" -e "GITHUB_REPOSITORY" -e "GITHUB_REPOSITORY_OWNER" -e "GITHUB_REPOSITORY_OWNER_ID" -e "GITHUB_RUN_ID" -e "GITHUB_RUN_NUMBER" -e "GITHUB_RETENTION_DAYS" -e "GITHUB_RUN_ATTEMPT" -e "GITHUB_REPOSITORY_ID" -e "GITHUB_ACTOR_ID" -e "GITHUB_ACTOR" -e "GITHUB_TRIGGERING_ACTOR" -e "GITHUB_WORKFLOW" -e "GITHUB_HEAD_REF" -e "GITHUB_BASE_REF" -e "GITHUB_EVENT_NAME" -e "GITHUB_SERVER_URL" -e "GITHUB_API_URL" -e "GITHUB_GRAPHQL_URL" -e "GITHUB_REF_NAME" -e "GITHUB_REF_PROTECTED" -e "GITHUB_REF_TYPE" -e "GITHUB_WORKFLOW_REF" -e "GITHUB_WORKFLOW_SHA" -e "GITHUB_WORKSPACE" -e "GITHUB_ACTION" -e "GITHUB_EVENT_PATH" -e "GITHUB_ACTION_REPOSITORY" -e "GITHUB_ACTION_REF" -e "GITHUB_PATH" -e "GITHUB_ENV" -e "GITHUB_STEP_SUMMARY" -e "GITHUB_STATE" -e "GITHUB_OUTPUT" -e "RUNNER_OS" -e "RUNNER_ARCH" -e "RUNNER_NAME" -e "RUNNER_ENVIRONMENT" -e "RUNNER_TOOL_CACHE" -e "RUNNER_TEMP" -e "RUNNER_WORKSPACE" -e "ACTIONS_RUNTIME_URL" -e "ACTIONS_RUNTIME_TOKEN" -e "ACTIONS_CACHE_URL" -e "ACTIONS_RESULTS_URL" -e GITHUB_ACTIONS=true -e CI=true --entrypoint "/entrypoint.sh" -v "/var/run/docker.sock":"/var/run/docker.sock" -v "/home/runner/work/_temp/_github_home":"/github/home" -v "/home/runner/work/_temp/_github_workflow":"/github/workflow" -v "/home/runner/work/_temp/_runner_file_commands":"/github/file_commands" -v "/home/runner/work/my-project/my-project":"/github/workspace" 315fd0:c457a9095ad24505a48d1fc20d430076
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /github/workspace/sonar-project.properties
INFO: SonarScanner 5.0.1.3006
INFO: Java 17.0.8 Alpine (64-bit)
INFO: Linux 6.5.0-1017-azure amd64
INFO: User cache: /opt/sonar-scanner/.sonar/cache
INFO: Analyzing on SonarCloud
INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
INFO: Load global settings
INFO: Load global settings (done) | time=336ms
INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
INFO: User cache: /opt/sonar-scanner/.sonar/cache
INFO: Loading required plugins
INFO: Load plugins index
INFO: Load plugins index (done) | time=336ms
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=767ms
INFO: Found an active CI vendor: 'Github Actions'
INFO: Load project settings for component key: 'my-project'
INFO: Load project settings for component key: 'my-project' (done) | time=317ms
INFO: Process project properties
INFO: Project key: my-project
INFO: Base dir: /github/workspace
INFO: Working dir: /github/workspace/.scannerwork
INFO: Load project branches
INFO: Load project branches (done) | time=334ms
INFO: Check ALM binding of project 'my-project'
INFO: Detected project binding: NOT_BOUND
INFO: Check ALM binding of project 'my-project' (done) | time=297ms
INFO: Load project pull requests
INFO: Load project pull requests (done) | time=387ms
INFO: Load branch configuration
INFO: Github event: push
INFO: Auto-configuring branch develop
INFO: Load branch configuration (done) | time=10ms
INFO: Load quality profiles
INFO: Load quality profiles (done) | time=357ms
INFO: Load active rules
INFO: Load active rules (done) | time=10461ms
INFO: Organization key: askia
INFO: Branch name: develop, type: long-lived
INFO: Preprocessing files...
INFO: 7 languages detected in 501 preprocessed files
INFO: 20422 files ignored because of inclusion/exclusion patterns
INFO: 791 files ignored because of scm ignore settings
INFO: Loading plugins for detected languages
INFO: Load/download plugins
INFO: Load/download plugins (done) | time=961ms
INFO: Load project repositories
INFO: Load project repositories (done) | time=362ms
INFO: Indexing files...
INFO: Project configuration:
INFO: Excluded sources: **/build-wrapper-dump.json, **/node_modules/**, **/dist/**, **/.svelte-kit/**, **/reports/**, **/__tests__/**, **/i18n/**, **/__stories__/**, packages/icons/**, packages/styling/**, **/__testing-utils__/**, **/e2e/**, **/stubs/**, **/*.spec.ts
INFO: Included tests: **/*.spec.ts
INFO: 500 files indexed
INFO: Quality profile for css: Sonar way
INFO: Quality profile for docker: Sonar way
INFO: Quality profile for js: Sonar way
INFO: Quality profile for json: Sonar way
INFO: Quality profile for ts: Sonar way
INFO: Quality profile for web: Sonar way
INFO: Quality profile for yaml: Sonar way
INFO: ------------- Run sensors on module my-project
INFO: Load metrics repository
INFO: Load metrics repository (done) | time=525ms
INFO: Sensor cache enabled
INFO: Load sensor cache
INFO: Load sensor cache (896 KB) | time=1387ms
INFO: Sensor HTML [web]
INFO: Sensor HTML [web] (done) | time=106ms
INFO: Sensor JaCoCo XML Report Importer [jacoco]
INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=2ms
INFO: Sensor IaC CloudFormation Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=123ms
INFO: Sensor IaC Kubernetes Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=65ms
INFO: Sensor IaC AzureResourceManager Sensor [iac]
INFO: 0 source files to be analyzed
INFO: 0/0 source files have been analyzed
INFO: Sensor IaC AzureResourceManager Sensor [iac] (done) | time=120ms
INFO: Sensor JavaScript/TypeScript analysis [javascript]
INFO: Detected os: Linux arch: amd64 alpine: true. Platform: UNSUPPORTED
INFO: Using Node.js executable: 'node'.
INFO: Memory configuration: OS (7929 MB), Node.js (2096 MB).
INFO: Found 3 tsconfig.json file(s): [/github/workspace/tsconfig.json, /github/workspace/cypress/tsconfig.json, /github/workspace/.svelte-kit/tsconfig.json]
INFO: Creating TypeScript program
INFO: TypeScript configuration file /github/workspace/tsconfig.json
INFO: 277 source files to be analyzed
INFO: Creating TypeScript program (done) | time=4215ms
INFO: Starting analysis with current program
INFO: 56/277 files analyzed, current file: /github/workspace/src/lib/services/helpers/index.ts
INFO: 207/277 files analyzed, current file: /github/workspace/src/lib/services/structure/__tests__/utils.spec.ts
INFO: Analyzed 265 file(s) with current program
INFO: Creating TypeScript program
INFO: TypeScript configuration file /github/workspace/cypress/tsconfig.json
INFO: Creating TypeScript program (done) | time=894ms
INFO: Starting analysis with current program
INFO: Analyzed 0 file(s) with current program
INFO: Creating TypeScript program
INFO: TypeScript configuration file /github/workspace/.svelte-kit/tsconfig.json
INFO: Creating TypeScript program (done) | time=1359ms
INFO: Starting analysis with current program
INFO: Analyzed 0 file(s) with current program
INFO: Found 12 file(s) not part of any tsconfig.json: they will be analyzed without type information
INFO: 277/277 source files have been analyzed
INFO: Hit the cache for 0 out of 277
INFO: Miss the cache for 277 out of 277: ANALYSIS_MODE_INELIGIBLE [277/277]
INFO: Sensor JavaScript/TypeScript analysis [javascript] (done) | time=38626ms
INFO: Sensor JavaScript inside YAML analysis [javascript]
INFO: No input files found for analysis
INFO: Hit the cache for 0 out of 0
INFO: Miss the cache for 0 out of 0
INFO: Sensor JavaScript inside YAML analysis [javascript] (done) | time=112ms
INFO: Sensor JavaScript inside HTML analysis [javascript]
INFO: 2 source files to be analyzed
INFO: 2/2 source files have been analyzed
INFO: Hit the cache for 0 out of 2
INFO: Miss the cache for 2 out of 2: ANALYSIS_MODE_INELIGIBLE [2/2]
INFO: Sensor JavaScript inside HTML analysis [javascript] (done) | time=1169ms
INFO: Sensor CSS Rules [javascript]
INFO: 14 source files to be analyzed
INFO: 14/14 source files have been analyzed
INFO: Hit the cache for 0 out of 0
INFO: Miss the cache for 0 out of 0
INFO: Sensor CSS Rules [javascript] (done) | time=562ms
INFO: Sensor JavaScript/TypeScript Coverage [javascript]
INFO: Merging coverage reports from sonar.javascript.lcov.reportPaths and sonar.typescript.lcov.reportPaths.
INFO: Analysing [/github/workspace/coverage/lcov.info]
INFO: Sensor JavaScript/TypeScript Coverage [javascript] (done) | time=121ms
INFO: Sensor CSS Metrics [javascript]
INFO: Sensor CSS Metrics [javascript] (done) | time=79ms
INFO: Sensor IaC Docker Sensor [iac]
INFO: 1 source file to be analyzed
INFO: 1/1 source file has been analyzed
INFO: Sensor IaC Docker Sensor [iac] (done) | time=166ms
INFO: Sensor Serverless configuration file sensor [security]
INFO: 0 Serverless function entries were found in the project
INFO: 0 Serverless function handlers were kept as entrypoints
INFO: Sensor Serverless configuration file sensor [security] (done) | time=9ms
INFO: Sensor AWS SAM template file sensor [security]
INFO: Sensor AWS SAM template file sensor [security] (done) | time=18ms
INFO: Sensor AWS SAM Inline template file sensor [security]
INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=17ms
INFO: Sensor TextAndSecretsSensor [text]
INFO: Available processors: 2
INFO: Using 2 threads for analysis.
INFO: 382 source files to be analyzed
INFO: 382/382 source files have been analyzed
INFO: Sensor TextAndSecretsSensor [text] (done) | time=4882ms
INFO: Sensor JavaSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/java
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.002
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.003
INFO: No UCFGs have been included for analysis.
INFO: java security sensor: Time spent was 00:00:00.006
INFO: Sensor JavaSecuritySensor [security] (done) | time=14ms
INFO: Sensor CSharpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/ucfg2/cs
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: csharp security sensor: Time spent was 00:00:00.001
INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms
INFO: Sensor PhpSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/php
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.001
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.002
INFO: No UCFGs have been included for analysis.
INFO: php security sensor: Time spent was 00:00:00.004
INFO: Sensor PhpSecuritySensor [security] (done) | time=5ms
INFO: Sensor PythonSecuritySensor [security]
INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/python
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.000
INFO: Load UCFGs: Starting
INFO: Load UCFGs: Time spent was 00:00:00.000
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000
INFO: No UCFGs have been included for analysis.
INFO: python security sensor: Time spent was 00:00:00.001
INFO: Sensor PythonSecuritySensor [security] (done) | time=3ms
INFO: Sensor JsSecuritySensor [security]
INFO: Enabled taint analysis rules: S5144, S6350, S2076, S2631, S5147, S5334, S6287, S6105, S5131, S5146, S6096, S5696, S3649, S2083, S5883
INFO: Load type hierarchy and UCFGs: Starting
INFO: Load type hierarchy: Starting
INFO: Reading type hierarchy from: /github/workspace/.scannerwork/ucfg2/js
INFO: Read 0 type definitions
INFO: Load type hierarchy: Time spent was 00:00:00.005
INFO: Load UCFGs: Starting
INFO: Reading UCFGs from: /github/workspace/.scannerwork/ucfg2/js
INFO: Load UCFGs: Time spent was 00:00:00.746
INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.752
INFO: Analyzing 801 UCFGs to detect vulnerabilities.
INFO: Check cache: Starting
INFO: Load cache: Starting
INFO: Load cache: Time spent was 00:00:00.000
INFO: Check cache: Time spent was 00:00:00.000
INFO: Create runtime call graph: Starting
INFO: Variable Type Analysis #1: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.105
INFO: Run SCC (Tarjan) on 7165 nodes: Starting
INFO: Run SCC (Tarjan) on 7165 nodes: Time spent was 00:00:00.015
INFO: Tarjan found 7165 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.026
INFO: Variable Type Analysis #1: Time spent was 00:00:00.149
INFO: Variable Type Analysis #2: Starting
INFO: Create runtime type propagation graph: Starting
INFO: Create runtime type propagation graph: Time spent was 00:00:00.095
INFO: Run SCC (Tarjan) on 7165 nodes: Starting
INFO: Run SCC (Tarjan) on 7165 nodes: Time spent was 00:00:00.009
INFO: Tarjan found 7165 strongly connected components
INFO: Propagate runtime types to strongly connected components: Starting
INFO: Propagate runtime types to strongly connected components: Time spent was 00:00:00.017
INFO: Variable Type Analysis #2: Time spent was 00:00:00.124
INFO: Create runtime call graph: Time spent was 00:00:00.278
INFO: Load config: Starting
INFO: Load config: Time spent was 00:00:00.077
INFO: Compute entry points: Starting
INFO: Compute entry points: Time spent was 00:00:00.419
INFO: All rules entry points : 164
INFO: Slice call graph: Starting
INFO: Slice call graph: Time spent was 00:00:00.000
INFO: Live variable analysis: Starting
INFO: Live variable analysis: Time spent was 00:00:00.349
INFO: Taint analysis for js: Starting
INFO: 0 / 801 UCFGs simulated, memory usage: 105 MB
INFO: 66 / 801 UCFGs simulated, memory usage: 176 MB
INFO: 188 / 801 UCFGs simulated, memory usage: 285 MB
INFO: Taint analysis for js: Time spent was 00:00:02.607
INFO: Report issues: Starting
INFO: Report issues: Time spent was 00:00:00.004
INFO: Store cache: Starting
INFO: Store cache: Time spent was 00:00:00.029
INFO: js security sensor: Time spent was 00:00:04.523
INFO: js security sensor: Begin: 2024-04-08T08:20:03.491820652Z, End: 2024-04-08T08:20:08.014894679Z, Duration: 00:00:04.523
Load type hierarchy and UCFGs: Begin: 2024-04-08T08:20:03.492103948Z, End: 2024-04-08T08:20:04.244448562Z, Duration: 00:00:00.752
Load type hierarchy: Begin: 2024-04-08T08:20:03.492149653Z, End: 2024-04-08T08:20:03.497379134Z, Duration: 00:00:00.005
Load UCFGs: Begin: 2024-04-08T08:20:03.498001990Z, End: 2024-04-08T08:20:04.244270090Z, Duration: 00:00:00.746
Check cache: Begin: 2024-04-08T08:20:04.244547235Z, End: 2024-04-08T08:20:04.244914677Z, Duration: 00:00:00.000
Load cache: Begin: 2024-04-08T08:20:04.244579425Z, End: 2024-04-08T08:20:04.244619759Z, Duration: 00:00:00.000
Create runtime call graph: Begin: 2024-04-08T08:20:04.245017177Z, End: 2024-04-08T08:20:04.523636820Z, Duration: 00:00:00.278
Variable Type Analysis #1: Begin: 2024-04-08T08:20:04.245681650Z, End: 2024-04-08T08:20:04.395334665Z, Duration: 00:00:00.149
Create runtime type propagation graph: Begin: 2024-04-08T08:20:04.246485482Z, End: 2024-04-08T08:20:04.352083023Z, Duration: 00:00:00.105
Run SCC (Tarjan) on 7165 nodes: Begin: 2024-04-08T08:20:04.352743979Z, End: 2024-04-08T08:20:04.368042793Z, Duration: 00:00:00.015
Propagate runtime types to strongly connected components: Begin: 2024-04-08T08:20:04.368626937Z, End: 2024-04-08T08:20:04.395064183Z, Duration: 00:00:00.026
Variable Type Analysis #2: Begin: 2024-04-08T08:20:04.397037732Z, End: 2024-04-08T08:20:04.521218191Z, Duration: 00:00:00.124
Create runtime type propagation graph: Begin: 2024-04-08T08:20:04.397641843Z, End: 2024-04-08T08:20:04.493518062Z, Duration: 00:00:00.095
Run SCC (Tarjan) on 7165 nodes: Begin: 2024-04-08T08:20:04.493970852Z, End: 2024-04-08T08:20:04.503645307Z, Duration: 00:00:00.009
Propagate runtime types to strongly connected components: Begin: 2024-04-08T08:20:04.503859455Z, End: 2024-04-08T08:20:04.521082159Z, Duration: 00:00:00.017
Load config: Begin: 2024-04-08T08:20:04.523767412Z, End: 2024-04-08T08:20:04.601603681Z, Duration: 00:00:00.077
Compute entry points: Begin: 2024-04-08T08:20:04.602383257Z, End: 2024-04-08T08:20:05.021911059Z, Duration: 00:00:00.419
Slice call graph: Begin: 2024-04-08T08:20:05.022599286Z, End: 2024-04-08T08:20:05.022817061Z, Duration: 00:00:00.000
Live variable analysis: Begin: 2024-04-08T08:20:05.023047839Z, End: 2024-04-08T08:20:05.372397074Z, Duration: 00:00:00.349
Taint analysis for js: Begin: 2024-04-08T08:20:05.373061457Z, End: 2024-04-08T08:20:07.980864852Z, Duration: 00:00:02.607
Report issues: Begin: 2024-04-08T08:20:07.980949129Z, End: 2024-04-08T08:20:07.984992688Z, Duration: 00:00:00.004
Store cache: Begin: 2024-04-08T08:20:07.985107421Z, End: 2024-04-08T08:20:08.014747576Z, Duration: 00:00:00.029
INFO: js security sensor peak memory: 297 MB
INFO: Sensor JsSecuritySensor [security] (done) | time=4526ms
INFO: ------------- Run sensors on project
INFO: Sensor Zero Coverage Sensor
INFO: Sensor Zero Coverage Sensor (done) | time=15ms
INFO: SCM Publisher SCM provider for this project is: git
INFO: SCM Publisher 382 source files to be analyzed
INFO: SCM Publisher 382/382 source files have been analyzed (done) | time=4028ms
INFO: CPD Executor 43 files had no CPD blocks
INFO: CPD Executor Calculating CPD for 122 files
INFO: CPD Executor CPD calculation finished (done) | time=133ms
INFO: Analysis report generated in 238ms, dir size=3 MB
INFO: Analysis report compressed in 762ms, zip size=1 MB
INFO: Analysis report uploaded in 1316ms
INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=my-project&branch=develop
INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AY68yyfBzDJTtU7BwiwI
INFO: Sensor cache published successfully
INFO: Time spent writing ucfgs 550ms
INFO: Analysis total time: 1:18.780 s
INFO: ------------------------------------------------------------------------
INFO: EXECUTION SUCCESS
INFO: ------------------------------------------------------------------------
INFO: Total time: 1:23.181s
INFO: Final Memory: 90M/307M
INFO: ------------------------------------------------------------------------
Thank you
Hi @vladimirp5
Could you add this to the configuration of the sonarcloud-github-action
action and post here the complete logs again?
with:
args: >
-Dsonar.verbose=true
After that, could you go to the Administration > Background task page of your project, pick one of the tasks failing on the develop
branch, click on the 3 dots at the right end of the line, and post here what you have on the Show Error details
menu?
Thank you very much
Hello,
The reason it was all happening was due to licensing limitations. I’ve figured this out by creating a new sonar project and updating the keys and I got the message immediately that the lines have reached the limit.
I will close the issue,
Thanks
This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.