No Code Scanned

Template for a good new topic, formatted with Markdown:

  • ALM used Github
  • CI system used Github Actions
  • Scanner command used when applicable
    sonar-scanner -X --define sonar.scm.exclusions.disabled=true --define sonar.host.url=“${{ env.SONAR_SERVER_URL }}” --define sonar.cfamily.build-wrapper-output=“${{ env.BUILD_WRAPPER_OUT_DIR }}”
  • Languages of the repository C
  • Error observed (wrap logs/code around with triple quotes ``` for proper formatting)
  • Steps to reproduce
  • Potential workaround

I’m trying to use SonarCloud to analyze a repository with some embedded C code (C2000). I’ve followed all the guides and done quite a bit of experimentation, but am having trouble getting the code to scan correctly. Aftering building and scanning using github actions, the report on the sonarcloud site says 0 lines of code. I suspect this is some type of path issue, but I’m not 100% sure.

I did some searching and saw others with a similar issue. The fix appeared to be adding sonar.scm.exclusions.disabled=true. I’ve tried adding this to the call to sonar scanner and also adding it to the sonar-project.properties file, but neither has fixed the issue. Any ideas as to what I could be doing wrong?

Below is the output of sonar scanner:

23:16:25.328 INFO: Scanner configuration file: C:\Users\runneradmin\.sonar\sonar-scanner-4.7.0.2747-windows\bin\..\conf\sonar-scanner.properties
23:16:25.328 INFO: Project root configuration file: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\sonar-project.properties
23:16:25.391 INFO: SonarScanner 4.7.0.2747
23:16:25.391 INFO: Java 11.0.14.1 Eclipse Adoptium (64-bit)
23:16:25.391 INFO: Windows Server 2022 10.0 amd64
23:16:25.672 DEBUG: keyStore is : 
23:16:25.672 DEBUG: keyStore type is : pkcs12
23:16:25.672 DEBUG: keyStore provider is : 
23:16:25.688 DEBUG: init keystore
23:16:25.688 DEBUG: init keymanager of type SunX509
23:16:25.969 DEBUG: Create: C:\Users\runneradmin\.sonar\cache
23:16:25.969 INFO: User cache: C:\Users\runneradmin\.sonar\cache
23:16:25.969 DEBUG: Create: C:\Users\runneradmin\.sonar\cache\_tmp
23:16:25.969 DEBUG: Extract sonar-scanner-api-batch in temp...
23:16:25.969 DEBUG: Get bootstrap index...
23:16:25.969 DEBUG: Download: https://sonarcloud.io/batch/index
23:16:26.867 DEBUG: Get bootstrap completed
23:16:26.882 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.31301-all.jar to C:\Users\runneradmin\.sonar\cache\_tmp\fileCache11876931079734154825.tmp
23:16:29.391 DEBUG: Create isolated classloader...
23:16:29.406 DEBUG: Start temp cleaning...
23:16:29.422 DEBUG: Temp cleaning done
23:16:29.422 INFO: Scanner configuration file: C:\Users\runneradmin\.sonar\sonar-scanner-4.7.0.2747-windows\bin\..\conf\sonar-scanner.properties
23:16:29.422 INFO: Project root configuration file: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\sonar-project.properties
23:16:29.422 INFO: Analyzing on SonarCloud
23:16:29.422 INFO: Default locale: "en_US", source code encoding: "windows-1252" (analysis is platform dependent)
23:16:29.422 DEBUG: Work directory: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork
23:16:29.422 DEBUG: Execution execute
23:16:29.875 DEBUG: SonarCloud 9.9.0.229
23:16:30.141 INFO: Load global settings
23:16:30.875 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=734ms
23:16:30.875 INFO: Load global settings (done) | time=734ms
23:16:30.891 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
23:16:30.911 DEBUG: Create : C:\Users\runneradmin\.sonar\_tmp
23:16:30.911 INFO: User cache: C:\Users\runneradmin\.sonar\cache
23:16:30.922 INFO: Load/download plugins
23:16:30.922 INFO: Load plugins index
23:16:31.595 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=673ms
23:16:31.642 INFO: Load plugins index (done) | time=720ms
23:16:31.642 DEBUG: Download plugin 'abap' to 'C:\Users\runneradmin\.sonar\_tmp\fileCache8148799386129221465.tmp'
23:16:31.814 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/abap/versions/b597d6dd0a09e600243aa3ed385e8592.jar | time=172ms
23:16:31.956 DEBUG: Download plugin 'sonarapex' to 'C:\Users\runneradmin\.sonar\_tmp\fileCache7158820258439112985.tmp'
23:16:31.972 DEBUG: GET 200 https://scanner.sonarcloud.io/plugins/sonarapex/versions/983ea9cf987e3277a0423e062b3958dc.jar | time=16ms
...deleted some lines due to forum post length limitations...
23:16:48.805 INFO: Load/download plugins (done) | time=17883ms
23:16:49.243 DEBUG: Plugins:
23:16:49.243 DEBUG:   * IaC Code Quality and Security 1.9.2.2279 (iac)
23:16:49.243 DEBUG:   * PL/SQL Code Quality and Security 3.7.0.4372 (plsql)
23:16:49.243 DEBUG:   * Scala Code Quality and Security 1.10.0.3710 (sonarscala)
23:16:49.243 DEBUG:   * C# Code Quality and Security 8.44.0.52574 (csharp)
23:16:49.243 DEBUG:   * Vulnerability Analysis 9.6.1.17278 (security)
23:16:49.243 DEBUG:   * Java Code Quality and Security 7.13.0.29990 (java)
23:16:49.243 DEBUG:   * HTML Code Quality and Security 3.6.0.3106 (web)
23:16:49.243 DEBUG:   * Flex Code Quality and Security 2.7.0.2865 (flex)
23:16:49.243 DEBUG:   * XML Code Quality and Security 2.5.0.3376 (xml)
23:16:49.243 DEBUG:   * Text file Code Quality and Security 1.1.0.282 (text)
23:16:49.243 DEBUG:   * VB.NET Code Quality and Security 8.44.0.52574 (vbnet)
23:16:49.243 DEBUG:   * Swift Code Quality and Security 4.6.1.5444 (swift)
23:16:49.243 DEBUG:   * CFamily Code Quality and Security 6.36.0.52033 (cpp)
23:16:49.243 DEBUG:   * Python Code Quality and Security 3.15.1.9817 (python)
23:16:49.243 DEBUG:   * Dataflow Bug Detection Rules for Python 1.5.0.1969 (dbdpythonfrontend)
23:16:49.243 DEBUG:   * Dataflow Bug Detection 1.5.0.1969 (dbd)
23:16:49.243 DEBUG:   * Go Code Quality and Security 1.10.0.3710 (go)
23:16:49.243 DEBUG:   * JaCoCo 1.1.1.1157 (jacoco)
23:16:49.243 DEBUG:   * Kotlin Code Quality and Security 2.10.0.1456 (kotlin)
23:16:49.243 DEBUG:   * Dataflow Bug Detection Rules for Java 1.5.0.1969 (dbdjavafrontend)
23:16:49.243 DEBUG:   * T-SQL Code Quality and Security 1.6.0.4844 (tsql)
23:16:49.243 DEBUG:   * Apex Code Quality and Security 1.10.0.3710 (sonarapex)
23:16:49.243 DEBUG:   * JavaScript/TypeScript/CSS Code Quality and Security 9.7.0.18911 (javascript)
23:16:49.243 DEBUG:   * Ruby Code Quality and Security 1.10.0.3710 (ruby)
23:16:49.243 DEBUG:   * Vulnerability Rules for C# 9.6.1.17278 (securitycsharpfrontend)
23:16:49.243 DEBUG:   * Vulnerability Rules for Java 9.6.1.17278 (securityjavafrontend)
23:16:49.243 DEBUG:   * License for SonarLint 8.0.0.31301 (license)
23:16:49.243 DEBUG:   * Vulnerability Rules for JS 9.6.1.17278 (securityjsfrontend)
23:16:49.243 DEBUG:   * COBOL Code Quality 5.0.0.5433 (cobol)
23:16:49.243 DEBUG:   * Vulnerability Rules for Python 9.6.1.17278 (securitypythonfrontend)
23:16:49.243 DEBUG:   * PHP Code Quality and Security 3.24.0.8949 (php)
23:16:49.243 DEBUG:   * ABAP Code Quality and Security 3.10.0.3628 (abap)
23:16:49.243 DEBUG:   * Configuration detection fot Code Quality and Security 1.2.0.267 (config)
23:16:49.243 DEBUG:   * Vulnerability Rules for PHP 9.6.1.17278 (securityphpfrontend)
23:16:49.916 DEBUG: GET 200 https://sonarcloud.io/api/server/version | time=673ms
23:16:49.916 DEBUG: Updated analysis started with a difference of -50 milliseconds
23:16:49.931 DEBUG: Started at Tue Aug 23 23:16:30 UTC 2022
23:16:49.962 INFO: Loaded core extensions: developer-scanner
23:16:49.994 DEBUG: Installed core extension: com.sonarsource.branch.DeveloperScannerCoreExtension@408b87aa
23:16:50.509 INFO: Found an active CI vendor: 'Github Actions'
23:16:50.525 INFO: Load project settings for component key: 'SygnalAuto_ci_test'
23:16:51.213 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=SygnalAuto_ci_test | time=688ms
23:16:51.213 INFO: Load project settings for component key: 'SygnalAuto_ci_test' (done) | time=688ms
23:16:51.229 INFO: Process project properties
23:16:51.229 DEBUG: Process project properties (done) | time=0ms
23:16:51.229 INFO: Execute project builders
23:16:51.229 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
23:16:51.229 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
23:16:51.229 INFO: Execute project builders (done) | time=0ms
23:16:51.229 INFO: Project key: SygnalAuto_ci_test
23:16:51.229 INFO: Base dir: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration
23:16:51.229 INFO: Working dir: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork
23:16:51.229 DEBUG: Project global encoding: windows-1252, default locale: en_US
23:16:51.229 DEBUG: Creating module hierarchy
23:16:51.229 DEBUG:   Init module 'SygnalAuto_ci_test'
23:16:51.229 DEBUG:     Base dir: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration
23:16:51.229 DEBUG:     Working dir: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork
23:16:51.229 DEBUG:     Module global encoding: windows-1252, default locale: en_US
23:16:51.354 INFO: Load project branches
23:16:52.027 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=SygnalAuto_ci_test | time=657ms
23:16:52.043 INFO: Load project branches (done) | time=689ms
23:16:52.043 INFO: Check ALM binding of project 'SygnalAuto_ci_test'
23:16:52.731 DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=SygnalAuto_ci_test | time=688ms
23:16:52.731 INFO: Detected project binding: BOUND
23:16:52.731 INFO: Check ALM binding of project 'SygnalAuto_ci_test' (done) | time=688ms
23:16:52.731 INFO: Load project pull requests
23:16:53.388 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=SygnalAuto_ci_test | time=657ms
23:16:53.388 INFO: Load project pull requests (done) | time=657ms
23:16:53.404 INFO: Load branch configuration
23:16:53.404 INFO: Github event: push
23:16:53.420 INFO: Auto-configuring branch master
23:16:53.420 INFO: Load branch configuration (done) | time=16ms
23:16:53.440 DEBUG: Available languages:
23:16:53.451 DEBUG:   * Terraform => "terraform"
23:16:53.451 DEBUG:   * CloudFormation => "cloudformation"
23:16:53.451 DEBUG:   * Kubernetes => "kubernetes"
23:16:53.451 DEBUG:   * PL/SQL => "plsql"
23:16:53.451 DEBUG:   * Scala => "scala"
23:16:53.451 DEBUG:   * C# => "cs"
23:16:53.451 DEBUG:   * Java => "java"
23:16:53.451 DEBUG:   * HTML => "web"
23:16:53.451 DEBUG:   * JSP => "jsp"
23:16:53.451 DEBUG:   * Flex => "flex"
23:16:53.451 DEBUG:   * XML => "xml"
23:16:53.451 DEBUG:   * Text => "text"
23:16:53.451 DEBUG:   * VB.NET => "vbnet"
23:16:53.451 DEBUG:   * Swift => "swift"
23:16:53.451 DEBUG:   * C => "c"
23:16:53.451 DEBUG:   * C++ => "cpp"
23:16:53.451 DEBUG:   * Objective-C => "objc"
23:16:53.451 DEBUG:   * Python => "py"
23:16:53.451 DEBUG:   * Go => "go"
23:16:53.451 DEBUG:   * Kotlin => "kotlin"
23:16:53.451 DEBUG:   * T-SQL => "tsql"
23:16:53.451 DEBUG:   * Apex => "apex"
23:16:53.451 DEBUG:   * JavaScript => "js"
23:16:53.451 DEBUG:   * TypeScript => "ts"
23:16:53.451 DEBUG:   * CSS => "css"
23:16:53.451 DEBUG:   * Ruby => "ruby"
23:16:53.451 DEBUG:   * COBOL => "cobol"
23:16:53.451 DEBUG:   * PHP => "php"
23:16:53.451 DEBUG:   * ABAP => "abap"
23:16:53.451 DEBUG:   * YAML => "yaml"
23:16:53.451 DEBUG:   * JSON => "json"
23:16:53.451 INFO: Load quality profiles
23:16:54.155 DEBUG: GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=SygnalAuto_ci_test&organization=sygnalauto | time=688ms
23:16:54.187 INFO: Load quality profiles (done) | time=736ms
23:16:54.187 INFO: Load active rules
23:16:54.858 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpIS1&ps=500&p=1 | time=671ms
23:16:55.046 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISe&ps=500&p=1 | time=141ms
23:16:55.202 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISp&ps=500&p=1 | time=140ms
23:16:55.343 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISb&ps=500&p=1 | time=141ms
23:16:55.516 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpIS2&ps=500&p=1 | time=173ms
23:16:55.845 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISl&ps=500&p=1 | time=172ms
23:16:56.032 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISa&ps=500&p=1 | time=156ms
23:16:56.189 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISd&ps=500&p=1 | time=157ms
23:16:56.424 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpIS0&ps=500&p=1 | time=219ms
23:16:56.720 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpIS0&ps=500&p=2 | time=156ms
23:16:56.861 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISh&ps=500&p=1 | time=141ms
23:16:57.003 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISZ&ps=500&p=1 | time=142ms
23:16:57.144 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISY&ps=500&p=1 | time=141ms
23:16:57.285 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISq&ps=500&p=1 | time=141ms
23:16:57.425 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISc&ps=500&p=1 | time=140ms
23:16:57.583 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISz&ps=500&p=1 | time=158ms
23:16:57.739 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISs&ps=500&p=1 | time=156ms
23:16:57.880 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISk&ps=500&p=1 | time=141ms
23:16:58.020 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISr&ps=500&p=1 | time=140ms
23:16:58.224 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISf&ps=500&p=1 | time=204ms
23:16:58.396 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISw&ps=500&p=1 | time=172ms
23:16:58.552 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISt&ps=500&p=1 | time=141ms
23:16:58.708 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISg&ps=500&p=1 | time=156ms
23:16:58.865 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISi&ps=500&p=1 | time=157ms
23:16:59.036 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISm&ps=500&p=1 | time=171ms
23:16:59.208 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISj&ps=500&p=1 | time=172ms
23:16:59.365 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISX&ps=500&p=1 | time=141ms
23:16:59.545 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISv&ps=500&p=1 | time=180ms
23:16:59.686 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISu&ps=500&p=1 | time=141ms
23:16:59.842 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISn&ps=500&p=1 | time=156ms
23:17:00.030 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISy&ps=500&p=1 | time=188ms
23:17:00.202 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt,deprecatedKeys&activation=true&qprofile=AYJk_nFmB7Yw4b9TpISx&ps=500&p=1 | time=172ms
23:17:00.233 INFO: Load active rules (done) | time=6046ms
23:17:00.296 INFO: Exclusions based on SCM info is disabled by configuration
23:17:00.311 INFO: Organization key: sygnalauto
23:17:00.311 INFO: Branch name: master, type: long-lived
23:17:00.327 INFO: Load project repositories
23:17:01.014 DEBUG: GET 200 https://sonarcloud.io/batch/project.protobuf?key=SygnalAuto_ci_test&branch=master | time=672ms
23:17:01.014 INFO: Load project repositories (done) | time=687ms
23:17:01.030 DEBUG: Declared extensions of language Terraform were converted to sonar.lang.patterns.terraform : **/*.tf
23:17:01.030 DEBUG: Declared extensions of language CloudFormation were converted to sonar.lang.patterns.cloudformation : 
23:17:01.030 DEBUG: Declared extensions of language Kubernetes were converted to sonar.lang.patterns.kubernetes : 
23:17:01.030 DEBUG: Declared extensions of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb
23:17:01.030 DEBUG: Declared extensions of language Scala were converted to sonar.lang.patterns.scala : **/*.scala
23:17:01.030 DEBUG: Declared extensions of language C# were converted to sonar.lang.patterns.cs : **/*.cs
23:17:01.030 DEBUG: Declared extensions of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav
23:17:01.030 DEBUG: Declared extensions of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml,**/*.cmp,**/*.twig
23:17:01.030 DEBUG: Declared extensions of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx
23:17:01.030 DEBUG: Declared extensions of language Flex were converted to sonar.lang.patterns.flex : **/*.as
23:17:01.030 DEBUG: Declared extensions of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl
23:17:01.030 DEBUG: Declared extensions of language Text were converted to sonar.lang.patterns.text : **/*.sonarshouldnotexistextension
23:17:01.046 DEBUG: Declared extensions of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb
23:17:01.046 DEBUG: Declared extensions of language Swift were converted to sonar.lang.patterns.swift : **/*.swift
23:17:01.046 DEBUG: Declared extensions of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h
23:17:01.046 DEBUG: Declared extensions of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp
23:17:01.046 DEBUG: Declared extensions of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m
23:17:01.046 DEBUG: Declared extensions of language Python were converted to sonar.lang.patterns.py : **/*.py
23:17:01.046 DEBUG: Declared extensions of language Go were converted to sonar.lang.patterns.go : **/*.go
23:17:01.046 DEBUG: Declared extensions of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt
23:17:01.046 DEBUG: Declared extensions of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql
23:17:01.046 DEBUG: Declared extensions of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger
23:17:01.046 DEBUG: Declared extensions of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.mjs,**/*.vue
23:17:01.046 DEBUG: Declared extensions of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx
23:17:01.046 DEBUG: Declared extensions of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss
23:17:01.046 DEBUG: Declared extensions of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb
23:17:01.046 DEBUG: Declared extensions of language COBOL were converted to sonar.lang.patterns.cobol : 
23:17:01.046 DEBUG: Declared extensions of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
23:17:01.046 DEBUG: Declared extensions of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
23:17:01.046 DEBUG: Declared extensions of language YAML were converted to sonar.lang.patterns.yaml : **/*.yaml,**/*.yml
23:17:01.046 DEBUG: Declared extensions of language JSON were converted to sonar.lang.patterns.json : **/*.json
23:17:01.046 DEBUG: Will ignore generated code
23:17:01.046 DEBUG: Will ignore generated code
23:17:01.046 INFO: Indexing files...
23:17:01.046 INFO: Project configuration:
23:17:01.046 INFO:   Excluded sources: **/build-wrapper-dump.json
23:17:01.061 DEBUG: 'sonar-project.properties' indexed with language 'null'
23:17:01.077 INFO: 1 file indexed
23:17:01.077 INFO: 0 files ignored because of inclusion/exclusion patterns
23:17:02.302 INFO: ------------- Run sensors on module SygnalAuto_ci_test
23:17:02.443 INFO: Load metrics repository
23:17:03.115 DEBUG: GET 200 https://sonarcloud.io/api/metrics/search?f=name,description,direction,qualitative&ps=500&p=1 | time=672ms
23:17:03.131 INFO: Load metrics repository (done) | time=688ms
23:17:04.148 DEBUG: Loading C:\Users\RUNNER~1\AppData\Local\Temp\sonarsource-cfamily-jni16653793218113478263.dll
23:17:05.398 DEBUG: Adding rules for repository 'jssecurity', language: JAVASCRIPT, [class com.sonar.security.frontend.js.rules.DomOpenRedirectCheck, class com.sonar.security.frontend.js.rules.DomXssCheck, class com.sonar.security.frontend.js.rules.DynamicCodeExecutionCheck, class com.sonar.security.frontend.js.rules.FilePathInjectionCheck, class com.sonar.security.frontend.js.rules.HttpRedirectionCheck, class com.sonar.security.frontend.js.rules.NoSQLInjectionCheck, class com.sonar.security.frontend.js.rules.OSArgumentConstructionCheck, class com.sonar.security.frontend.js.rules.OSArgumentInjectionCheck, class com.sonar.security.frontend.js.rules.OSCommandInjectionCheck, class com.sonar.security.frontend.js.rules.ReflectedXssCheck, class com.sonar.security.frontend.js.rules.RegularExpressionDoSCheck, class com.sonar.security.frontend.js.rules.ServerSideRequestCheck, class com.sonar.security.frontend.js.rules.SQLInjectionCheck, class com.sonar.security.frontend.js.rules.ZipSlipCheck, class com.sonar.security.frontend.js.rules.SessionFixationCheck] from com.sonar.security.frontend.js.E
23:17:05.398 DEBUG: Adding rules for repository 'tssecurity', language: TYPESCRIPT, [class com.sonar.security.frontend.js.rules.DomOpenRedirectCheck, class com.sonar.security.frontend.js.rules.DomXssCheck, class com.sonar.security.frontend.js.rules.DynamicCodeExecutionCheck, class com.sonar.security.frontend.js.rules.FilePathInjectionCheck, class com.sonar.security.frontend.js.rules.HttpRedirectionCheck, class com.sonar.security.frontend.js.rules.NoSQLInjectionCheck, class com.sonar.security.frontend.js.rules.OSArgumentConstructionCheck, class com.sonar.security.frontend.js.rules.OSArgumentInjectionCheck, class com.sonar.security.frontend.js.rules.OSCommandInjectionCheck, class com.sonar.security.frontend.js.rules.ReflectedXssCheck, class com.sonar.security.frontend.js.rules.RegularExpressionDoSCheck, class com.sonar.security.frontend.js.rules.ServerSideRequestCheck, class com.sonar.security.frontend.js.rules.SQLInjectionCheck, class com.sonar.security.frontend.js.rules.ZipSlipCheck, class com.sonar.security.frontend.js.rules.SessionFixationCheck] from com.sonar.security.frontend.js.B
23:17:06.040 DEBUG: 'JavaSensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'CobolSquidSensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import external issues report' skipped because one of the required properties is missing
23:17:06.040 DEBUG: 'IaC Terraform Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'IaC CloudFormation Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'IaC Kubernetes Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'PL/SQL Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Scala Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Scoverage sensor for Scala coverage' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Scalastyle issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Scapegoat issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Checkstyle issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of PMD issues' skipped because one of the required properties is missing
23:17:06.040 DEBUG: 'Import of SpotBugs issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'SurefireSensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Removed properties sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Flex' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Flex Cobertura' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'XML Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Swift Code Quality and Security' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of SwiftLint issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'gcov' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'llvm-cov' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'cppunit' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'VisualStudioCoverage' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'bullseye' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Python Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Cobertura Sensor for Python coverage' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'PythonXUnitSensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Pylint issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Bandit issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Flake8 issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Code Quality and Security for Go' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Go Unit Test Report' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Go Cover sensor for Go coverage' skipped because one of the required properties is missing
23:17:06.040 DEBUG: 'Import of go vet issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of Golint issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of GoMetaLinter issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of GolangCI-Lint issues' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Kotlin Sensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'KotlinSurefireSensor' skipped because there is no related file in current project
23:17:06.040 DEBUG: 'Import of detekt issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of Android Lint issues' skipped because one of the required properties is missing
23:17:06.056 DEBUG: 'Import of ktlint issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'T-SQL Sensor' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Apex Sensor' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Test coverage Sensor for Apex' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of PMD issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'JavaScript analysis' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'TypeScript analysis' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'JavaScript inside YAML analysis' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'JavaScript/TypeScript Coverage' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of ESLint issues' skipped because one of the required properties is missing
23:17:06.056 DEBUG: 'Import of TSLint issues' skipped because one of the required properties is missing
23:17:06.056 DEBUG: 'CSS Metrics' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of stylelint issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Ruby Sensor' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of RuboCop issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'SimpleCov Sensor for Ruby coverage' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Python HTML templates processing' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'PHP sensor' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Analyzer for "php.ini" files' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of PHPStan issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Import of Psalm issues' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'AbapSquidSensor' skipped because there is no related file in current project
23:17:06.056 DEBUG: 'Generic Coverage Report' skipped because one of the required properties is missing
23:17:06.056 DEBUG: 'Generic Test Executions Report' skipped because one of the required properties is missing
23:17:06.056 DEBUG: 'CFamily' skipped because there is no related file in current project
23:17:06.056 DEBUG: Sensors : C# Project Type Information -> C# Analysis Log -> C# Properties -> HTML -> Text Sensor -> VB.NET Project Type Information -> VB.NET Analysis Log -> VB.NET Properties -> JaCoCo XML Report Importer -> CSS Rules -> ThymeLeaf template sensor -> Serverless configuration file sensor -> AWS SAM template file sensor -> javabugs -> pythonbugs -> JavaSecuritySensor -> CSharpSecuritySensor -> PhpSecuritySensor -> PythonSecuritySensor -> JsSecuritySensor
23:17:06.071 INFO: Sensor C# Project Type Information [csharp]
23:17:06.071 INFO: Sensor C# Project Type Information [csharp] (done) | time=0ms
23:17:06.071 INFO: Sensor C# Analysis Log [csharp]
23:17:06.087 DEBUG: Project 'SygnalAuto_ci_test': Property missing: 'sonar.cs.analyzer.projectOutPaths'. No protobuf files will be loaded for this project.
23:17:06.087 INFO: Sensor C# Analysis Log [csharp] (done) | time=16ms
23:17:06.087 INFO: Sensor C# Properties [csharp]
23:17:06.087 DEBUG: Project 'SygnalAuto_ci_test': Property missing: 'sonar.cs.analyzer.projectOutPaths'. No protobuf files will be loaded for this project.
23:17:06.087 DEBUG: Project 'SygnalAuto_ci_test': No Roslyn issues reports have been found.
23:17:06.087 INFO: Sensor C# Properties [csharp] (done) | time=0ms
23:17:06.087 INFO: Sensor HTML [web]
23:17:06.087 INFO: Sensor HTML [web] (done) | time=0ms
23:17:06.087 INFO: Sensor Text Sensor [text]
23:17:06.103 INFO: 0 source files to be analyzed
23:17:06.103 INFO: 0/0 source files have been analyzed
23:17:06.103 INFO: Sensor Text Sensor [text] (done) | time=16ms
23:17:06.103 INFO: Sensor VB.NET Project Type Information [vbnet]
23:17:06.103 INFO: Sensor VB.NET Project Type Information [vbnet] (done) | time=0ms
23:17:06.103 INFO: Sensor VB.NET Analysis Log [vbnet]
23:17:06.118 DEBUG: Project 'SygnalAuto_ci_test': Property missing: 'sonar.vbnet.analyzer.projectOutPaths'. No protobuf files will be loaded for this project.
23:17:06.118 INFO: Sensor VB.NET Analysis Log [vbnet] (done) | time=15ms
23:17:06.118 INFO: Sensor VB.NET Properties [vbnet]
23:17:06.118 DEBUG: Project 'SygnalAuto_ci_test': Property missing: 'sonar.vbnet.analyzer.projectOutPaths'. No protobuf files will be loaded for this project.
23:17:06.118 DEBUG: Project 'SygnalAuto_ci_test': No Roslyn issues reports have been found.
23:17:06.118 INFO: Sensor VB.NET Properties [vbnet] (done) | time=0ms
23:17:06.118 INFO: Sensor JaCoCo XML Report Importer [jacoco]
23:17:06.118 INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
23:17:06.118 INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer
23:17:06.118 INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=0ms
23:17:06.118 INFO: Sensor CSS Rules [javascript]
23:17:06.118 INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
23:17:06.118 INFO: Sensor CSS Rules [javascript] (done) | time=0ms
23:17:06.118 INFO: Sensor ThymeLeaf template sensor [securityjavafrontend]
23:17:06.118 INFO: Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=0ms
23:17:06.118 INFO: Sensor Serverless configuration file sensor [security]
23:17:06.118 INFO: 0 Serverless function entries were found in the project
23:17:06.134 INFO: 0 Serverless function handlers were kept as entrypoints
23:17:06.134 INFO: Sensor Serverless configuration file sensor [security] (done) | time=16ms
23:17:06.134 INFO: Sensor AWS SAM template file sensor [security]
23:17:06.134 DEBUG: 0 SAM template configuration files were found in the project. 0 SAM function entries were found in total. 0 were kept as potential entrypoints.
23:17:06.134 INFO: Sensor AWS SAM template file sensor [security] (done) | time=0ms
23:17:06.134 INFO: Sensor javabugs [dbd]
23:17:06.134 INFO: Reading IR files from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ir\java
23:17:06.134 INFO: No IR files have been included for analysis.
23:17:06.134 INFO: Sensor javabugs [dbd] (done) | time=0ms
23:17:06.134 INFO: Sensor pythonbugs [dbd]
23:17:06.134 INFO: Reading IR files from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ir\python
23:17:06.134 INFO: No IR files have been included for analysis.
23:17:06.134 INFO: Sensor pythonbugs [dbd] (done) | time=0ms
23:17:06.134 INFO: Sensor JavaSecuritySensor [security]
23:17:06.134 INFO: Reading type hierarchy from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\java
23:17:06.134 INFO: Read 0 type definitions
23:17:06.134 INFO: Reading UCFGs from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\java
23:17:06.134 INFO: No UCFGs have been included for analysis.
23:17:06.134 INFO: Sensor JavaSecuritySensor [security] (done) | time=0ms
23:17:06.134 INFO: Sensor CSharpSecuritySensor [security]
23:17:06.134 INFO: Reading type hierarchy from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\ucfg_cs2
23:17:06.134 INFO: Read 0 type definitions
23:17:06.134 INFO: Reading UCFGs from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\ucfg_cs2
23:17:06.134 INFO: No UCFGs have been included for analysis.
23:17:06.134 INFO: Sensor CSharpSecuritySensor [security] (done) | time=0ms
23:17:06.134 INFO: Sensor PhpSecuritySensor [security]
23:17:06.134 INFO: Reading type hierarchy from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\php
23:17:06.134 INFO: Read 0 type definitions
23:17:06.134 INFO: Reading UCFGs from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\php
23:17:06.134 INFO: No UCFGs have been included for analysis.
23:17:06.134 INFO: Sensor PhpSecuritySensor [security] (done) | time=0ms
23:17:06.134 INFO: Sensor PythonSecuritySensor [security]
23:17:06.150 INFO: Reading type hierarchy from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\python
23:17:06.150 INFO: Read 0 type definitions
23:17:06.150 INFO: Reading UCFGs from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\python
23:17:06.150 INFO: No UCFGs have been included for analysis.
23:17:06.150 INFO: Sensor PythonSecuritySensor [security] (done) | time=16ms
23:17:06.150 INFO: Sensor JsSecuritySensor [security]
23:17:06.150 INFO: Reading type hierarchy from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\js
23:17:06.150 INFO: Read 0 type definitions
23:17:06.150 INFO: Reading UCFGs from: D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\ucfg2\js
23:17:06.150 INFO: No UCFGs have been included for analysis.
23:17:06.150 INFO: Sensor JsSecuritySensor [security] (done) | time=0ms
23:17:06.154 INFO: ------------- Run sensors on project
23:17:06.181 DEBUG: 'C#' skipped because there is no related file in current project
23:17:06.181 DEBUG: 'C# Tests Coverage Report Import' skipped because there is no related file in current project
23:17:06.181 DEBUG: '[Deprecated] C# Integration Tests Coverage Report Import' skipped because there is no related file in current project
23:17:06.181 DEBUG: 'C# Unit Test Results Import' skipped because there is no related file in current project
23:17:06.181 DEBUG: 'VB.NET' skipped because there is no related file in current project
23:17:06.181 DEBUG: 'VB.NET Tests Coverage Report Import' skipped because there is no related file in current project
23:17:06.181 DEBUG: '[Deprecated] VB.NET Integration Tests Coverage Report Import' skipped because there is no related file in current project
23:17:06.181 DEBUG: 'VB.NET Unit Test Results Import' skipped because there is no related file in current project
23:17:06.181 DEBUG: 'Java CPD Block Indexer' skipped because there is no related file in current project
23:17:06.181 DEBUG: Sensors : Analysis Warnings import -> Zero Coverage Sensor
23:17:06.197 INFO: Sensor Analysis Warnings import [csharp]
23:17:06.197 INFO: Sensor Analysis Warnings import [csharp] (done) | time=0ms
23:17:06.197 INFO: Sensor Zero Coverage Sensor
23:17:06.197 INFO: Sensor Zero Coverage Sensor (done) | time=0ms
23:17:06.197 INFO: CPD Executor Calculating CPD for 0 files
23:17:06.197 INFO: CPD Executor CPD calculation finished (done) | time=0ms
23:17:08.325 DEBUG: Could not detect the dotnet / msbuild version
23:17:08.434 INFO: Analysis report generated in 2237ms, dir size=198 KB
23:17:08.450 INFO: Analysis report compressed in 16ms, zip size=38 KB
23:17:08.450 INFO: Analysis report generated in D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\scanner-report
23:17:08.450 DEBUG: Upload report
23:17:09.380 DEBUG: POST 200 https://sonarcloud.io/api/ce/submit?organization=sygnalauto&projectKey=SygnalAuto_ci_test&characteristic=branch%3Dmaster&characteristic=branchType%3DLONG | time=930ms
23:17:09.380 INFO: Analysis report uploaded in 930ms
23:17:09.380 DEBUG: Report metadata written to D:\a\ci_test\ci_test\Sygnal-MCM\CPU1_FLASH_BLIntegration\.scannerwork\report-task.txt
23:17:09.380 INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=SygnalAuto_ci_test&branch=master
23:17:09.380 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
23:17:09.380 INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AYLM_tXRk4ut10W3UbVL
23:17:09.380 DEBUG: Post-jobs : 
23:17:09.380 INFO: Closing heartbeat service
23:17:09.380 INFO: Analysis total time: 19.418 s
23:17:09.380 INFO: ------------------------------------------------------------------------
23:17:09.380 INFO: EXECUTION SUCCESS
23:17:09.380 INFO: ------------------------------------------------------------------------
23:17:09.380 INFO: Total time: 44.067s
23:17:09.474 INFO: Final Memory: 35M/112M
23:17:09.474 INFO: ------------------------------------------------------------------------

And here is a copy of my build.xml:


name: Build
on:
  push:
    branches:
      - master
  pull_request:
    types: [opened, synchronize, reopened]
jobs:
  build:
    name: Build
    runs-on: windows-latest
    env:
      SONAR_SCANNER_VERSION: 4.7.0.2747
      SONAR_SERVER_URL: "https://sonarcloud.io"
      BUILD_WRAPPER_OUT_DIR: build_wrapper_output_directory # Directory where build-wrapper output will be placed
    steps:
      - uses: actions/checkout@v2
        with:
          fetch-depth: 0  # Shallow clones should be disabled for a better relevancy of analysis
      - name: Set up JDK 11
        uses: actions/setup-java@v1
        with:
          java-version: 11
      - name: Download and set up sonar-scanner
        env:
          SONAR_SCANNER_DOWNLOAD_URL: https://binaries.sonarsource.com/Distribution/sonar-scanner-cli/sonar-scanner-cli-${{ env.SONAR_SCANNER_VERSION }}-windows.zip
        run: |
          New-Item -Force -ItemType directory -Path $HOME\.sonar
          curl -sSLo $HOME\.sonar\sonar-scanner.zip ${{ env.SONAR_SCANNER_DOWNLOAD_URL }}
          unzip -o $HOME\.sonar\sonar-scanner.zip -d $HOME\.sonar\
          echo "$HOME\.sonar\sonar-scanner-${{ env.SONAR_SCANNER_VERSION }}-windows\bin" | Out-File -Append -FilePath $env:GITHUB_PATH -Encoding utf8
      - name: Download and set up build-wrapper
        env:
          BUILD_WRAPPER_DOWNLOAD_URL: ${{ env.SONAR_SERVER_URL }}/static/cpp/build-wrapper-win-x86.zip
        run: |
          curl -sSLo $HOME\.sonar\build-wrapper.zip ${{ env.BUILD_WRAPPER_DOWNLOAD_URL }}
          unzip -o $HOME\.sonar\build-wrapper.zip -d $HOME\.sonar\
          echo "$HOME\.sonar\build-wrapper-win-x86" | Out-File -Append -FilePath $env:GITHUB_PATH -Encoding utf8
      - name: Download TI CCS
        env:
          TI_CCS_DOWNLOAD_URL: https://dr-download.ti.com/software-development/ide-configuration-compiler-or-debugger/MD-J1VdearkvK/12.0.0/ccs_setup_12.0.0.00009.exe
        run: |
          New-Item -Force -ItemType directory -Path $HOME\.ti
          curl -sSLo $HOME\.ti\ti_ccs.exe ${{ env.TI_CCS_DOWNLOAD_URL }}
          dir $HOME\.ti
          ls $HOME\.ti
          echo "was there a directory printed out?"
          Start-Process -FilePath "$HOME\.ti\ti_ccs.exe"  -Wait -ArgumentList "--prefix $HOME\.ti --enable-components PF_C28 --mode unattended"
      - name: Import and build project
        run: |
          New-Item -Force -ItemType directory -Path $HOME\.ti\workspace
          Start-Process -FilePath "$HOME\.ti\ccs\eclipse\ccstudio.exe" -Wait -ArgumentList "-noSplash -data $HOME\.ti\workspace -application com.ti.ccstudio.apps.projectImport -ccs.location $HOME\work\ci_test\ci_test\Sygnal-MCM"
          echo "PROJECT IMPORTED"
          Start-Process -FilePath "$HOME\.ti\ccs\eclipse\ccstudio.exe" -Wait -ArgumentList "-noSplash -data $HOME\.ti\workspace -application com.ti.ccstudio.apps.projectBuild -ccs.projects Sygnal-MCM -ccs.configuration CPU1_FLASH_BLIntegration"
          echo "PROJECT BUILT"
      - name: Run sonar-scanner
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
          SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
        run: |
          echo "TEST"
          dir "$GITHUB_WORKSPACE"
          # type "${{ github.workspace }}\Sygnal-MCM\CPU1_FLASH_BLIntegration\${{ env.BUILD_WRAPPER_OUT_DIR }}\build-wrapper-dump.json"
          # echo "EOF"
          cd "${{ github.workspace }}\Sygnal-MCM\CPU1_FLASH_BLIntegration\"
          sonar-scanner -X --define sonar.scm.exclusions.disabled=true --define sonar.host.url="${{ env.SONAR_SERVER_URL }}" --define sonar.cfamily.build-wrapper-output="${{ env.BUILD_WRAPPER_OUT_DIR }}"
          echo "DONE"

I would suggest running a test by adding an ls before your sonar-scanner command – are there files in the folder other than the sonar-project.properties file?

There are not, so it would appear my build is putting the files elsewhere. Let me poke at this and report back before we close the thread.

I did some more digging on this and found that my tool chain was not building the application due to a path error in my build.xml file. I’ve fixed that and have managed to get a little further but am still having issues.

After a scan now SonarCloud is reporting 20k lines of code scanned, but it’s only scanning a single xml file and not the numerous C source files.

I’ve attached my build wrapper dump file to this post:
build-wrapper-dump.json (1.2 MB)

Any idea what could be wrong? To call build wrapper, I’ve modified the build command in the TI CCS project to add build wrapper. I’m not sure exactly from what working directory that call occurs. I then use the command line options to build the project with CCS in a headless configuration.

Hey there.

I would recommend uploading your new build/analysis logs, along with the build wrapper dump you’ve already uploaded.

build.txt (173.3 KB)
^console build log

build-wrapper-dump.json (1.2 MB)

8_Run sonar-scanner.txt (4.5 MB)

It looks like all the files that are indexed by the scanner have the extensions .obj, .d, or .mk. Are these really your source files?

No those are intermediate build outputs. My guess is the problem is the way I’m calling the build wrapper due to the code composer studio build system. My directory structure looks like this:

├── Sygnal-MCM
│   ├── CPU1_FLASH_BLIntegration
│   │   ├── application
│   │   ├── build_wrapper_output_directory
│   │   ├── can_protocol
│   │   ├── cla
│   │   ├── control
│   │   ├── driverlib
│   │   ├── drivers
│   │   ├── sygnal_drivers
│   │   ├── sygnal_utilities
│   │   ├── utilities
│   │   └── virt_if_drivers
│   ├── application
│   ├── can_protocol
│   ├── cla
│   ├── control
│   ├── drivers
│   ├── utilities
│   └── virt_if_drivers
└── common
    └── f28004x
        ├── dcl
        │   ├── include
        │   └── source
        ├── device_support
        │   └── f28004x
        │       ├── common
        │       │   ├── include
        │       │   └── source
        │       └── headers
        │           ├── cmd
        │           ├── include
        │           └── source
        ├── driverlib
        │   └── inc
        ├── fixedptdsp
        │   ├── include
        │   └── lib
        ├── flashapi
        │   ├── include
        │   │   └── Constants
        │   └── lib
        ├── floatingptdsp
        │   ├── include
        │   │   ├── fpu32
        │   │   │   └── f2837xd_filter
        │   │   └── fpu64
        │   └── lib
        ├── sygnal_drivers
        ├── sygnal_utilities
        └── vcu0
            ├── include
            └── lib

The CPU1_Flash_BLIntegration folder is where all the build outputs are. Sources are in the “application” and other folders under the Sygnal-MCM folder as well as the “common” folder. Any ideas on what to change to get this to work?

Where in this directory structure is your actual code located? That needs to be where the scanner starts (or at least, the scanner must start above that place in the directory structure)

Colin,
Thanks for your help, I think I finally have it working. The trick as you called out in your previous post was to remove the directory change before the call to sonar scanner.

Now I have the problem that sonar cloud is complaining about the number of lines of code being larger than my plan allows. One gripe I have is that the LOC metric should be front and center in that error message so I know which plan I need to change too. After a while I was able to find this information and it turns out I’m just over the 100k limit of the basic plan.

No problem I think to myself, I’ll just bump the plan up a notch…

Well then I go to look at the pricing and I’m a little dumbfounded by the pricing choices your marketing and sales team have made…

Below is a graph of the per LOC cost at each of the different tiers you offer.

Normally I would expect a software product to decrease in per unit cost the more I use it, but as you can see that is clearly not the case. In fact for projects just under the 100k LOC metric, it’s a substantially better value to have each project have its own SonarCloud account than it is to have them under a single larger account.

Even more frustrating is on top of the cost of SonarCloud, I have to pay additional money to actually do the analysis on Github.

So any chance y’all revise your pricing model to something that makes more sense? I’m a new user of your tool and am still in an evaluation phase before making a decision on a static analysis tool for my company.

Now that I’ve got my test repo working, I’m trying to transfer all this work to my main repository and I’m having problems again. I’m using the same build.yml file with some very minor changes (only changed one folder name), but I’m only seeing the build.yml file scanned in the web front end. This is surprising because the output of sonar scanner says it indexed all the files correctly.
8_Run sonar-scanner.txt (27.1 KB)

Here is the build wrapper file which appears to be complete:
build-wrapper-dump.json (1.2 MB)

Any ideas what I could be doing wrong?
Here’s my build.yaml:
build.txt (3.8 KB)

Hey there.

Thanks for the feedback on our pricing model. I’ll be sure to pass it along.

With regards to getting analysis running – it looks like you’re running a pull request analysis

2022-09-08T18:51:49.1702624Z INFO: Github event: pull_request
2022-09-08T18:51:49.1765845Z INFO: Auto-configuring pull request 69

This will only analyze the changed files/lines in the pull request. Once you merge your changes to your main branch, you should see full results.

Awesome! Thanks Colin. It looks like its all working now :smiley:

This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.