Only happens when I try to create a project, that doesn’t already exist, using CircleCI… if I create the project using my Mac (using this package: https://github.com/syngenta-digital/scs-node, which uses your npm sonqube-scanner), it works. not sure what is going on.
- ALM used: GitHub
- CI system used: Circle CI
- Scanner command used when applicable: sonarcloud/scan (circleci step)
- Languages of the repository: Javascript (node)
- properties file:
sonar.projectName = api-node-company-management
sonar.projectVersion = 1.0
sonar.sources = application
sonar.tests = test
sonar.scm.provider = git
sonar.verbose = true
sonar.organization = syngenta-dpe-usco
sonar.links.scm = git+https://github.com/syngenta-digitial/api-node-company-management.git
- Error observed
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0
2 40.4M 2 864k 0 0 760k 0 0:00:54 0:00:01 0:00:53 759k
40 40.4M 40 16.5M 0 0 7953k 0 0:00:05 0:00:02 0:00:03 7951k
81 40.4M 81 32.9M 0 0 10.5M 0 0:00:03 0:00:03 --:--:-- 10.5M
100 40.4M 100 40.4M 0 0 11.1M 0 0:00:03 0:00:03 --:--:-- 11.1M
INFO: Scanner configuration file: /tmp/cache/scanner/sonar-scanner-4.1.0.1829-linux/conf/sonar-scanner.properties
INFO: Project root configuration file: /root/project/sonar-project.properties
17:06:35.842 INFO: SonarQube Scanner 4.1.0.1829
17:06:35.843 INFO: Java 11.0.3 AdoptOpenJDK (64-bit)
17:06:35.843 INFO: Linux 4.15.0-1077-aws amd64
17:06:35.942 DEBUG: keyStore is :
17:06:35.943 DEBUG: keyStore type is : pkcs12
17:06:35.943 DEBUG: keyStore provider is :
17:06:35.943 DEBUG: init keystore
17:06:35.943 DEBUG: init keymanager of type SunX509
17:06:36.031 DEBUG: Create: /tmp/cache/scanner/.sonar/cache
17:06:36.032 INFO: User cache: /tmp/cache/scanner/.sonar/cache
17:06:36.032 DEBUG: Create: /tmp/cache/scanner/.sonar/cache/_tmp
17:06:36.035 DEBUG: Extract sonar-scanner-api-batch in temp...
17:06:36.039 DEBUG: Get bootstrap index...
17:06:36.039 DEBUG: Download: https://sonarcloud.io/batch/index
17:06:36.812 DEBUG: Get bootstrap completed
17:06:36.817 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.13848-all.jar to /tmp/cache/scanner/.sonar/cache/_tmp/fileCache17178537368925388189.tmp
17:06:38.607 DEBUG: Create isolated classloader...
17:06:38.614 DEBUG: Start temp cleaning...
17:06:38.616 DEBUG: Temp cleaning done
17:06:38.617 DEBUG: Execution getVersion
17:06:38.625 INFO: SonarQube server 8.0.0
17:06:38.626 INFO: Default locale: "en_US", source code encoding: "US-ASCII" (analysis is platform dependent)
17:06:38.626 DEBUG: Work directory: /root/project/.scannerwork
17:06:38.628 DEBUG: Execution execute
17:06:38.847 DEBUG: SonarCloud 8.0.0.13848
17:06:39.040 INFO: Load global settings
17:06:39.590 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=549ms
17:06:39.600 INFO: Load global settings (done) | time=559ms
17:06:39.605 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
17:06:39.608 DEBUG: Create : /tmp/cache/scanner/.sonar/_tmp
17:06:39.609 INFO: User cache: /tmp/cache/scanner/.sonar/cache
17:06:39.612 INFO: Load/download plugins
17:06:39.612 INFO: Load plugins index
17:06:39.714 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=102ms
17:06:39.748 INFO: Load plugins index (done) | time=136ms
17:06:39.750 DEBUG: Download plugin 'sonarapex' to '/tmp/cache/scanner/.sonar/_tmp/fileCache16317107395610830399.tmp'
17:06:39.844 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=94ms
17:06:40.475 DEBUG: Unpacking plugin sonarapex
17:06:40.902 DEBUG: Download plugin 'csharp' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2789726407385358078.tmp'
17:06:40.997 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=94ms
17:06:41.206 DEBUG: Unpacking plugin csharp
17:06:41.638 DEBUG: Download plugin 'cpp' to '/tmp/cache/scanner/.sonar/_tmp/fileCache13955502846565065788.tmp'
17:06:41.733 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=95ms
17:06:43.454 DEBUG: Unpacking plugin cpp
17:06:44.746 DEBUG: Download plugin 'cobol' to '/tmp/cache/scanner/.sonar/_tmp/fileCache17103299294626432130.tmp'
17:06:44.842 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=96ms
17:06:44.856 DEBUG: Unpacking plugin cobol
17:06:45.282 DEBUG: Download plugin 'flex' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6270022828351590508.tmp'
17:06:45.389 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=107ms
17:06:45.394 DEBUG: Unpacking plugin flex
17:06:45.594 DEBUG: Download plugin 'scmgit' to '/tmp/cache/scanner/.sonar/_tmp/fileCache5677453251867532497.tmp'
17:06:45.689 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=95ms
17:06:45.698 DEBUG: Unpacking plugin scmgit
17:06:46.009 DEBUG: Download plugin 'go' to '/tmp/cache/scanner/.sonar/_tmp/fileCache7759962197510734395.tmp'
17:06:46.105 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=96ms
17:06:46.400 DEBUG: Unpacking plugin go
17:06:47.123 DEBUG: Download plugin 'jacoco' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6746728538640832489.tmp'
17:06:47.220 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=97ms
17:06:47.221 DEBUG: Unpacking plugin jacoco
17:06:47.233 DEBUG: Download plugin 'java' to '/tmp/cache/scanner/.sonar/_tmp/fileCache15590487740839222813.tmp'
17:06:47.332 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=97ms
17:06:47.713 DEBUG: Unpacking plugin java
17:06:49.636 DEBUG: Download plugin 'javascript' to '/tmp/cache/scanner/.sonar/_tmp/fileCache9421092201532966548.tmp'
17:06:49.733 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=97ms
17:06:50.697 DEBUG: Unpacking plugin javascript
17:06:51.679 DEBUG: Download plugin 'kotlin' to '/tmp/cache/scanner/.sonar/_tmp/fileCache1205414412569574493.tmp'
17:06:51.775 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=96ms
17:06:51.966 DEBUG: Unpacking plugin kotlin
17:06:52.806 DEBUG: Download plugin 'license' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2857125737187261961.tmp'
17:06:52.902 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=96ms
17:06:52.903 DEBUG: Unpacking plugin license
17:06:52.906 DEBUG: Download plugin 'scmmercurial' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6032134714489628126.tmp'
17:06:53.005 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=99ms
17:06:53.005 DEBUG: Unpacking plugin scmmercurial
17:06:53.009 DEBUG: Download plugin 'php' to '/tmp/cache/scanner/.sonar/_tmp/fileCache12721328174844306048.tmp'
17:06:53.104 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=95ms
17:06:53.119 DEBUG: Unpacking plugin php
17:06:53.649 DEBUG: Download plugin 'python' to '/tmp/cache/scanner/.sonar/_tmp/fileCache16943809862540768841.tmp'
17:06:53.746 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=97ms
17:06:53.762 DEBUG: Unpacking plugin python
17:06:54.187 DEBUG: Download plugin 'ruby' to '/tmp/cache/scanner/.sonar/_tmp/fileCache14034468011738629614.tmp'
17:06:54.281 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=94ms
17:06:54.482 DEBUG: Unpacking plugin ruby
17:06:55.873 DEBUG: Download plugin 'sonarscala' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2333219299990628285.tmp'
17:06:55.993 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=120ms
17:06:56.484 DEBUG: Unpacking plugin sonarscala
17:06:57.773 DEBUG: Download plugin 'abap' to '/tmp/cache/scanner/.sonar/_tmp/fileCache10116994709806504389.tmp'
17:06:57.869 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=96ms
17:06:57.876 DEBUG: Unpacking plugin abap
17:06:58.020 DEBUG: Download plugin 'cssfamily' to '/tmp/cache/scanner/.sonar/_tmp/fileCache14253298021558886057.tmp'
17:06:58.117 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=96ms
17:06:58.596 DEBUG: Unpacking plugin cssfamily
17:06:59.062 DEBUG: Download plugin 'web' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6649819379293980080.tmp'
17:06:59.158 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=96ms
17:06:59.160 DEBUG: Unpacking plugin web
17:06:59.239 DEBUG: Download plugin 'plsql' to '/tmp/cache/scanner/.sonar/_tmp/fileCache14793912198686122873.tmp'
17:06:59.335 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=96ms
17:06:59.341 DEBUG: Unpacking plugin plsql
17:06:59.545 DEBUG: Download plugin 'swift' to '/tmp/cache/scanner/.sonar/_tmp/fileCache1741504646164931595.tmp'
17:06:59.640 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=95ms
17:06:59.647 DEBUG: Unpacking plugin swift
17:06:59.875 DEBUG: Download plugin 'tsql' to '/tmp/cache/scanner/.sonar/_tmp/fileCache13326199418297036336.tmp'
17:06:59.969 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=94ms
17:06:59.975 DEBUG: Unpacking plugin tsql
17:07:00.227 DEBUG: Download plugin 'xml' to '/tmp/cache/scanner/.sonar/_tmp/fileCache17507997626889244793.tmp'
17:07:00.323 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=96ms
17:07:00.332 DEBUG: Unpacking plugin xml
17:07:00.563 DEBUG: Download plugin 'vbnet' to '/tmp/cache/scanner/.sonar/_tmp/fileCache10493042263801679656.tmp'
17:07:00.659 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=96ms
17:07:00.673 DEBUG: Unpacking plugin vbnet
17:07:01.060 DEBUG: Download plugin 'security' to '/tmp/cache/scanner/.sonar/_tmp/fileCache9918805438423921394.tmp'
17:07:01.155 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=95ms
17:07:01.169 DEBUG: Unpacking plugin security
17:07:01.416 DEBUG: Download plugin 'securitycsharpfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache11333957031078979675.tmp'
17:07:01.512 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=95ms
17:07:01.518 DEBUG: Unpacking plugin securitycsharpfrontend
17:07:01.546 DEBUG: Download plugin 'securityjsfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache1470972018450306720.tmp'
17:07:01.640 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjsfrontend&acceptCompressions=pack200 | time=94ms
17:07:01.644 DEBUG: Unpacking plugin securityjsfrontend
17:07:01.657 DEBUG: Download plugin 'securityjavafrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2055334173208462890.tmp'
17:07:01.753 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=96ms
17:07:02.239 DEBUG: Unpacking plugin securityjavafrontend
17:07:02.570 DEBUG: Download plugin 'securityphpfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache12754809834829074561.tmp'
17:07:02.664 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=93ms
17:07:02.764 DEBUG: Unpacking plugin securityphpfrontend
17:07:02.861 DEBUG: Download plugin 'securitypythonfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache13198205874386876984.tmp'
17:07:02.957 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitypythonfrontend&acceptCompressions=pack200 | time=96ms
17:07:03.061 DEBUG: Unpacking plugin securitypythonfrontend
17:07:03.170 INFO: Load/download plugins (done) | time=23558ms
17:07:03.395 DEBUG: Plugins:
17:07:03.396 DEBUG: * SonarCSS 1.2.1.1602 (cssfamily)
17:07:03.396 DEBUG: * SonarPLSQL 3.4.1.2576 (plsql)
17:07:03.396 DEBUG: * Scala Code Quality and Security 1.8.0.1775 (sonarscala)
17:07:03.396 DEBUG: * C# Code Quality and Security 8.14.0.22654 (csharp)
17:07:03.396 DEBUG: * Vulnerability Analysis 8.5.0.4829 (security)
17:07:03.396 DEBUG: * Java Code Quality and Security 6.9.0.23563 (java)
17:07:03.396 DEBUG: * SonarHTML 3.2.0.2082 (web)
17:07:03.396 DEBUG: * Flex Code Quality and Security 2.6.0.2294 (flex)
17:07:03.396 DEBUG: * SonarXML 2.0.1.2020 (xml)
17:07:03.396 DEBUG: * VB.NET Code Quality and Security 8.14.0.22654 (vbnet)
17:07:03.396 DEBUG: * SonarSwift 4.2.2.77 (swift)
17:07:03.396 DEBUG: * CFamily Code Quality and Security 6.13.0.22261 (cpp)
17:07:03.396 DEBUG: * Python Code Quality and Security 3.1.0.7619 (python)
17:07:03.396 DEBUG: * Go Code Quality and Security 1.8.0.1775 (go)
17:07:03.396 DEBUG: * JaCoCo 1.1.0.898 (jacoco)
17:07:03.396 DEBUG: * Kotlin Code Quality and Security 1.8.0.1775 (kotlin)
17:07:03.396 DEBUG: * Mercurial 1.1.2 (scmmercurial)
17:07:03.396 DEBUG: * SonarTSQL 1.4.0.3334 (tsql)
17:07:03.396 DEBUG: * Apex Code Quality and Security 1.8.0.1775 (sonarapex)
17:07:03.396 DEBUG: * JavaScript/TypeScript Code Quality and Security 6.6.0.13923 (javascript)
17:07:03.396 DEBUG: * Ruby Code Quality and Security 1.8.0.1775 (ruby)
17:07:03.396 DEBUG: * Vulnerability Rules for C# 8.5.0.4829 (securitycsharpfrontend)
17:07:03.396 DEBUG: * Vulnerability Rules for Java 8.5.0.4829 (securityjavafrontend)
17:07:03.396 DEBUG: * License for SonarLint 8.0.0.13848 (license)
17:07:03.396 DEBUG: * Vulnerability Rules for JS 8.5.0.4829 (securityjsfrontend)
17:07:03.396 DEBUG: * COBOL Code Quality 4.6.0.4639 (cobol)
17:07:03.396 DEBUG: * Vulnerability Rules for Python 8.5.0.4829 (securitypythonfrontend)
17:07:03.396 DEBUG: * Git 1.12.1.2064 (scmgit)
17:07:03.397 DEBUG: * PHP Code Quality and Security 3.11.0.6645 (php)
17:07:03.397 DEBUG: * SonarABAP 3.8.0.2034 (abap)
17:07:03.397 DEBUG: * Vulnerability Rules for PHP 8.5.0.4829 (securityphpfrontend)
17:07:03.420 INFO: Loaded core extensions: developer-scanner
17:07:03.441 DEBUG: Installed core extension: developer-scanner
17:07:03.669 INFO: JavaScript/TypeScript frontend is enabled
17:07:03.838 INFO: Found an active CI vendor: 'CircleCI'
17:07:03.847 INFO: Load project settings for component key: 'api-node-company-management'
17:07:03.945 DEBUG: GET 404 https://sonarcloud.io/api/settings/values.protobuf?component=api-node-company-management | time=97ms
17:07:03.949 INFO: Process project properties
17:07:03.956 DEBUG: Process project properties (done) | time=7ms
17:07:03.957 INFO: Execute project builders
17:07:03.958 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
17:07:03.959 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
17:07:03.960 INFO: Execute project builders (done) | time=3ms
17:07:03.962 INFO: Project key: api-node-company-management
17:07:03.962 INFO: Base dir: /root/project
17:07:03.962 INFO: Working dir: /root/project/.scannerwork
17:07:03.962 DEBUG: Project global encoding: US-ASCII, default locale: en_US
17:07:03.971 DEBUG: Creating module hierarchy
17:07:03.971 DEBUG: Init module 'api-node-company-management'
17:07:03.971 DEBUG: Base dir: /root/project
17:07:03.972 DEBUG: Working dir: /root/project/.scannerwork
17:07:03.972 DEBUG: Module global encoding: US-ASCII, default locale: en_US
17:07:04.072 INFO: Load project branches
17:07:04.168 DEBUG: GET 404 https://sonarcloud.io/api/project_branches/list?project=api-node-company-management | time=96ms
17:07:04.168 DEBUG: Could not process project branches - continuing without it
17:07:04.169 INFO: Load project branches (done) | time=97ms
17:07:04.170 INFO: Check ALM binding of project 'api-node-company-management'
17:07:04.267 DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/is_project_bound?project=api-node-company-management | time=97ms
17:07:04.267 INFO: Detected project binding: NONEXISTENT
17:07:04.268 INFO: Check ALM binding of project 'api-node-company-management' (done) | time=98ms
17:07:04.269 INFO: Load project pull requests
17:07:04.366 DEBUG: GET 404 https://sonarcloud.io/api/project_pull_requests/list?project=api-node-company-management | time=97ms
17:07:04.366 DEBUG: Could not process project pull requests - continuing without it
17:07:04.367 INFO: Load project pull requests (done) | time=98ms
17:07:04.369 INFO: Load branch configuration
17:07:04.370 INFO: Auto-configuring branch master
17:07:04.378 INFO: ------------------------------------------------------------------------
17:07:04.378 INFO: EXECUTION FAILURE
17:07:04.378 INFO: ------------------------------------------------------------------------
17:07:04.379 INFO: Total time: 28.582s
17:07:04.404 INFO: Final Memory: 6M/24M
17:07:04.404 INFO: ------------------------------------------------------------------------
17:07:04.404 ERROR: Error during SonarQube Scanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:121)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:126)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at com.sun.proxy.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:185)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:137)
at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:49)
... 34 more
Caused by: Could not find a default branch to fall back on.
17:07:04.405 ERROR:
17:07:04.405 ERROR: Re-run SonarQube Scanner using the -X switch to enable full debug logging.
Exited with code exit status 1```
* Steps to reproduce
simply use the orb
* Potential workaround
none