SonarCloud CircleCI Orb Integration Error: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore

Only happens when I try to create a project, that doesn’t already exist, using CircleCI… if I create the project using my Mac (using this package: https://github.com/syngenta-digital/scs-node, which uses your npm sonqube-scanner), it works. not sure what is going on.

  • ALM used: GitHub
  • CI system used: Circle CI
  • Scanner command used when applicable: sonarcloud/scan (circleci step)
  • Languages of the repository: Javascript (node)
  • properties file:
sonar.projectName = api-node-company-management
sonar.projectVersion = 1.0
sonar.sources = application
sonar.tests = test
sonar.scm.provider = git
sonar.verbose = true
sonar.organization = syngenta-dpe-usco
sonar.links.scm = git+https://github.com/syngenta-digitial/api-node-company-management.git
  • Error observed
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed

  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
  2 40.4M    2  864k    0     0   760k      0  0:00:54  0:00:01  0:00:53  759k
 40 40.4M   40 16.5M    0     0  7953k      0  0:00:05  0:00:02  0:00:03 7951k
 81 40.4M   81 32.9M    0     0  10.5M      0  0:00:03  0:00:03 --:--:-- 10.5M
100 40.4M  100 40.4M    0     0  11.1M      0  0:00:03  0:00:03 --:--:-- 11.1M
INFO: Scanner configuration file: /tmp/cache/scanner/sonar-scanner-4.1.0.1829-linux/conf/sonar-scanner.properties
INFO: Project root configuration file: /root/project/sonar-project.properties
17:06:35.842 INFO: SonarQube Scanner 4.1.0.1829
17:06:35.843 INFO: Java 11.0.3 AdoptOpenJDK (64-bit)
17:06:35.843 INFO: Linux 4.15.0-1077-aws amd64
17:06:35.942 DEBUG: keyStore is : 
17:06:35.943 DEBUG: keyStore type is : pkcs12
17:06:35.943 DEBUG: keyStore provider is : 
17:06:35.943 DEBUG: init keystore
17:06:35.943 DEBUG: init keymanager of type SunX509
17:06:36.031 DEBUG: Create: /tmp/cache/scanner/.sonar/cache
17:06:36.032 INFO: User cache: /tmp/cache/scanner/.sonar/cache
17:06:36.032 DEBUG: Create: /tmp/cache/scanner/.sonar/cache/_tmp
17:06:36.035 DEBUG: Extract sonar-scanner-api-batch in temp...
17:06:36.039 DEBUG: Get bootstrap index...
17:06:36.039 DEBUG: Download: https://sonarcloud.io/batch/index
17:06:36.812 DEBUG: Get bootstrap completed
17:06:36.817 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.13848-all.jar to /tmp/cache/scanner/.sonar/cache/_tmp/fileCache17178537368925388189.tmp
17:06:38.607 DEBUG: Create isolated classloader...
17:06:38.614 DEBUG: Start temp cleaning...
17:06:38.616 DEBUG: Temp cleaning done
17:06:38.617 DEBUG: Execution getVersion
17:06:38.625 INFO: SonarQube server 8.0.0
17:06:38.626 INFO: Default locale: "en_US", source code encoding: "US-ASCII" (analysis is platform dependent)
17:06:38.626 DEBUG: Work directory: /root/project/.scannerwork
17:06:38.628 DEBUG: Execution execute
17:06:38.847 DEBUG: SonarCloud 8.0.0.13848
17:06:39.040 INFO: Load global settings
17:06:39.590 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=549ms
17:06:39.600 INFO: Load global settings (done) | time=559ms
17:06:39.605 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
17:06:39.608 DEBUG: Create : /tmp/cache/scanner/.sonar/_tmp
17:06:39.609 INFO: User cache: /tmp/cache/scanner/.sonar/cache
17:06:39.612 INFO: Load/download plugins
17:06:39.612 INFO: Load plugins index
17:06:39.714 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=102ms
17:06:39.748 INFO: Load plugins index (done) | time=136ms
17:06:39.750 DEBUG: Download plugin 'sonarapex' to '/tmp/cache/scanner/.sonar/_tmp/fileCache16317107395610830399.tmp'
17:06:39.844 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=94ms
17:06:40.475 DEBUG: Unpacking plugin sonarapex
17:06:40.902 DEBUG: Download plugin 'csharp' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2789726407385358078.tmp'
17:06:40.997 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=94ms
17:06:41.206 DEBUG: Unpacking plugin csharp
17:06:41.638 DEBUG: Download plugin 'cpp' to '/tmp/cache/scanner/.sonar/_tmp/fileCache13955502846565065788.tmp'
17:06:41.733 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=95ms
17:06:43.454 DEBUG: Unpacking plugin cpp
17:06:44.746 DEBUG: Download plugin 'cobol' to '/tmp/cache/scanner/.sonar/_tmp/fileCache17103299294626432130.tmp'
17:06:44.842 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=96ms
17:06:44.856 DEBUG: Unpacking plugin cobol
17:06:45.282 DEBUG: Download plugin 'flex' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6270022828351590508.tmp'
17:06:45.389 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=107ms
17:06:45.394 DEBUG: Unpacking plugin flex
17:06:45.594 DEBUG: Download plugin 'scmgit' to '/tmp/cache/scanner/.sonar/_tmp/fileCache5677453251867532497.tmp'
17:06:45.689 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=95ms
17:06:45.698 DEBUG: Unpacking plugin scmgit
17:06:46.009 DEBUG: Download plugin 'go' to '/tmp/cache/scanner/.sonar/_tmp/fileCache7759962197510734395.tmp'
17:06:46.105 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=96ms
17:06:46.400 DEBUG: Unpacking plugin go
17:06:47.123 DEBUG: Download plugin 'jacoco' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6746728538640832489.tmp'
17:06:47.220 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=97ms
17:06:47.221 DEBUG: Unpacking plugin jacoco
17:06:47.233 DEBUG: Download plugin 'java' to '/tmp/cache/scanner/.sonar/_tmp/fileCache15590487740839222813.tmp'
17:06:47.332 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=97ms
17:06:47.713 DEBUG: Unpacking plugin java
17:06:49.636 DEBUG: Download plugin 'javascript' to '/tmp/cache/scanner/.sonar/_tmp/fileCache9421092201532966548.tmp'
17:06:49.733 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=97ms
17:06:50.697 DEBUG: Unpacking plugin javascript
17:06:51.679 DEBUG: Download plugin 'kotlin' to '/tmp/cache/scanner/.sonar/_tmp/fileCache1205414412569574493.tmp'
17:06:51.775 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=96ms
17:06:51.966 DEBUG: Unpacking plugin kotlin
17:06:52.806 DEBUG: Download plugin 'license' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2857125737187261961.tmp'
17:06:52.902 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=96ms
17:06:52.903 DEBUG: Unpacking plugin license
17:06:52.906 DEBUG: Download plugin 'scmmercurial' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6032134714489628126.tmp'
17:06:53.005 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=99ms
17:06:53.005 DEBUG: Unpacking plugin scmmercurial
17:06:53.009 DEBUG: Download plugin 'php' to '/tmp/cache/scanner/.sonar/_tmp/fileCache12721328174844306048.tmp'
17:06:53.104 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=95ms
17:06:53.119 DEBUG: Unpacking plugin php
17:06:53.649 DEBUG: Download plugin 'python' to '/tmp/cache/scanner/.sonar/_tmp/fileCache16943809862540768841.tmp'
17:06:53.746 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=97ms
17:06:53.762 DEBUG: Unpacking plugin python
17:06:54.187 DEBUG: Download plugin 'ruby' to '/tmp/cache/scanner/.sonar/_tmp/fileCache14034468011738629614.tmp'
17:06:54.281 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=94ms
17:06:54.482 DEBUG: Unpacking plugin ruby
17:06:55.873 DEBUG: Download plugin 'sonarscala' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2333219299990628285.tmp'
17:06:55.993 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=120ms
17:06:56.484 DEBUG: Unpacking plugin sonarscala
17:06:57.773 DEBUG: Download plugin 'abap' to '/tmp/cache/scanner/.sonar/_tmp/fileCache10116994709806504389.tmp'
17:06:57.869 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=96ms
17:06:57.876 DEBUG: Unpacking plugin abap
17:06:58.020 DEBUG: Download plugin 'cssfamily' to '/tmp/cache/scanner/.sonar/_tmp/fileCache14253298021558886057.tmp'
17:06:58.117 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=96ms
17:06:58.596 DEBUG: Unpacking plugin cssfamily
17:06:59.062 DEBUG: Download plugin 'web' to '/tmp/cache/scanner/.sonar/_tmp/fileCache6649819379293980080.tmp'
17:06:59.158 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=96ms
17:06:59.160 DEBUG: Unpacking plugin web
17:06:59.239 DEBUG: Download plugin 'plsql' to '/tmp/cache/scanner/.sonar/_tmp/fileCache14793912198686122873.tmp'
17:06:59.335 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=96ms
17:06:59.341 DEBUG: Unpacking plugin plsql
17:06:59.545 DEBUG: Download plugin 'swift' to '/tmp/cache/scanner/.sonar/_tmp/fileCache1741504646164931595.tmp'
17:06:59.640 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=95ms
17:06:59.647 DEBUG: Unpacking plugin swift
17:06:59.875 DEBUG: Download plugin 'tsql' to '/tmp/cache/scanner/.sonar/_tmp/fileCache13326199418297036336.tmp'
17:06:59.969 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=94ms
17:06:59.975 DEBUG: Unpacking plugin tsql
17:07:00.227 DEBUG: Download plugin 'xml' to '/tmp/cache/scanner/.sonar/_tmp/fileCache17507997626889244793.tmp'
17:07:00.323 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=96ms
17:07:00.332 DEBUG: Unpacking plugin xml
17:07:00.563 DEBUG: Download plugin 'vbnet' to '/tmp/cache/scanner/.sonar/_tmp/fileCache10493042263801679656.tmp'
17:07:00.659 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=96ms
17:07:00.673 DEBUG: Unpacking plugin vbnet
17:07:01.060 DEBUG: Download plugin 'security' to '/tmp/cache/scanner/.sonar/_tmp/fileCache9918805438423921394.tmp'
17:07:01.155 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=95ms
17:07:01.169 DEBUG: Unpacking plugin security
17:07:01.416 DEBUG: Download plugin 'securitycsharpfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache11333957031078979675.tmp'
17:07:01.512 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=95ms
17:07:01.518 DEBUG: Unpacking plugin securitycsharpfrontend
17:07:01.546 DEBUG: Download plugin 'securityjsfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache1470972018450306720.tmp'
17:07:01.640 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjsfrontend&acceptCompressions=pack200 | time=94ms
17:07:01.644 DEBUG: Unpacking plugin securityjsfrontend
17:07:01.657 DEBUG: Download plugin 'securityjavafrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache2055334173208462890.tmp'
17:07:01.753 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=96ms
17:07:02.239 DEBUG: Unpacking plugin securityjavafrontend
17:07:02.570 DEBUG: Download plugin 'securityphpfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache12754809834829074561.tmp'
17:07:02.664 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=93ms
17:07:02.764 DEBUG: Unpacking plugin securityphpfrontend
17:07:02.861 DEBUG: Download plugin 'securitypythonfrontend' to '/tmp/cache/scanner/.sonar/_tmp/fileCache13198205874386876984.tmp'
17:07:02.957 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitypythonfrontend&acceptCompressions=pack200 | time=96ms
17:07:03.061 DEBUG: Unpacking plugin securitypythonfrontend
17:07:03.170 INFO: Load/download plugins (done) | time=23558ms
17:07:03.395 DEBUG: Plugins:
17:07:03.396 DEBUG:   * SonarCSS 1.2.1.1602 (cssfamily)
17:07:03.396 DEBUG:   * SonarPLSQL 3.4.1.2576 (plsql)
17:07:03.396 DEBUG:   * Scala Code Quality and Security 1.8.0.1775 (sonarscala)
17:07:03.396 DEBUG:   * C# Code Quality and Security 8.14.0.22654 (csharp)
17:07:03.396 DEBUG:   * Vulnerability Analysis 8.5.0.4829 (security)
17:07:03.396 DEBUG:   * Java Code Quality and Security 6.9.0.23563 (java)
17:07:03.396 DEBUG:   * SonarHTML 3.2.0.2082 (web)
17:07:03.396 DEBUG:   * Flex Code Quality and Security 2.6.0.2294 (flex)
17:07:03.396 DEBUG:   * SonarXML 2.0.1.2020 (xml)
17:07:03.396 DEBUG:   * VB.NET Code Quality and Security 8.14.0.22654 (vbnet)
17:07:03.396 DEBUG:   * SonarSwift 4.2.2.77 (swift)
17:07:03.396 DEBUG:   * CFamily Code Quality and Security 6.13.0.22261 (cpp)
17:07:03.396 DEBUG:   * Python Code Quality and Security 3.1.0.7619 (python)
17:07:03.396 DEBUG:   * Go Code Quality and Security 1.8.0.1775 (go)
17:07:03.396 DEBUG:   * JaCoCo 1.1.0.898 (jacoco)
17:07:03.396 DEBUG:   * Kotlin Code Quality and Security 1.8.0.1775 (kotlin)
17:07:03.396 DEBUG:   * Mercurial 1.1.2 (scmmercurial)
17:07:03.396 DEBUG:   * SonarTSQL 1.4.0.3334 (tsql)
17:07:03.396 DEBUG:   * Apex Code Quality and Security 1.8.0.1775 (sonarapex)
17:07:03.396 DEBUG:   * JavaScript/TypeScript Code Quality and Security 6.6.0.13923 (javascript)
17:07:03.396 DEBUG:   * Ruby Code Quality and Security 1.8.0.1775 (ruby)
17:07:03.396 DEBUG:   * Vulnerability Rules for C# 8.5.0.4829 (securitycsharpfrontend)
17:07:03.396 DEBUG:   * Vulnerability Rules for Java 8.5.0.4829 (securityjavafrontend)
17:07:03.396 DEBUG:   * License for SonarLint 8.0.0.13848 (license)
17:07:03.396 DEBUG:   * Vulnerability Rules for JS 8.5.0.4829 (securityjsfrontend)
17:07:03.396 DEBUG:   * COBOL Code Quality 4.6.0.4639 (cobol)
17:07:03.396 DEBUG:   * Vulnerability Rules for Python 8.5.0.4829 (securitypythonfrontend)
17:07:03.396 DEBUG:   * Git 1.12.1.2064 (scmgit)
17:07:03.397 DEBUG:   * PHP Code Quality and Security 3.11.0.6645 (php)
17:07:03.397 DEBUG:   * SonarABAP 3.8.0.2034 (abap)
17:07:03.397 DEBUG:   * Vulnerability Rules for PHP 8.5.0.4829 (securityphpfrontend)
17:07:03.420 INFO: Loaded core extensions: developer-scanner
17:07:03.441 DEBUG: Installed core extension: developer-scanner
17:07:03.669 INFO: JavaScript/TypeScript frontend is enabled
17:07:03.838 INFO: Found an active CI vendor: 'CircleCI'
17:07:03.847 INFO: Load project settings for component key: 'api-node-company-management'
17:07:03.945 DEBUG: GET 404 https://sonarcloud.io/api/settings/values.protobuf?component=api-node-company-management | time=97ms
17:07:03.949 INFO: Process project properties
17:07:03.956 DEBUG: Process project properties (done) | time=7ms
17:07:03.957 INFO: Execute project builders
17:07:03.958 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
17:07:03.959 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
17:07:03.960 INFO: Execute project builders (done) | time=3ms
17:07:03.962 INFO: Project key: api-node-company-management
17:07:03.962 INFO: Base dir: /root/project
17:07:03.962 INFO: Working dir: /root/project/.scannerwork
17:07:03.962 DEBUG: Project global encoding: US-ASCII, default locale: en_US
17:07:03.971 DEBUG: Creating module hierarchy
17:07:03.971 DEBUG:   Init module 'api-node-company-management'
17:07:03.971 DEBUG:     Base dir: /root/project
17:07:03.972 DEBUG:     Working dir: /root/project/.scannerwork
17:07:03.972 DEBUG:     Module global encoding: US-ASCII, default locale: en_US
17:07:04.072 INFO: Load project branches
17:07:04.168 DEBUG: GET 404 https://sonarcloud.io/api/project_branches/list?project=api-node-company-management | time=96ms
17:07:04.168 DEBUG: Could not process project branches - continuing without it
17:07:04.169 INFO: Load project branches (done) | time=97ms
17:07:04.170 INFO: Check ALM binding of project 'api-node-company-management'
17:07:04.267 DEBUG: GET 404 https://sonarcloud.io/api/alm_integration/is_project_bound?project=api-node-company-management | time=97ms
17:07:04.267 INFO: Detected project binding: NONEXISTENT
17:07:04.268 INFO: Check ALM binding of project 'api-node-company-management' (done) | time=98ms
17:07:04.269 INFO: Load project pull requests
17:07:04.366 DEBUG: GET 404 https://sonarcloud.io/api/project_pull_requests/list?project=api-node-company-management | time=97ms
17:07:04.366 DEBUG: Could not process project pull requests - continuing without it
17:07:04.367 INFO: Load project pull requests (done) | time=98ms
17:07:04.369 INFO: Load branch configuration
17:07:04.370 INFO: Auto-configuring branch master
17:07:04.378 INFO: ------------------------------------------------------------------------
17:07:04.378 INFO: EXECUTION FAILURE
17:07:04.378 INFO: ------------------------------------------------------------------------
17:07:04.379 INFO: Total time: 28.582s
17:07:04.404 INFO: Final Memory: 6M/24M
17:07:04.404 INFO: ------------------------------------------------------------------------
17:07:04.404 ERROR: Error during SonarQube Scanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
	at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
	at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
	at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:121)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:126)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
	at java.base/java.lang.reflect.Method.invoke(Unknown Source)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at com.sun.proxy.$Proxy0.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:185)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:137)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
	at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
	at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:49)
	... 34 more
Caused by: Could not find a default branch to fall back on.
17:07:04.405 ERROR: 
17:07:04.405 ERROR: Re-run SonarQube Scanner using the -X switch to enable full debug logging.

Exited with code exit status 1```
* Steps to reproduce
simply use the orb
* Potential workaround
none

Hi,

Creating projects with the first analysis is not a well supported use case.
It is plan for removal in the near future. You should create your projects from SonarCloud UI.

Best,

I’m facing the same issue when using CircleCI orb. I tried to create the project manually and the same 40X codes appear as well.

When hitting the same endpoints via curl, they return a success.

Any updates on that?