[SonarCloud/Scanner] Error: Unable to run check class org.sonar.java.se.SymbolicExecutionVisitor

  • ALM used: GitHub
  • CI system used: Github Action
  • Scanner command used when applicable: mvn -B verify sonar:sonar -Dsonar.projectKey=philippefichet_asciidoc4netbeans -Dsonar.java.fileByFile=true
  • Languages of the repository: Java
  • Only if the SonarCloud project is public, the URL: SonarCloud
  • Error observed : https://github.com/philippefichet/asciidoc4netbeans/actions/runs/6867040653/job/18674574602?pr=8
  • Steps to reproduce : Relaunch github action
  • Potential workaround : None to my knowledge

On my open source project (asciidoc4netbeans)[GitHub - philippefichet/asciidoc4netbeans: Asciidoc for netbeans], when running sonar analysis via github actions, I get a lot of errors:

[INFO] --- sonar-maven-plugin:3.10.0.2594:sonar (default-cli) @ asciidoc4netbeans ---
[INFO] User cache: /home/runner/.sonar/cache
[INFO] SonarQube version: 8.0.0.50401
[INFO] Default locale: "en", source code encoding: "UTF-8"
[INFO] Load global settings
[INFO] Load global settings (done) | time=226ms
[INFO] Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
[INFO] User cache: /home/runner/.sonar/cache
[INFO] Loading required plugins
[INFO] Load plugins index
[INFO] Load plugins index (done) | time=245ms
[INFO] Load/download plugins
[INFO] Load/download plugins (done) | time=38ms
[INFO] Loaded core extensions: developer-scanner
[INFO] Found an active CI vendor: 'Github Actions'
[INFO] Load project settings for component key: 'philippefichet_asciidoc4netbeans'
[INFO] Load project settings for component key: 'philippefichet_asciidoc4netbeans' (done) | time=191ms
[INFO] Process project properties
[INFO] Execute project builders
[INFO] Execute project builders (done) | time=1ms
[INFO] Project key: philippefichet_asciidoc4netbeans
[INFO] Base dir: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans
[INFO] Working dir: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar
[INFO] Load project branches
[INFO] Load project branches (done) | time=195ms
[INFO] Check ALM binding of project 'philippefichet_asciidoc4netbeans'
[INFO] Detected project binding: BOUND
[INFO] Check ALM binding of project 'philippefichet_asciidoc4netbeans' (done) | time=185ms
[INFO] Load project pull requests
[INFO] Load project pull requests (done) | time=204ms
[INFO] Load branch configuration
[INFO] Github event: pull_request
[INFO] Auto-configuring pull request 8
[INFO] Load branch configuration (done) | time=727ms
[INFO] Load quality profiles
[INFO] Load quality profiles (done) | time=263ms
[INFO] Load active rules
[INFO] Load active rules (done) | time=8746ms
[INFO] Organization key: philippefichet
[INFO] Pull request 8 for merge into main from github-update-workflow
[INFO] Preprocessing files...
[INFO] 2 languages detected in 18 preprocessed files
[INFO] 0 files ignored because of inclusion/exclusion patterns
[INFO] 0 files ignored because of scm ignore settings
[INFO] Loading plugins for detected languages
[INFO] Load/download plugins
[INFO] Load/download plugins (done) | time=9ms
[INFO] Load project repositories
[INFO] Load project repositories (done) | time=201ms
[INFO] SCM collecting changed files in the branch
[INFO] SCM collecting changed files in the branch (done) | time=132ms
[INFO] Indexing files...
[INFO] Project configuration:
[INFO]   Excluded sources: **/build-wrapper-dump.json
[INFO] 18 files indexed
[INFO] Quality profile for java: Sonar way
[INFO] Quality profile for xml: Sonar way
[INFO] ------------- Run sensors on module Asciidoc for Netbeans
[INFO] Load metrics repository
[INFO] Load metrics repository (done) | time=176ms
[INFO] Sensor cache enabled
[INFO] Load sensor cache
[INFO] Load sensor cache (140 KB) | time=1163ms
[INFO] Sensor JavaSensor [java]
[INFO] Configured Java source version (sonar.java.source): 11, preview features enabled (sonar.java.enablePreview): false
[INFO] The Java analyzer is running in a context where unchanged files can be skipped. Full analysis is performed for changed files, optimized analysis for unchanged files.
[INFO] Server-side caching is enabled. The Java analyzer was able to leverage cached data from previous analyses for 2 out of 16 files. These files will not be parsed.
[INFO] 14 source files to be analyzed
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javafx.scene.Node.ReadOnlyObjectWrapperManualFire
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javafx.scene.layout.Region.InsetsProperty
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javafx.scene.layout.BorderPane.BorderPositionProperty
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javafx.scene.Scene.DirtyBits
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javafx.scene.web.WebEngine.PageLoadListener
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.openide.util.NbBundle.Messages
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javafx.beans.binding.StringBinding
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.openide.nodes.Node.Property
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.openide.util.Lookup.Item
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.asciidoctor.jruby.AsciidoctorJRuby.Factory
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type io.jooby.Router.Match
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(1462) Type java.lang.Exception is indirectly referenced from required .class files but cannot be resolved since the declaring package java.lang exported from module java.base conflicts with a package accessible from module <unnamed>
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(1462) Type java.lang.Exception is indirectly referenced from required .class files but cannot be resolved since the declaring package java.lang exported from module java.base conflicts with a package accessible from module <unnamed>
Error:  Unable to run check class org.sonar.java.se.SymbolicExecutionVisitor -  on file 'src/main/java/com/github/philippefichet/asciidoc4netbeans/server/HttpServer.java', To help improve the SonarSource Java Analyzer, please report this problem to SonarSource: see https://community.sonarsource.com/
org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type javax.annotation.meta.When
	at org.eclipse.jdt.internal.compiler.problem.ProblemHandler.handle(ProblemHandler.java:162)
	at org.eclipse.jdt.internal.compiler.problem.ProblemHandler.handle(ProblemHandler.java:229)
	at org.eclipse.jdt.internal.compiler.problem.ProblemReporter.handle(ProblemReporter.java:2679)
	at org.eclipse.jdt.internal.compiler.problem.ProblemReporter.isClassPathCorrect(ProblemReporter.java:5167)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.getTypeFromCompoundName(LookupEnvironment.java:1794)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.getTypeFromConstantPoolName(LookupEnvironment.java:1824)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.getTypeFromConstantPoolName(LookupEnvironment.java:1832)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.getTypeFromSignature(LookupEnvironment.java:1902)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.createMethod(BinaryTypeBinding.java:1001)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.createMethods(BinaryTypeBinding.java:1226)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.cachePartsFrom(BinaryTypeBinding.java:618)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.createBinaryTypeFrom(LookupEnvironment.java:1058)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.createBinaryTypeFrom(LookupEnvironment.java:1039)
	at org.eclipse.jdt.internal.compiler.Compiler.accept(Compiler.java:308)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.askForType(LookupEnvironment.java:260)
	at org.eclipse.jdt.internal.compiler.lookup.UnresolvedReferenceBinding.resolve(UnresolvedReferenceBinding.java:116)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.resolveType(BinaryTypeBinding.java:251)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.convertMemberValue(BinaryTypeBinding.java:153)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.createMethod(BinaryTypeBinding.java:1139)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.createMethods(BinaryTypeBinding.java:1215)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.cachePartsFrom(BinaryTypeBinding.java:618)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.createBinaryTypeFrom(LookupEnvironment.java:1058)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.createBinaryTypeFrom(LookupEnvironment.java:1039)
	at org.eclipse.jdt.internal.compiler.Compiler.accept(Compiler.java:308)
	at org.eclipse.jdt.internal.compiler.lookup.LookupEnvironment.askForType(LookupEnvironment.java:260)
	at org.eclipse.jdt.internal.compiler.lookup.UnresolvedReferenceBinding.resolve(UnresolvedReferenceBinding.java:116)
	at org.eclipse.jdt.internal.compiler.lookup.BinaryTypeBinding.resolveType(BinaryTypeBinding.java:251)
	at org.eclipse.jdt.internal.compiler.lookup.UnresolvedAnnotationBinding.resolve(UnresolvedAnnotationBinding.java:31)
	at org.eclipse.jdt.internal.compiler.lookup.UnresolvedAnnotationBinding.getAnnotationType(UnresolvedAnnotationBinding.java:41)
	at org.eclipse.jdt.core.dom.DefaultBindingResolver.getAnnotationInstance(DefaultBindingResolver.java:557)
	at org.eclipse.jdt.core.dom.MethodBinding.getParameterAnnotations(MethodBinding.java:171)
	at org.sonar.java.model.JVariableSymbol$ParameterPlaceholderSymbol.<init>(JVariableSymbol.java:63)
	at org.sonar.java.model.JMethodSymbol.declarationParameters(JMethodSymbol.java:96)
	at org.sonar.java.se.checks.ParameterNullnessCheck.checkParameters(ParameterNullnessCheck.java:80)
	at org.sonar.java.se.checks.ParameterNullnessCheck.checkPreStatement(ParameterNullnessCheck.java:62)
	at org.sonar.java.se.CheckerDispatcher.executeCheckPreStatement(CheckerDispatcher.java:62)
	at org.sonar.java.se.ExplodedGraphWalker.visit(ExplodedGraphWalker.java:656)
	at org.sonar.java.se.ExplodedGraphWalker.execute(ExplodedGraphWalker.java:262)
	at org.sonar.java.se.ExplodedGraphWalker.visitMethod(ExplodedGraphWalker.java:219)
	at org.sonar.java.se.ExplodedGraphWalker.visitMethod(ExplodedGraphWalker.java:211)
	at org.sonar.java.se.SymbolicExecutionVisitor.execute(SymbolicExecutionVisitor.java:79)
	at org.sonar.java.se.SymbolicExecutionVisitor.visitNode(SymbolicExecutionVisitor.java:65)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.visit(SubscriptionVisitor.java:100)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.visitChildren(SubscriptionVisitor.java:125)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.visit(SubscriptionVisitor.java:102)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.visitChildren(SubscriptionVisitor.java:125)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.visit(SubscriptionVisitor.java:102)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.scanTree(SubscriptionVisitor.java:83)
	at org.sonar.java.ast.visitors.SubscriptionVisitor.scanFile(SubscriptionVisitor.java:69)
	at org.sonar.java.se.SymbolicExecutionVisitor.scanFile(SymbolicExecutionVisitor.java:55)
	at org.sonar.java.model.VisitorsBridge.lambda$runScanner$1(VisitorsBridge.java:260)
	at org.sonar.java.model.VisitorsBridge.runScanner(VisitorsBridge.java:265)
	at org.sonar.java.model.VisitorsBridge.runScanner(VisitorsBridge.java:260)
	at org.sonar.java.model.VisitorsBridge.visitFile(VisitorsBridge.java:243)
	at org.sonar.java.ast.JavaAstScanner.simpleScan(JavaAstScanner.java:132)
	at org.sonar.java.ast.JavaAstScanner.lambda$scan$0(JavaAstScanner.java:92)
	at org.sonar.java.model.JParserConfig$FileByFile.parse(JParserConfig.java:274)
	at org.sonar.java.model.JParserConfig$FileByFile.parse(JParserConfig.java:249)
	at org.sonar.java.ast.JavaAstScanner.scan(JavaAstScanner.java:89)
	at org.sonar.java.JavaFrontend.scanAndMeasureTask(JavaFrontend.java:410)
	at org.sonar.java.JavaFrontend.scan(JavaFrontend.java:163)
	at org.sonar.plugins.java.JavaSensor.execute(JavaSensor.java:115)
	at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:62)
	at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:75)
	at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:48)
	at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:66)
	at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:48)
	at org.sonar.scanner.scan.ModuleScanContainer.doAfterStart(ModuleScanContainer.java:64)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.scan.ProjectScanContainer.scan(ProjectScanContainer.java:180)
	at org.sonar.scanner.scan.ProjectScanContainer.scanRecursively(ProjectScanContainer.java:176)
	at org.sonar.scanner.scan.ProjectScanContainer.doAfterStart(ProjectScanContainer.java:147)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.ScannerContainer.doAfterStart(ScannerContainer.java:398)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
	at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:123)
	at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:109)
	at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:57)
	at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:51)
	at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
	at jdk.proxy6/jdk.proxy6.$Proxy37.execute(Unknown Source)
	at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
	at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
	at org.sonarsource.scanner.maven.bootstrap.ScannerBootstrapper.execute(ScannerBootstrapper.java:64)
	at org.sonarsource.scanner.maven.SonarQubeMojo.execute(SonarQubeMojo.java:108)
	at org.apache.maven.plugin.DefaultBuildPluginManager.executeMojo(DefaultBuildPluginManager.java:137)
	at org.apache.maven.lifecycle.internal.MojoExecutor.doExecute2(MojoExecutor.java:370)
	at org.apache.maven.lifecycle.internal.MojoExecutor.doExecute(MojoExecutor.java:351)
	at org.apache.maven.lifecycle.internal.MojoExecutor.execute(MojoExecutor.java:215)
	at org.apache.maven.lifecycle.internal.MojoExecutor.execute(MojoExecutor.java:171)
	at org.apache.maven.lifecycle.internal.MojoExecutor.execute(MojoExecutor.java:163)
	at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject(LifecycleModuleBuilder.java:117)
	at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject(LifecycleModuleBuilder.java:81)
	at org.apache.maven.lifecycle.internal.builder.singlethreaded.SingleThreadedBuilder.build(SingleThreadedBuilder.java:56)
	at org.apache.maven.lifecycle.internal.LifecycleStarter.execute(LifecycleStarter.java:128)
	at org.apache.maven.DefaultMaven.doExecute(DefaultMaven.java:299)
	at org.apache.maven.DefaultMaven.doExecute(DefaultMaven.java:193)
	at org.apache.maven.DefaultMaven.execute(DefaultMaven.java:106)
	at org.apache.maven.cli.MavenCli.execute(MavenCli.java:963)
	at org.apache.maven.cli.MavenCli.doMain(MavenCli.java:296)
	at org.apache.maven.cli.MavenCli.main(MavenCli.java:199)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.codehaus.plexus.classworlds.launcher.Launcher.launchEnhanced(Launcher.java:282)
	at org.codehaus.plexus.classworlds.launcher.Launcher.launch(Launcher.java:225)
	at org.codehaus.plexus.classworlds.launcher.Launcher.mainWithExitCode(Launcher.java:406)
	at org.codehaus.plexus.classworlds.launcher.Launcher.main(Launcher.java:347)

Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.netbeans.Module.PackageExport
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.openide.util.Utilities.NamesAndValues
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve superclass org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.util.Task
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve interfaces org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.util.Cancellable
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.loaders.DataObject.Replace
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.loaders.MultiDataObject.EmptyRecognizer
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.String cannot be resolved. It is indirectly referenced from required type org.openide.filesystems.FileUtil.NonCanonicalizingFile
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.DialogDisplayer.Trivial
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.NotifyDescriptor.Message
Status ERROR: org.eclipse.jdt.core code=4 Could not retrieve declared methods org.eclipse.jdt.internal.compiler.problem.AbortCompilation: Pb(347) The type java.lang.Object cannot be resolved. It is indirectly referenced from required type org.openide.cookies.EditorCookie.Observable
[INFO] 14/14 source files have been analyzed
[INFO] Optimized analysis for 14 of 14 files.
Warning:  Unresolved imports/types have been detected during analysis. Enable DEBUG mode to see them.
Warning:  Use of preview features have been detected during analysis. Enable DEBUG mode to see them.
[INFO] No "Test" source files to scan.
[INFO] No "Generated" source files to scan.
[INFO] Sensor JavaSensor [java] (done) | time=2923ms
[INFO] Sensor JaCoCo XML Report Importer [jacoco]
[INFO] 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml
[INFO] Importing 1 report(s). Turn your logs in debug mode in order to see the exhaustive list.
[INFO] Sensor JaCoCo XML Report Importer [jacoco] (done) | time=74ms
[INFO] Sensor CSS Rules [javascript]
[INFO] Sensor CSS Rules is restricted to changed files only
[INFO] No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
[INFO] Sensor CSS Rules [javascript] (done) | time=2ms
[INFO] Sensor ThymeLeaf template sensor [securityjavafrontend]
[INFO] Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=2ms
[INFO] Sensor C# Project Type Information [csharp]
[INFO] Sensor C# Project Type Information [csharp] (done) | time=1ms
[INFO] Sensor C# Analysis Log [csharp]
[INFO] Sensor C# Analysis Log [csharp] (done) | time=12ms
[INFO] Sensor C# Properties [csharp]
[INFO] Sensor C# Properties [csharp] (done) | time=0ms
[INFO] Sensor SurefireSensor [java]
[INFO] parsing [/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/surefire-reports]
[INFO] Sensor SurefireSensor [java] (done) | time=25ms
[INFO] Sensor XML Sensor [xml]
[INFO] Sensor XML Sensor is restricted to changed files only
[INFO] Sensor XML Sensor [xml] (done) | time=3ms
[INFO] Sensor TextAndSecretsSensor [text]
[INFO] Sensor TextAndSecretsSensor is restricted to changed files only
[INFO] Sensor TextAndSecretsSensor [text] (done) | time=335ms
[INFO] Sensor VB.NET Project Type Information [vbnet]
[INFO] Sensor VB.NET Project Type Information [vbnet] (done) | time=0ms
[INFO] Sensor VB.NET Analysis Log [vbnet]
[INFO] Sensor VB.NET Analysis Log [vbnet] (done) | time=10ms
[INFO] Sensor VB.NET Properties [vbnet]
[INFO] Sensor VB.NET Properties [vbnet] (done) | time=0ms
[INFO] Sensor IaC Docker Sensor [iac]
[INFO] Sensor IaC Docker Sensor is restricted to changed files only
[INFO] 0 source files to be analyzed
[INFO] 0/0 source files have been analyzed
[INFO] Sensor IaC Docker Sensor [iac] (done) | time=61ms
[INFO] Sensor Serverless configuration file sensor [security]
[INFO] 0 Serverless function entries were found in the project
[INFO] 0 Serverless function handlers were kept as entrypoints
[INFO] Sensor Serverless configuration file sensor [security] (done) | time=2ms
[INFO] Sensor AWS SAM template file sensor [security]
[INFO] Sensor AWS SAM template file sensor [security] (done) | time=1ms
[INFO] Sensor AWS SAM Inline template file sensor [security]
[INFO] Sensor AWS SAM Inline template file sensor [security] (done) | time=1ms
[INFO] Sensor javabugs [dbd]
[INFO] Reading IR files from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ir/java
[INFO] Analyzing 73 functions to detect bugs.
[INFO] Sensor javabugs [dbd] (done) | time=310ms
[INFO] Sensor pythonbugs [dbd]
[INFO] Reading IR files from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ir/python
[INFO] No IR files have been included for analysis.
[INFO] Sensor pythonbugs [dbd] (done) | time=0ms
[INFO] Sensor JavaSecuritySensor [security]
[INFO] Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6384, S6390, S6398, S6399, S6547, S6549
[INFO] Load type hierarchy and UCFGs: Starting
[INFO] Load type hierarchy: Starting
[INFO] Reading type hierarchy from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ucfg2/java
[INFO] Read 203 type definitions
[INFO] Load type hierarchy: Time spent was 00:00:00.058
[INFO] Load UCFGs: Starting
[INFO] Reading UCFGs from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ucfg2/java
[INFO] Load UCFGs: Time spent was 00:00:00.094
[INFO] Load type hierarchy and UCFGs: Time spent was 00:00:00.153
[INFO] Analyzing 79 UCFGs to detect vulnerabilities.
[INFO] Check cache: Starting
[INFO] Load cache: Starting
[INFO] Load cache: Time spent was 00:00:00.000
[INFO] Check cache: Time spent was 00:00:00.000
[INFO] Create runtime call graph: Starting
[INFO] Variable Type Analysis #1: Starting
[INFO] Create runtime type propagation graph: Starting
[INFO] Create runtime type propagation graph: Time spent was 00:00:00.012
[INFO] Run SCC (Tarjan) on 463 nodes: Starting
[INFO] Run SCC (Tarjan) on 463 nodes: Time spent was 00:00:00.001
[INFO] Tarjan found 463 strongly connected components
[INFO] Propagate runtime types to strongly connected components: Starting
[INFO] Propagate runtime types to strongly connected components: Time spent was 00:00:00.003
[INFO] Variable Type Analysis #1: Time spent was 00:00:00.019
[INFO] Variable Type Analysis #2: Starting
[INFO] Create runtime type propagation graph: Starting
[INFO] Create runtime type propagation graph: Time spent was 00:00:00.007
[INFO] Run SCC (Tarjan) on 463 nodes: Starting
[INFO] Run SCC (Tarjan) on 463 nodes: Time spent was 00:00:00.000
[INFO] Tarjan found 463 strongly connected components
[INFO] Propagate runtime types to strongly connected components: Starting
[INFO] Propagate runtime types to strongly connected components: Time spent was 00:00:00.001
[INFO] Variable Type Analysis #2: Time spent was 00:00:00.009
[INFO] Create runtime call graph: Time spent was 00:00:00.032
[INFO] Load config: Starting
[INFO] Load config: Time spent was 00:00:00.888
[INFO] Compute entry points: Starting
[INFO] Compute entry points: Time spent was 00:00:00.711
[INFO] No entry points found.
[INFO] java security sensor: Time spent was 00:00:01.789
[INFO] java security sensor: Begin: 2023-11-14T17:08:14.794499808Z, End: 2023-11-14T17:08:16.583610227Z, Duration: 00:00:01.789
  Load type hierarchy and UCFGs: Begin: 2023-11-14T17:08:14.795885106Z, End: 2023-11-14T17:08:14.949500060Z, Duration: 00:00:00.153
    Load type hierarchy: Begin: 2023-11-14T17:08:14.795942813Z, End: 2023-11-14T17:08:14.854297839Z, Duration: 00:00:00.058
    Load UCFGs: Begin: 2023-11-14T17:08:14.854536455Z, End: 2023-11-14T17:08:14.949236368Z, Duration: 00:00:00.094
  Check cache: Begin: 2023-11-14T17:08:14.949632137Z, End: 2023-11-14T17:08:14.950068292Z, Duration: 00:00:00.000
    Load cache: Begin: 2023-11-14T17:08:14.949656322Z, End: 2023-11-14T17:08:14.949776927Z, Duration: 00:00:00.000
  Create runtime call graph: Begin: 2023-11-14T17:08:14.950163389Z, End: 2023-11-14T17:08:14.982646638Z, Duration: 00:00:00.032
    Variable Type Analysis #1: Begin: 2023-11-14T17:08:14.950668102Z, End: 2023-11-14T17:08:14.970166495Z, Duration: 00:00:00.019
      Create runtime type propagation graph: Begin: 2023-11-14T17:08:14.951513010Z, End: 2023-11-14T17:08:14.963852871Z, Duration: 00:00:00.012
      Run SCC (Tarjan) on 463 nodes: Begin: 2023-11-14T17:08:14.964160676Z, End: 2023-11-14T17:08:14.966109948Z, Duration: 00:00:00.001
      Propagate runtime types to strongly connected components: Begin: 2023-11-14T17:08:14.966273583Z, End: 2023-11-14T17:08:14.970048625Z, Duration: 00:00:00.003
    Variable Type Analysis #2: Begin: 2023-11-14T17:08:14.972186428Z, End: 2023-11-14T17:08:14.982063469Z, Duration: 00:00:00.009
      Create runtime type propagation graph: Begin: 2023-11-14T17:08:14.972231082Z, End: 2023-11-14T17:08:14.979559572Z, Duration: 00:00:00.007
      Run SCC (Tarjan) on 463 nodes: Begin: 2023-11-14T17:08:14.979670068Z, End: 2023-11-14T17:08:14.980596088Z, Duration: 00:00:00.000
      Propagate runtime types to strongly connected components: Begin: 2023-11-14T17:08:14.980716974Z, End: 2023-11-14T17:08:14.981959735Z, Duration: 00:00:00.001
  Load config: Begin: 2023-11-14T17:08:14.982742848Z, End: 2023-11-14T17:08:15.871650993Z, Duration: 00:00:00.888
  Compute entry points: Begin: 2023-11-14T17:08:15.871924394Z, End: 2023-11-14T17:08:16.583234756Z, Duration: 00:00:00.711
[INFO] java security sensor peak memory: 586 MB
[INFO] Sensor JavaSecuritySensor [security] (done) | time=1798ms
[INFO] Sensor CSharpSecuritySensor [security]
[INFO] Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6639, S6641
[INFO] Load type hierarchy and UCFGs: Starting
[INFO] Load type hierarchy: Starting
[INFO] Reading type hierarchy from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/ucfg2/cs
[INFO] Read 0 type definitions
[INFO] Load type hierarchy: Time spent was 00:00:00.000
[INFO] Load UCFGs: Starting
[INFO] Load UCFGs: Time spent was 00:00:00.000
[INFO] Load type hierarchy and UCFGs: Time spent was 00:00:00.000
[INFO] No UCFGs have been included for analysis.
[INFO] csharp security sensor: Time spent was 00:00:00.000
[INFO] Sensor CSharpSecuritySensor [security] (done) | time=1ms
[INFO] Sensor PhpSecuritySensor [security]
[INFO] Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350
[INFO] Load type hierarchy and UCFGs: Starting
[INFO] Load type hierarchy: Starting
[INFO] Reading type hierarchy from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ucfg2/php
[INFO] Read 0 type definitions
[INFO] Load type hierarchy: Time spent was 00:00:00.000
[INFO] Load UCFGs: Starting
[INFO] Load UCFGs: Time spent was 00:00:00.000
[INFO] Load type hierarchy and UCFGs: Time spent was 00:00:00.000
[INFO] No UCFGs have been included for analysis.
[INFO] php security sensor: Time spent was 00:00:00.000
[INFO] Sensor PhpSecuritySensor [security] (done) | time=1ms
[INFO] Sensor PythonSecuritySensor [security]
[INFO] Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350
[INFO] Load type hierarchy and UCFGs: Starting
[INFO] Load type hierarchy: Starting
[INFO] Reading type hierarchy from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ucfg2/python
[INFO] Read 0 type definitions
[INFO] Load type hierarchy: Time spent was 00:00:00.000
[INFO] Load UCFGs: Starting
[INFO] Load UCFGs: Time spent was 00:00:00.000
[INFO] Load type hierarchy and UCFGs: Time spent was 00:00:00.000
[INFO] No UCFGs have been included for analysis.
[INFO] python security sensor: Time spent was 00:00:00.000
[INFO] Sensor PythonSecuritySensor [security] (done) | time=1ms
[INFO] Sensor JsSecuritySensor [security]
[INFO] Enabled taint analysis rules: S3649, S6287, S6350, S2076, S2631, S5696, S5883, S2083, S5146, S5131, S6096, S5147, S6105, S5144, S5334
[INFO] Load type hierarchy and UCFGs: Starting
[INFO] Load type hierarchy: Starting
[INFO] Reading type hierarchy from: /home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar/ucfg2/js
[INFO] Read 0 type definitions
[INFO] Load type hierarchy: Time spent was 00:00:00.000
[INFO] Load UCFGs: Starting
[INFO] Load UCFGs: Time spent was 00:00:00.000
[INFO] Load type hierarchy and UCFGs: Time spent was 00:00:00.000
[INFO] No UCFGs have been included for analysis.
[INFO] js security sensor: Time spent was 00:00:00.000
[INFO] Sensor JsSecuritySensor [security] (done) | time=1ms
[INFO] ------------- Run sensors on project
[INFO] Sensor Analysis Warnings import [csharp]
[INFO] Sensor Analysis Warnings import [csharp] (done) | time=1ms
[INFO] Sensor Zero Coverage Sensor
[INFO] Sensor Zero Coverage Sensor (done) | time=1ms
[INFO] Sensor Java CPD Block Indexer
[INFO] Sensor Java CPD Block Indexer (done) | time=39ms
[INFO] CPD Executor 4 files had no CPD blocks
[INFO] CPD Executor Calculating CPD for 10 files
[INFO] CPD Executor CPD calculation finished (done) | time=8ms
[INFO] SCM writing changed lines
[INFO] SCM writing changed lines (done) | time=4ms
[INFO] Analysis report generated in 2152ms, dir size=246 KB
[INFO] Analysis report compressed in 24ms, zip size=59 KB
[INFO] Analysis report uploaded in 432ms
[INFO] ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=philippefichet_asciidoc4netbeans&pullRequest=8
[INFO] Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
[INFO] More about the report processing at https://sonarcloud.io/api/ce/task?id=AYvOzigz7U3a2WqDdF3-

Hello @philippefichet, welcome to the Sonar Community, and thanks for reporting this issue.

Regarding the errors you get, there are a few things that I want you to check:

  1. Which SDK version are you using to build the project and to run the analysis? Please make sure they are the same version.
  2. Have a look at this post: Java analyzer compile error after upgrading to OpenJDK11. It may be that some of the errors are caused by the “split package” problem, which may be introduced by some dependencies you are using. From the post, a solution may be to set sonar.java.source=8; it may be worth trying.

Besides the errors, I see that the analysis is successful, which is good news!

Small disclaimer: I would not worry about rules based on symbolic execution not working correctly since we’re not maintaining the symbolic execution engine, and a better solution will be available in future versions.

Cheers,
Angelo

Thank you for your answer.

I use github actions and I naively followed the configuration proposed by sonarcloud (SonarCloud).
It seems that in my case (Maven) the JDK of compilation and analysis is the same.
On the other hand, I use Java 11 as the compilation target.
I can see the point of defining sonar.java.source=8.
However, here’s the analysis context:

SonarCloud plugins:
  - Python Code Quality and Security 4.10.0.13725 (python)
  - Dataflow Bug Detection Rules for Python 1.19.0.6564 (dbdpythonfrontend)
  - Dataflow Bug Detection 1.19.0.6564 (dbd)
  - JaCoCo 1.3.0.1538 (jacoco)
  - IaC Code Quality and Security 1.22.0.7057 (iac)
  - Dataflow Bug Detection Rules for Java 1.19.0.6564 (dbdjavafrontend)
  - JavaScript/TypeScript/CSS Code Quality and Security 10.9.0.24449 (javascript)
  - License for SonarLint 8.0.0.50401 (license)
  - C# Code Quality and Security 9.13.0.79967 (csharp)
  - Java Code Quality and Security 7.27.1.33504 (java)
  - XML Code Quality and Security 2.10.0.4108 (xml)
  - PHP Code Quality and Security 3.33.0.11274 (php)
  - Text Code Quality and Security 2.7.0.1366 (text)
  - VB.NET Code Quality and Security 9.13.0.79967 (vbnet)
  - Configuration detection for Code Quality and Security 1.3.0.654 (config)
Project server settings:
  - sonar.abap.file.suffixes=.abap,.ab4,.flow,.asprog
  - sonar.apex.file.suffixes=.cls,.trigger
  - sonar.autoscan.enabled=false
  - sonar.c.file.suffixes=.c,.h
  - sonar.cpp.file.suffixes=.cc,.cpp,.cxx,.c++,.hh,.hpp,.hxx,.h++,.ipp
  - sonar.cs.file.suffixes=.cs,.razor
  - sonar.css.file.suffixes=.css,.less,.scss,.sass
  - sonar.docker.file.patterns=Dockerfile,*.dockerfile
  - sonar.flex.file.suffixes=as
  - sonar.go.file.suffixes=.go
  - sonar.html.file.suffixes=.html,.xhtml,.cshtml,.vbhtml,.aspx,.ascx,.rhtml,.erb,.shtm,.shtml,.cmp,.twig
  - sonar.java.file.suffixes=.java,.jav
  - sonar.javascript.file.suffixes=.js,.jsx,.cjs,.mjs,.vue
  - sonar.json.file.suffixes=.json
  - sonar.jsp.file.suffixes=.jsp,.jspf,.jspx
  - sonar.kotlin.file.suffixes=.kt,.kts
  - sonar.objc.file.suffixes=.m
  - sonar.php.file.suffixes=php,php3,php4,php5,phtml,inc
  - sonar.plsql.file.suffixes=sql,tab,pkb
  - sonar.python.file.suffixes=py
  - sonar.ruby.file.suffixes=.rb
  - sonar.scala.file.suffixes=.scala
  - sonar.swift.file.suffixes=.swift
  - sonar.terraform.file.suffixes=.tf
  - sonar.tsql.file.suffixes=.tsql
  - sonar.typescript.file.suffixes=.ts,.tsx,.cts,.mts
  - sonar.vbnet.file.suffixes=.vb
  - sonar.xml.file.suffixes=.xml,.xsd,.xsl,.config
  - sonar.yaml.file.suffixes=.yaml,.yml
Project scanner properties:
  - sonar.binaries=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/classes
  - sonar.groovy.binaries=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/classes
  - sonar.host.url=https://sonarcloud.io
  - sonar.java.binaries=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/classes
  - sonar.java.enablePreview=false
  - sonar.java.fileByFile=true
  - sonar.java.jdkHome=/opt/hostedtoolcache/Java_Zulu_jdk/17.0.9-9/x64
  - sonar.java.libraries=/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-annotations-common/RELEASE130/org-netbeans-api-annotations-common-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-templates/RELEASE130/org-netbeans-api-templates-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-scripting/RELEASE130/org-netbeans-api-scripting-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-modules-queries/RELEASE130/org-netbeans-modules-queries-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-openide-filesystems/RELEASE130/org-openide-filesystems-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-openide-loaders/RELEASE130/org-openide-loaders-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-progress/RELEASE130/org-netbeans-api-progress-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-progress-nb/RELEASE130/org-netbeans-api-progress-nb-RELEASE1...
  - sonar.java.source=11
  - sonar.java.target=11
  - sonar.java.test.binaries=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/test-classes
  - sonar.java.test.libraries=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/classes,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-annotations-common/RELEASE130/org-netbeans-api-annotations-common-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-templates/RELEASE130/org-netbeans-api-templates-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-scripting/RELEASE130/org-netbeans-api-scripting-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-modules-queries/RELEASE130/org-netbeans-modules-queries-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-openide-filesystems/RELEASE130/org-openide-filesystems-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-openide-loaders/RELEASE130/org-openide-loaders-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-progress/RELEASE130/org-netbeans-api-progress-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netb...
  - sonar.junit.reportPaths=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/surefire-reports
  - sonar.junit.reportsPath=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/surefire-reports
  - sonar.libraries=/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-annotations-common/RELEASE130/org-netbeans-api-annotations-common-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-templates/RELEASE130/org-netbeans-api-templates-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-scripting/RELEASE130/org-netbeans-api-scripting-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-modules-queries/RELEASE130/org-netbeans-modules-queries-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-openide-filesystems/RELEASE130/org-openide-filesystems-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-openide-loaders/RELEASE130/org-openide-loaders-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-progress/RELEASE130/org-netbeans-api-progress-RELEASE130.jar,/home/runner/.m2/repository/org/netbeans/api/org-netbeans-api-progress-nb/RELEASE130/org-netbeans-api-progress-nb-RELEASE1...
  - sonar.links.ci=
  - sonar.links.homepage=https://github.com/philippefichet/asciidoc4netbeans
  - sonar.links.issue=
  - sonar.links.scm=https://github.com/philippefichet/asciidoc4netbeans
  - sonar.links.scm_dev=
  - sonar.moduleKey=philippefichet_asciidoc4netbeans:com.github.philippefichet:asciidoc4netbeans
  - sonar.organization=philippefichet
  - sonar.projectBaseDir=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans
  - sonar.projectBuildDir=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target
  - sonar.projectDescription=Asciidoc integration for Netbeans
  - sonar.projectKey=philippefichet_asciidoc4netbeans
  - sonar.projectName=Asciidoc for Netbeans
  - sonar.projectVersion=1.1.0-SNAPSHOT
  - sonar.scanner.app=ScannerMaven
  - sonar.scanner.appVersion=3.10.0.2594/3.8.8
  - sonar.sourceEncoding=UTF-8
  - sonar.sources=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/pom.xml,/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/src/main/java
  - sonar.tests=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/src/test/java
  - sonar.working.directory=/home/runner/work/asciidoc4netbeans/asciidoc4netbeans/target/sonar

As long as the analysis goes well, I’m not worried.

This topic is mainly here to help you get some material as kindly requested in the logs :slight_smile:

1 Like

Thank you @philippefichet, as a small update, the fix is being implemented in [SONARJAVA-4697] - Jira and should be soon available.

Thanks to you :), don’t hesitate to ask me to test my projects via GitHub Action.