SonarLint analysis failed: Unable to load component class org.sonarsource.sonarlint.core.analyzer.sensor.SensorExecutor

I get this error when attempting to analyze anything within my Java project (single file/modified files/etc).

My configuration is thus:
IntelliJ Ultimate 2018.1 (build #IU-181.4203.550)
SonarLint for IntelliJ 4.0.2.3009
SonarCloud

I have removed and re-installed the plugin, but continue to receive the error.
Also downgraded to 4.0.1.2990, but continue to receive the error.

Here is the stacktrace from the log tab:

Using configuration of 'customer-services-parent' in server 'SonarCloud'
Analysing 'AbstractCustomerSearchService.java'...
Error running SonarLint analysis
java.lang.IllegalStateException: Unable to load component class org.sonarsource.sonarlint.core.analyzer.sensor.SensorsExecutor
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:59)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:678)
	at org.sonarsource.sonarlint.core.container.ComponentContainer.getComponentByType(ComponentContainer.java:258)
	at org.sonarsource.sonarlint.core.container.analysis.AnalysisContainer.doAfterStart(AnalysisContainer.java:132)
	at org.sonarsource.sonarlint.core.container.ComponentContainer.startComponents(ComponentContainer.java:125)
	at org.sonarsource.sonarlint.core.container.ComponentContainer.execute(ComponentContainer.java:110)
	at org.sonarsource.sonarlint.core.container.storage.StorageAnalyzer.analyze(StorageAnalyzer.java:75)
	at org.sonarsource.sonarlint.core.container.storage.StorageContainerHandler.analyze(StorageContainerHandler.java:82)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.lambda$analyze$0(ConnectedSonarLintEngineImpl.java:152)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.withReadLock(ConnectedSonarLintEngineImpl.java:344)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.withReadLock(ConnectedSonarLintEngineImpl.java:334)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.analyze(ConnectedSonarLintEngineImpl.java:149)
	at org.sonarlint.intellij.core.ConnectedSonarLintFacade.analyze(ConnectedSonarLintFacade.java:71)
	at org.sonarlint.intellij.core.SonarLintFacade.startAnalysis(SonarLintFacade.java:65)
	at org.sonarlint.intellij.analysis.SonarLintAnalyzer.analyzeModule(SonarLintAnalyzer.java:106)
	at org.sonarlint.intellij.analysis.SonarLintTask.analyze(SonarLintTask.java:176)
	at org.sonarlint.intellij.analysis.SonarLintTask.run(SonarLintTask.java:100)
	at org.sonarlint.intellij.analysis.SonarLintUserTask.run(SonarLintUserTask.java:39)
	at org.sonarlint.intellij.analysis.SonarLintJobManager.lambda$null$1(SonarLintJobManager.java:120)
	at com.intellij.openapi.progress.impl.CoreProgressManager.lambda$runProcess$1(CoreProgressManager.java:157)
	at com.intellij.openapi.progress.impl.CoreProgressManager.registerIndicatorAndRun(CoreProgressManager.java:580)
	at com.intellij.openapi.progress.impl.CoreProgressManager.executeProcessUnderProgress(CoreProgressManager.java:525)
	at com.intellij.openapi.progress.impl.ProgressManagerImpl.executeProcessUnderProgress(ProgressManagerImpl.java:85)
	at com.intellij.openapi.progress.impl.CoreProgressManager.runProcess(CoreProgressManager.java:144)
	at org.sonarlint.intellij.analysis.SonarLintJobManager.lambda$runTask$2(SonarLintJobManager.java:120)
	at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
	at java.util.concurrent.FutureTask.run(FutureTask.java:266)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)
	at java.lang.Thread.run(Thread.java:745)
Caused by: java.lang.IllegalStateException: Unable to load component class org.sonarsource.sonarlint.core.analyzer.sensor.DefaultSensorContext
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:59)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:57)
	... 29 more
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.api.batch.rule.ActiveRules
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:59)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:57)
	... 43 more
Caused by: java.lang.IllegalStateException: Rule 'cobol:S1135' is already activated
	at org.sonar.api.batch.rule.internal.ActiveRulesBuilder.activate(ActiveRulesBuilder.java:44)
	at org.sonar.api.batch.rule.internal.NewActiveRule.activate(NewActiveRule.java:96)
	at org.sonarsource.sonarlint.core.container.storage.SonarQubeActiveRulesProvider.createNewActiveRule(SonarQubeActiveRulesProvider.java:105)
	at org.sonarsource.sonarlint.core.container.storage.SonarQubeActiveRulesProvider.provide(SonarQubeActiveRulesProvider.java:72)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:57)
	... 57 more

Hi @romack

This error usually mean the SonarLint local storage got corrupted. Hard to find the root cause, but you can simply try to open the SonarLint configuration page, and click “Update binding” on the SonarCloud server to fix the issue:

1 Like

Julien,

Thank you for your reply. I updated the binding and still receive the error. I even deleted the SonarCloud server and re-added, but still receive the error. If you have any other suggestions on what I should try, please let me know. It is a bummer not being able to lint locally.

Thanks,

Chris

I am on macOS Mojave 10.14.4 BTW

Strange. Normally updating the binding should clean up everything, but just in case, can you manually remove ~/<.IdeaIXXXXX>/config/sonarlint/storage/ and relaunch the binding update?

Julien -

Sorry, I am just now getting back to this. I tried all of your suggestions with no success. My latest attempt was to:

  1. Remove the plugin from IntelliJ and close IntelliJ
  2. Remove any files or directories on my file system with sonar in the name
  3. Re-launch intellij, install and configure the plugin

Analysis still resulted in the error from my original post.

Caused by: java.lang.IllegalStateException: Rule ‘cobol:S1135’ is already activated

I found it interesting that the process consistently failed on the same Cobol rule (even though the project I am attempting to lint is a Java). For grins, I created a custom Cobol Quality Profile, made it the default, deactivated the offending rule and re-ran analysis. This time if failed on a different rule.

Caused by: java.lang.IllegalStateException: Rule ‘cobol:COBOL.ProgramNameCheck’ is already activated

I then removed ALL of the rules from the custom Cobol Quality Profile and was able to successfully analyze my project.

So I think I am good for now, and as I do not think we will be writing any Cobol any time soon at The Container Store, we can probably close this issue.

Just wanted to give you a heads up if anyone else runs into a similar issue.

Regards,

Chris

Hi @romack

Would be interesting to put you back in a situation where you can reproduce the issue, and send me the result of the following WS calls:
<sq server>/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&severities=INFO&ps=500
<sq server>/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&severities=MINOR&ps=500
<sq server>/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&severities=MAJOR&ps=500
<sq server>/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&severities=CRITICAL&ps=500
<sq server>/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&severities=BLOCKER&ps=500

Due to pagination, you may have to run each WS multiple times with parameter &p=x where is is the page number until all results are fetched. That would help me to understand the problem.

So for SonarCloud, the URL would be as follows?

https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&severities=INFO&ps=500

I am having trouble deciphering the response from the endpoint above and not exactly clear how to determine when I do or don’t need to paginate. I should just be able to curl and redirect to a file correct?

Sorry, I forgot you were on SonarCloud. Is your organization public? If not, any chance you could add my account (julienhenrysonarsource@bitbucket) as a member of your org, so that I could run the queries myself?

Julien -

We are setup to sync via GitHub. Could you send me your GitHub user and we will add you to our GitHub.

Thanks,

Chris

My GitHub username is henryju.

Hi, I am facing the exact same issue, and I have the exact same configuration as @romack. Is there an update on that ticket?

I just had this same issue. I had to disable the following php rules to make it work S101, S1109, S1788, S121, S115 (Which is funny as my project is not in php). To get the rule to disable I looked at the intellij log (Help | Show Log in Explorer) then looked through the bottom of the log for something like Caused by: java.lang.IllegalStateException: Rule 'xxxxx' is already activated. Then I created a custom quality profile (on sonarcloud) for that language and disable the rule, then update bindings in Intellij. Like me, there may be multiple rules you have to disable (or you can just disable the whole language)

Hi guys,

If you have the possibility to grant me access to your SonarCloud organization where you have the issue, I could investigate the reason why the WS response seems wrong. I tried on my own personal organization but I was not able to reproduce, so there is something about your quality profiles that I don’t understand.

Same happening here with Visual Studio Code. I’m on OSX Mojave 10.14.5 (18F132).

Analysis triggered on file:///blah/user-create.dto.test.js with configuration: 
[
  projectKey: X
  baseDir: /blah
  workDir: /blah/.sonarlint
  extraProperties: {}
  inputFiles: [
    file:///blah/user-create.dto.test.js (UTF-8) [test]
  ]
]

Available languages:
  * C => "c"
  * C++ => "cpp"
  * Objective-C => "objc"
  * Python => "py"
  * Kotlin => "kotlin"
  * T-SQL => "tsql"
  * Apex => "apex"
  * JavaScript => "js"
  * PL/SQL => "plsql"
  * Ruby => "ruby"
  * Scala => "scala"
  * Java => "java"
  * COBOL => "cobol"
  * HTML => "web"
  * JSP => "jsp"
  * XML => "xml"
  * PHP => "php"
  * TypeScript => "ts"
  * ABAP => "abap"
Start analysis
Declared extensions of language C were converted to c: **/*.disabled
Declared extensions of language C++ were converted to cpp: **/*.disabled
Declared extensions of language Objective-C were converted to objc: **/*.disabled
Declared extensions of language Python were converted to py: **/*.py
Declared extensions of language Kotlin were converted to kotlin: **/*.kt
Declared extensions of language T-SQL were converted to tsql: **/*.tsql
Declared extensions of language Apex were converted to apex: **/*.cls,**/*.trigger
Declared extensions of language JavaScript were converted to js: **/*.js,**/*.jsx,**/*.vue
Declared extensions of language PL/SQL were converted to plsql: **/*.sql,**/*.tab,**/*.pkb
Declared extensions of language Ruby were converted to ruby: **/*.rb
Declared extensions of language Scala were converted to scala: **/*.scala
Declared extensions of language Java were converted to java: **/*.java,**/*.jav
Declared extensions of language COBOL were converted to cobol: 
Declared extensions of language HTML were converted to web: **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml
Declared extensions of language JSP were converted to jsp: **/*.jsp,**/*.jspf,**/*.jspx
Declared extensions of language XML were converted to xml: **/*.xml,**/*.xsd,**/*.xsl
Declared extensions of language PHP were converted to php: **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc
Declared extensions of language TypeScript were converted to ts: **/*.ts,**/*.tsx
Declared extensions of language ABAP were converted to abap: **/*.abap,**/*.ab4,**/*.flow,**/*.asprog
[Info  - 3:25:01 PM] Index files
Language of file 'file:///blah/user-create.dto.test.js' is set to 'js'
[Info  - 3:25:01 PM] 1 files indexed
Quality profiles:
  * abap: 'Sonar way' (65 rules)
  * apex: 'Sonar way' (29 rules)
  * c: 'Sonar way' (155 rules)
  * cobol: 'Sonar way' (29 rules)
  * cpp: 'Sonar way' (245 rules)
  * java: 'Sonar way' (362 rules)
  * js: 'Sonar way Recommended' (128 rules)
  * jsp: 'Sonar way' (0 rules)
  * kotlin: 'Sonar way' (30 rules)
  * objc: 'Sonar way' (149 rules)
  * php: 'Sonar way' (98 rules)
  * plsql: 'Sonar way' (130 rules)
  * py: 'Sonar way' (31 rules)
  * ruby: 'Sonar way' (29 rules)
  * scala: 'Sonar way' (28 rules)
  * ts: 'Sonar way recommended' (112 rules)
  * tsql: 'Sonar way' (54 rules)
  * web: 'Sonar way' (155 rules)
[Error - 3:25:01 PM] Analysis failed.
java.lang.IllegalStateException: Unable to load component class org.sonarsource.sonarlint.core.analyzer.sensor.SensorsExecutor
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:59)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:678)
	at org.sonarsource.sonarlint.core.container.ComponentContainer.getComponentByType(ComponentContainer.java:258)
	at org.sonarsource.sonarlint.core.container.analysis.AnalysisContainer.doAfterStart(AnalysisContainer.java:132)
	at org.sonarsource.sonarlint.core.container.ComponentContainer.startComponents(ComponentContainer.java:125)
	at org.sonarsource.sonarlint.core.container.ComponentContainer.execute(ComponentContainer.java:110)
	at org.sonarsource.sonarlint.core.container.storage.StorageAnalyzer.analyze(StorageAnalyzer.java:75)
	at org.sonarsource.sonarlint.core.container.storage.StorageContainerHandler.analyze(StorageContainerHandler.java:82)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.lambda$analyze$0(ConnectedSonarLintEngineImpl.java:152)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.withReadLock(ConnectedSonarLintEngineImpl.java:344)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.withReadLock(ConnectedSonarLintEngineImpl.java:334)
	at org.sonarsource.sonarlint.core.ConnectedSonarLintEngineImpl.analyze(ConnectedSonarLintEngineImpl.java:149)
	at org.sonarlint.languageserver.SonarLintLanguageServer$ConnectedAnalysisWrapper.analyze(SonarLintLanguageServer.java:735)
	at org.sonarlint.languageserver.SonarLintLanguageServer$ConnectedAnalysisWrapper.analyze(SonarLintLanguageServer.java:716)
	at org.sonarlint.languageserver.SonarLintLanguageServer.analyze(SonarLintLanguageServer.java:615)
	at org.sonarlint.languageserver.SonarLintLanguageServer.didOpen(SonarLintLanguageServer.java:551)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.eclipse.lsp4j.jsonrpc.services.GenericEndpoint.lambda$null$0(GenericEndpoint.java:65)
	at org.eclipse.lsp4j.jsonrpc.services.GenericEndpoint.notify(GenericEndpoint.java:152)
	at org.eclipse.lsp4j.jsonrpc.RemoteEndpoint.handleNotification(RemoteEndpoint.java:220)
	at org.eclipse.lsp4j.jsonrpc.RemoteEndpoint.consume(RemoteEndpoint.java:187)
	at org.eclipse.lsp4j.jsonrpc.Launcher$Builder.lambda$wrapMessageConsumer$0(Launcher.java:342)
	at org.eclipse.lsp4j.jsonrpc.validation.ReflectiveMessageValidator.consume(ReflectiveMessageValidator.java:76)
	at org.eclipse.lsp4j.jsonrpc.json.StreamMessageProducer.handleMessage(StreamMessageProducer.java:192)
	at org.eclipse.lsp4j.jsonrpc.json.StreamMessageProducer.listen(StreamMessageProducer.java:94)
	at org.eclipse.lsp4j.jsonrpc.json.ConcurrentMessageProcessor.run(ConcurrentMessageProcessor.java:99)
	at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
	at java.util.concurrent.FutureTask.run(FutureTask.java:266)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
	at java.lang.Thread.run(Thread.java:748)
Caused by: java.lang.IllegalStateException: Unable to load component class org.sonarsource.sonarlint.core.analyzer.sensor.DefaultSensorContext
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:59)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:57)
	... 33 more
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.api.batch.rule.ActiveRules
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:59)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:57)
	... 47 more
Caused by: java.lang.IllegalStateException: Rule 'c:S1133' is already activated
	at org.sonar.api.batch.rule.internal.ActiveRulesBuilder.addRule(ActiveRulesBuilder.java:40)
	at org.sonarsource.sonarlint.core.container.storage.SonarQubeActiveRulesProvider.createNewActiveRule(SonarQubeActiveRulesProvider.java:107)
	at org.sonarsource.sonarlint.core.container.storage.SonarQubeActiveRulesProvider.provide(SonarQubeActiveRulesProvider.java:73)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:498)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector.invokeMethod(MethodInjector.java:129)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector.access$000(MethodInjector.java:39)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:113)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
	at org.sonarsource.sonarlint.shaded.org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
	at org.sonarsource.sonarlint.core.container.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:57)
	... 61 more

Tried updating my binding as well with no luck. I ran this in VSCode:

image

Hi @dschnare

I’m not able to reproduce on my side and I don’t understand the issue. Could you please possibly add me as member of your SonarCloud organization so that I could see if the quality profiles have been somehow corrupted.
Also, I would be interested by a copy of your SonarLint local storage: (~/.sonarlint/storage)

Thanks

Ok, I add you as a member to the SonarCloud organization.

Thanks @dschnare. I’m still unable to reproduce. I just bound a project with your Organization, and I get slightly different rules numbers. Your log shows:

  • cobol: ‘Sonar way’ (29 rules)
    […]
  • web: ‘Sonar way’ (155 rules)

while mine contains:

  • cobol: ‘Sonar way’ (75 rules)
    […]
  • web: ‘Sonar way’ (18 rules)
  • xml: ‘Sonar way’ (4 rules)

Can you please clean the SonarLint output, and trigger the “UpdateSonarLint binding” action, then share the logs with me?
On my side I have:

Starting connected SonarLint engine for sonarcloud-test...
[Info - 16:05:44] SonarTS Server connected to 45785
Create : /home/julien/.sonarlint/plugins
Plugin cache: /home/julien/.sonarlint/plugins
Create : /home/julien/.sonarlint/plugins/_tmp
Load plugins
Load plugins (done) | time=24ms
Plugins:
* SonarCFamily 6.2.0.11201 (cpp)
* SonarPython 1.14.0.3086 (python)
* SonarKotlin 1.5.0.315 (kotlin)
* SonarTSQL 1.4.0.3334 (tsql)
* SonarApex 1.5.0.315 (sonarapex)
* SonarJS 5.2.1.7778 (javascript)
* SonarPLSQL 3.4.1.2576 (plsql)
* SonarRuby 1.5.0.315 (ruby)
* SonarScala 1.5.0.315 (sonarscala)
* License for SonarLint 7.8.0.26123 (license)
* SonarJava 5.13.0.18197 (java)
* SonarCOBOL 4.4.0.3403 (cobol)
* SonarHTML 3.1.0.1615 (web)
* SonarXML 2.0.1.2020 (xml)
* SonarPHP 3.1.1.4762 (php)
* SonarTS 1.9.0.3766 (typescript)
* SonarABAP 3.8.0.2034 (abap)
[Info - 16:05:44] Using storage for server 'sonarcloud-test' (last update 18/06/2019 15:36)
[Info - 16:05:44] Starting SonarTS Server
Deploying bundle to /home/julien/.sonarlint/work/.sonartmp_12871630626271464620/2902643295483236504
[Info - 16:05:45] Using typescript at [/usr/share/code/resources/app/extensions/node_modules/typescript], version 3.5.1
[Info - 16:05:45] SonarTS Server is started
Connected SonarLint engine started for sonarcloud-test
Updating global storage of server sonarcloud-test, may take some time...
[Info - 16:05:45] SonarTS Server connected to 39675
[Info - 16:05:45] SonarTS Server is stopped
Create : /home/julien/.sonarlint/plugins
Plugin cache: /home/julien/.sonarlint/plugins
Create : /home/julien/.sonarlint/plugins/_tmp
GET 200 https://sonarcloud.io/api/system/status | response time=256ms
Downloaded server infos in 257ms
GET 200 https://sonarcloud.io/api/plugins/installed | response time=50ms
[Info - 16:05:45] Downloaded plugin list in 51ms
GET 200 https://sonarcloud.io/api/settings/values.protobuf | response time=69ms
[Info - 16:05:45] Downloaded settings in 70ms
Code analyzer 'scmgit' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'jacoco' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'scmmercurial' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'csharp' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'cssfamily' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'flex' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'go' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'swift' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'vbnet' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'security' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securitycsharpfrontend' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securityjavafrontend' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securityphpfrontend' is not compatible with SonarLint. Skip downloading it.
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=INFO&p=1&ps=500 | response time=101ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MINOR&p=1&ps=500 | response time=162ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MINOR&p=2&ps=500 | response time=173ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MINOR&p=3&ps=500 | response time=91ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MAJOR&p=1&ps=500 | response time=168ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MAJOR&p=2&ps=500 | response time=163ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MAJOR&p=3&ps=500 | response time=202ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=MAJOR&p=4&ps=500 | response time=127ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=CRITICAL&p=1&ps=500 | response time=190ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=CRITICAL&p=2&ps=500 | response time=87ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=[yourorg]&severities=BLOCKER&p=1&ps=500 | response time=139ms
GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?organization=[yourorg] | response time=75ms
Downloaded quality profiles in 75ms
GET 200 https://sonarcloud.io/api/components/search.protobuf?qualifiers=TRK&organization=[yourorg]&ps=500&p=1 | response time=53ms
Page downloaded in 53ms
Create : /home/julien/.sonarlint/plugins
Plugin cache: /home/julien/.sonarlint/plugins
Create : /home/julien/.sonarlint/plugins/_tmp
Load plugins
Load plugins (done) | time=38ms
Plugins:
* SonarCFamily 6.2.0.11201 (cpp)
* SonarPython 1.14.0.3086 (python)
* SonarKotlin 1.5.0.315 (kotlin)
* SonarTSQL 1.4.0.3334 (tsql)
* SonarApex 1.5.0.315 (sonarapex)
* SonarJS 5.2.1.7778 (javascript)
* SonarPLSQL 3.4.1.2576 (plsql)
* SonarRuby 1.5.0.315 (ruby)
* SonarScala 1.5.0.315 (sonarscala)
* License for SonarLint 7.8.0.26123 (license)
* SonarJava 5.13.0.18197 (java)
* SonarCOBOL 4.4.0.3403 (cobol)
* SonarHTML 3.1.0.1615 (web)
* SonarXML 2.0.1.2020 (xml)
* SonarPHP 3.1.1.4762 (php)
* SonarTS 1.9.0.3766 (typescript)
* SonarABAP 3.8.0.2034 (abap)
[Info - 16:05:53] Using storage for server 'sonarcloud-test' (last update 18/06/2019 16:05)
[Info - 16:05:53] Starting SonarTS Server
Deploying bundle to /home/julien/.sonarlint/work/.sonartmp_8740013978238766074/207073233808541221
[Info - 16:05:53] Using typescript at [/usr/share/code/resources/app/extensions/node_modules/typescript], version 3.5.1
[Info - 16:05:53] SonarTS Server is started
Successfully updated global storage of server sonarcloud-test
[Info - 16:05:53] SonarTS Server connected to 42557
GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?project=[projectKey]&organization=[yourorg] | response time=284ms
Downloaded project quality profiles in 285ms
GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=[projectKey] | response time=85ms
[Info - 16:05:53] Downloaded settings in 87ms
GET 200 https://sonarcloud.io/api/components/tree.protobuf?qualifiers=BRC&component=[projectKey]&ps=500&p=1 | response time=60ms
Page downloaded in 61ms
GET 200 https://sonarcloud.io/batch/issues?key=[projectKey] | response time=84ms
Downloaded issues in 124ms
GET 200 https://sonarcloud.io/api/components/tree.protobuf?qualifiers=FIL,UTS&component=[projectKey]&organization=[yourorg]&ps=500&p=1 | response time=75ms
Page downloaded in 80ms

With the few information I have today, I suspect your local SonarLint storage got corrupted at some point, and that it is not able to recover for some reason I would like to understand.

@Julien_HENRY I’ve deleted the contents of the ~/.sonarlint/storage folder and updated my binding.

Here’s the output of the update binding command:

Starting connected SonarLint engine for wearedragonfly...
Create : /Users/darren/.sonarlint/plugins
Plugin cache: /Users/darren/.sonarlint/plugins
Create : /Users/darren/.sonarlint/plugins/_tmp
Load plugins
Load plugins (done) | time=0ms
No plugins loaded
[Warn  - 10:18:19 AM] No storage for server 'wearedragonfly'. Please update.
Connected SonarLint engine started for wearedragonfly
Updating global storage of server wearedragonfly, may take some time...
Create : /Users/darren/.sonarlint/plugins
Plugin cache: /Users/darren/.sonarlint/plugins
Create : /Users/darren/.sonarlint/plugins/_tmp
GET 200 https://sonarcloud.io/api/system/status | response time=628ms
Downloaded server infos in 630ms
GET 200 https://sonarcloud.io/api/plugins/installed | response time=117ms
[Info  - 10:18:20 AM] Downloaded plugin list in 121ms
GET 200 https://sonarcloud.io/api/settings/values.protobuf | response time=134ms
[Info  - 10:18:20 AM] Downloaded settings in 135ms
Code analyzer 'scmgit' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'jacoco' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'scmmercurial' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'csharp' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'cssfamily' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'flex' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'go' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'swift' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'vbnet' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'security' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securitycsharpfrontend' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securityjavafrontend' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securityphpfrontend' is not compatible with SonarLint. Skip downloading it.
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=INFO&p=1&ps=500 | response time=126ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MINOR&p=1&ps=500 | response time=211ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MINOR&p=2&ps=500 | response time=220ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MINOR&p=3&ps=500 | response time=151ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MAJOR&p=1&ps=500 | response time=273ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MAJOR&p=2&ps=500 | response time=229ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MAJOR&p=3&ps=500 | response time=234ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=MAJOR&p=4&ps=500 | response time=193ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=CRITICAL&p=1&ps=500 | response time=252ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=CRITICAL&p=2&ps=500 | response time=146ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=wearedragonfly&severities=BLOCKER&p=1&ps=500 | response time=213ms
GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?organization=wearedragonfly | response time=135ms
Downloaded quality profiles in 136ms
GET 200 https://sonarcloud.io/api/components/search.protobuf?qualifiers=TRK&organization=wearedragonfly&ps=500&p=1 | response time=124ms
Page downloaded in 124ms
Create : /Users/darren/.sonarlint/plugins
Plugin cache: /Users/darren/.sonarlint/plugins
Create : /Users/darren/.sonarlint/plugins/_tmp
Load plugins
Load plugins (done) | time=41ms
Plugins:
  * SonarCFamily 6.2.0.11201 (cpp)
  * SonarPython 1.14.0.3086 (python)
  * SonarKotlin 1.5.0.315 (kotlin)
  * SonarTSQL 1.4.0.3334 (tsql)
  * SonarApex 1.5.0.315 (sonarapex)
  * SonarJS 5.2.1.7778 (javascript)
  * SonarPLSQL 3.4.1.2576 (plsql)
  * SonarRuby 1.5.0.315 (ruby)
  * SonarScala 1.5.0.315 (sonarscala)
  * License for SonarLint 7.8.0.26123 (license)
  * SonarJava 5.13.0.18197 (java)
  * SonarCOBOL 4.4.0.3403 (cobol)
  * SonarHTML 3.1.0.1615 (web)
  * SonarXML 2.0.1.2020 (xml)
  * SonarPHP 3.1.1.4762 (php)
  * SonarTS 1.9.0.3766 (typescript)
  * SonarABAP 3.8.0.2034 (abap)
[Info  - 10:18:24 AM] Using storage for server 'wearedragonfly' (last update 18/06/19 10:18 AM)
[Info  - 10:18:24 AM] Starting SonarTS Server
Deploying bundle to /Users/darren/.sonarlint/work/.sonartmp_8433765029358768644/7712212987288206212
[Info  - 10:18:25 AM] Using typescript at [/Applications/Visual Studio Code.app/Contents/Resources/app/extensions/node_modules/typescript], version 3.5.1
[Info  - 10:18:25 AM] SonarTS Server is started
Successfully updated global storage of server wearedragonfly
Starting connected SonarLint engine for launchfort...
[Info  - 10:18:25 AM] SonarTS Server connected to 61622
Create : /Users/darren/.sonarlint/plugins
Plugin cache: /Users/darren/.sonarlint/plugins
Create : /Users/darren/.sonarlint/plugins/_tmp
Load plugins
Load plugins (done) | time=0ms
No plugins loaded
[Warn  - 10:18:25 AM] No storage for server 'launchfort'. Please update.
Connected SonarLint engine started for launchfort
Updating global storage of server launchfort, may take some time...
Create : /Users/darren/.sonarlint/plugins
Plugin cache: /Users/darren/.sonarlint/plugins
Create : /Users/darren/.sonarlint/plugins/_tmp
GET 200 https://sonarcloud.io/api/system/status | response time=595ms
Downloaded server infos in 596ms
GET 200 https://sonarcloud.io/api/plugins/installed | response time=115ms
[Info  - 10:18:26 AM] Downloaded plugin list in 119ms
GET 200 https://sonarcloud.io/api/settings/values.protobuf | response time=133ms
[Info  - 10:18:26 AM] Downloaded settings in 135ms
Code analyzer 'scmgit' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'jacoco' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'scmmercurial' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'csharp' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'cssfamily' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'flex' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'go' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'swift' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'vbnet' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'security' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securitycsharpfrontend' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securityjavafrontend' is not compatible with SonarLint. Skip downloading it.
Code analyzer 'securityphpfrontend' is not compatible with SonarLint. Skip downloading it.
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=INFO&p=1&ps=500 | response time=125ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MINOR&p=1&ps=500 | response time=224ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MINOR&p=2&ps=500 | response time=219ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MINOR&p=3&ps=500 | response time=157ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MAJOR&p=1&ps=500 | response time=249ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MAJOR&p=2&ps=500 | response time=226ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MAJOR&p=3&ps=500 | response time=233ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=MAJOR&p=4&ps=500 | response time=197ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=CRITICAL&p=1&ps=500 | response time=272ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=CRITICAL&p=2&ps=500 | response time=145ms
GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,htmlDesc,htmlNote,internalKey,isTemplate,templateKey,actives&statuses=BETA,DEPRECATED,READY&types=CODE_SMELL,BUG,VULNERABILITY&organization=launchfort&severities=BLOCKER&p=1&ps=500 | response time=256ms
GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?organization=launchfort | response time=137ms
Downloaded quality profiles in 138ms
GET 200 https://sonarcloud.io/api/components/search.protobuf?qualifiers=TRK&organization=launchfort&ps=500&p=1 | response time=125ms
Page downloaded in 126ms
Create : /Users/darren/.sonarlint/plugins
Plugin cache: /Users/darren/.sonarlint/plugins
Create : /Users/darren/.sonarlint/plugins/_tmp
Load plugins
Load plugins (done) | time=54ms
Plugins:
  * SonarCFamily 6.2.0.11201 (cpp)
  * SonarPython 1.14.0.3086 (python)
  * SonarKotlin 1.5.0.315 (kotlin)
  * SonarTSQL 1.4.0.3334 (tsql)
  * SonarApex 1.5.0.315 (sonarapex)
  * SonarJS 5.2.1.7778 (javascript)
  * SonarPLSQL 3.4.1.2576 (plsql)
  * SonarRuby 1.5.0.315 (ruby)
  * SonarScala 1.5.0.315 (sonarscala)
  * License for SonarLint 7.8.0.26123 (license)
  * SonarJava 5.13.0.18197 (java)
  * SonarCOBOL 4.4.0.3403 (cobol)
  * SonarHTML 3.1.0.1615 (web)
  * SonarXML 2.0.1.2020 (xml)
  * SonarPHP 3.1.1.4762 (php)
  * SonarTS 1.9.0.3766 (typescript)
  * SonarABAP 3.8.0.2034 (abap)
[Info  - 10:18:31 AM] Using storage for server 'launchfort' (last update 18/06/19 10:18 AM)
[Info  - 10:18:31 AM] Starting SonarTS Server
Deploying bundle to /Users/darren/.sonarlint/work/.sonartmp_6877787593902686105/8399100810045505416
[Info  - 10:18:32 AM] Using typescript at [/Applications/Visual Studio Code.app/Contents/Resources/app/extensions/node_modules/typescript], version 3.5.1
[Info  - 10:18:32 AM] SonarTS Server is started
Successfully updated global storage of server launchfort
[Info  - 10:18:32 AM] SonarTS Server connected to 61625
GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?project=wearedragonfly_onboardmd-authsrv&organization=wearedragonfly | response time=624ms
Downloaded project quality profiles in 625ms
GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=wearedragonfly_onboardmd-authsrv | response time=143ms
[Info  - 10:18:33 AM] Downloaded settings in 144ms
GET 200 https://sonarcloud.io/api/components/tree.protobuf?qualifiers=BRC&component=wearedragonfly_onboardmd-authsrv&ps=500&p=1 | response time=115ms
Page downloaded in 115ms
GET 200 https://sonarcloud.io/batch/issues?key=wearedragonfly_onboardmd-authsrv | response time=148ms
Downloaded issues in 258ms
GET 200 https://sonarcloud.io/api/components/tree.protobuf?qualifiers=FIL,UTS&component=wearedragonfly_onboardmd-authsrv&organization=wearedragonfly&ps=500&p=1 | response time=118ms
Page downloaded in 119ms