Hello there,
I’m facing an increase time of scanning time with sonar-scanner.
Version: 5.0.1.3006
Executable: sonar-scanner-5.0.1.3006-linux/bin/sonar-scanner
Deployed: zip
Since August/23 I’m facing high time to analyse the Kotlin files. I noticed that no files has been skipped, even running on PR.
I need to find alternatives to reduce this time.
Logs:
[15:03:58]: $ /bitrise/src/sonar-scanner-5.0.1.3006-linux/bin/sonar-scanner -Dsonar.projectBaseDir=/bitrise/src -Dsonar.login=[REDACTED] -Dsonar.pullrequest.base=master -Dsonar.pullrequest.branch=[REDACTED] -Dsonar.pullrequest.key=[REDACTED]
[15:03:58]: INFO: Scanner configuration file: /bitrise/src/sonar-scanner-5.0.1.3006-linux/conf/sonar-scanner.properties
[15:03:58]: INFO: Project root configuration file: /bitrise/src/sonar-project.properties
[15:03:58]: INFO: SonarScanner 5.0.1.3006
[15:03:58]: INFO: Java 17.0.7 Eclipse Adoptium (64-bit)
[15:03:58]: INFO: Linux 5.13.0-1015-gcp amd64
[15:03:58]: INFO: User cache: /root/.sonar/cache
[15:04:01]: INFO: Analyzing on SonarQube server 10.1.0.73491
[15:04:01]: INFO: Default locale: "en_US", source code encoding: "UTF-8"
[15:04:01]: INFO: Load global settings
[15:04:02]: INFO: Load global settings (done) | time=598ms
[15:04:02]: INFO: Server id: 711B5945-AW2HMGIM4FIMCG6vEv29
[15:04:02]: INFO: User cache: /root/.sonar/cache
[15:04:02]: INFO: Load/download plugins
[15:04:02]: INFO: Load plugins index
[15:04:02]: INFO: Load plugins index (done) | time=133ms
[15:04:18]: INFO: Load/download plugins (done) | time=15921ms
[15:04:19]: INFO: Loaded core extensions: developer-scanner
[15:04:19]: INFO: Process project properties
[15:04:19]: INFO: Process project properties (done) | time=7ms
[15:04:19]: INFO: Execute project builders
[15:04:19]: INFO: Execute project builders (done) | time=1ms
[15:04:19]: INFO: Project key: com.[REDACTED]:[REDACTED]
[15:04:19]: INFO: Base dir: /bitrise/src
[15:04:19]: INFO: Working dir: /bitrise/src/.scannerwork
[15:04:19]: INFO: Load project settings for component key: 'com.[REDACTED]:[REDACTED]'
[15:04:19]: INFO: Load project settings for component key: 'com.[REDACTED]:[REDACTED]' (done) | time=173ms
[15:04:20]: INFO: Load project branches
[15:04:20]: INFO: Load project branches (done) | time=114ms
[15:04:20]: INFO: Load branch configuration
[15:04:20]: INFO: Found manual configuration of branch/PR analysis. Skipping automatic configuration.
[15:04:20]: INFO: Load branch configuration (done) | time=2ms
[15:04:20]: INFO: Auto-configuring with CI 'Bitrise'
[15:04:20]: INFO: Load quality profiles
[15:04:20]: INFO: Load quality profiles (done) | time=141ms
[15:04:20]: INFO: Load active rules
[15:04:26]: INFO: Load active rules (done) | time=6354ms
[15:04:26]: INFO: Load analysis cache
[15:04:27]: INFO: Load analysis cache | time=567ms
[15:04:27]: INFO: Pull request 17374 for merge into master from tests/sonar_qube
[15:04:27]: WARN: The property 'sonar.login' is deprecated and will be removed in the future. Please use the 'sonar.token' property instead when passing a token.
[15:04:27]: INFO: Load project repositories
[15:04:27]: INFO: Load project repositories (done) | time=220ms
[15:04:27]: INFO: SCM collecting changed files in the branch
[15:04:27]: INFO: Merge base sha1: ec517434c4c6e1b1bfa947838e81f86f6be391f9
[15:04:27]: INFO: SCM collecting changed files in the branch (done) | time=209ms
[15:04:27]: INFO: Indexing files...
[15:04:27]: INFO: Project configuration:
[15:04:27]: INFO: Excluded sources: **/ci/**, **/*_test.go, **/vendor/**, **/testdata/*, **/*.yaml, **/*.yml, **/__init__.py, **/tests-acceptance/**, **/tests/**, **/node_modules/**, **/*test.js, **__tests__**, **/webpack/**, *.html, *.htm, *.css, *.sql, **/build/**, **/src/test/**, **/src/[REDACTED]Test/**, **/*.groovy, **/*.html, gallery, presets, lint-rules, **/*.md, **/*.jpg, **/*.png, **/*.zip, **/*.webp, **/*.ttf, **/docs/**
[15:04:27]: INFO: Excluded sources for coverage: **/*Activity.kt, **/*Fragment.kt, **/*View.kt, **/*Sheet.kt, **/*Dialog*.kt, **/*Adapter.kt, **/*Screen.kt, **/*AdapterDelegate.kt, **/*Experiment.kt, **/*Destination.kt, **/*NavHost.kt, **/BaseRoute.kt, **/BasePath.kt, **/*Navigator.kt, **/*Wrapper.kt, **/AndroidDevice*.kt, **/legacy/**/deeplink/providers/**, **/deeplink-test/**, **/screen/**, **/view/**, **/composable/**, **/com/[REDACTED]/design/**, utils/**, **/di/**, **/buildSrc/**, **/*Dagger**, **/*MembersInjector*.*, **/*_Factory*.*, **/*_Provide*Factory*.*, **/*Module.*, **/*Module_*Factory.class, **/Dagger*Component.class, **/Dagger*Component$Builder.class, **/lint-rules/**, **/adyen/**, fastlane/**, **/*.yaml, **/*.yml, **/tests/**, tests_*, *.html, *.htm, .CSS, *.sql, **features/devtoggles/**, **/plugins/**
[15:04:27]: INFO: Excluded sources for duplication: **/di/**, **/*Module.*, **/*Module_*Factory.class
[15:04:34]: WARN: File '/bitrise/src/utils/detekt/rulesets/detekt-compose-0.3.9.jar' is bigger than 20MB and as consequence is removed from the analysis scope.
[15:04:34]: WARN: File '/bitrise/src/sonar-scanner-5.0.1.3006-linux/jre/lib/server/libjvm.so' is bigger than 20MB and as consequence is removed from the analysis scope.
[15:04:34]: WARN: File '/bitrise/src/sonar-scanner-5.0.1.3006-linux/jre/lib/modules' is bigger than 20MB and as consequence is removed from the analysis scope.
[15:04:37]: INFO: 6688 files indexed... (last one was features/food-editable-order-summary/build.gradle.kts)
[15:04:42]: INFO: 10055 files indexed
[15:04:42]: INFO: 235218 files ignored because of inclusion/exclusion patterns
[15:04:42]: INFO: 4 files ignored because of scm ignore settings
[15:04:42]: INFO: Quality profile for css: Sonar way
[15:04:42]: INFO: Quality profile for java: Sonar way
[15:04:42]: INFO: Quality profile for js: Sonar way
[15:04:42]: INFO: Quality profile for json: SonarQube Way (outdated copy since 2022-08-19 06:19:39+0000)
[15:04:42]: INFO: Quality profile for kotlin: Android - Sonar way
[15:04:42]: INFO: Quality profile for py: Sonar way
[15:04:42]: INFO: Quality profile for ruby: Sonar way
[15:04:42]: INFO: Quality profile for shell: ShellCheck
[15:04:42]: INFO: Quality profile for xml: Sonar way
[15:04:42]: INFO: ------------- Run sensors on module [REDACTED]
[15:04:42]: INFO: Load metrics repository
[15:04:42]: INFO: Load metrics repository (done) | time=117ms
[15:04:44]: INFO: Sensor JavaSensor [java]
[15:04:44]: INFO: Configured Java source version (sonar.java.source): 8, preview features enabled (sonar.java.enablePreview): false
[15:04:44]: INFO: JavaClasspath initialization
[15:04:49]: INFO: JavaClasspath initialization (done) | time=5462ms
[15:04:49]: INFO: JavaTestClasspath initialization
[15:04:49]: INFO: JavaTestClasspath initialization (done) | time=2ms
[15:04:49]: INFO: The Java analyzer is running in a context where unchanged files can be skipped. Full analysis is performed for changed files, optimized analysis for unchanged files.
[15:04:50]: INFO: Server-side caching is enabled. The Java analyzer was able to leverage cached data from previous analyses for 0 out of 2 files. These files will not be parsed.
[15:04:50]: INFO: Using ECJ batch to parse 2 Main java source files with batch size 500 KB.
[15:04:50]: INFO: Starting batch processing.
[15:04:57]: INFO: 100% analyzed
[15:04:57]: INFO: Batch processing: Done.
[15:04:57]: INFO: Optimized analysis for 2 of 2 files.
[15:04:57]: WARN: Unresolved imports/types have been detected during analysis. Enable DEBUG mode to see them.
[15:04:57]: WARN: Use of preview features have been detected during analysis. Enable DEBUG mode to see them.
[15:04:57]: INFO: No "Test" source files to scan.
[15:04:57]: INFO: No "Generated" source files to scan.
[15:04:57]: INFO: Sensor JavaSensor [java] (done) | time=13430ms
[15:04:57]: INFO: Sensor PmdSensor [pmd]
[15:04:57]: INFO: Sensor PmdSensor [pmd] (done) | time=4ms
[15:04:57]: INFO: Sensor IaC CloudFormation Sensor [iac]
[15:04:58]: INFO: 0 source files to be analyzed
[15:04:58]: INFO: 0/0 source files have been analyzed
[15:04:58]: INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=420ms
[15:04:58]: INFO: Sensor IaC Kubernetes Sensor [iac]
[15:04:58]: INFO: 0 source files to be analyzed
[15:04:58]: INFO: 0/0 source files have been analyzed
[15:04:58]: INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=26ms
[15:04:58]: INFO: Sensor C# Project Type Information [csharp]
[15:04:58]: INFO: Sensor C# Project Type Information [csharp] (done) | time=7ms
[15:04:58]: INFO: Sensor C# Analysis Log [csharp]
[15:04:58]: INFO: Sensor C# Analysis Log [csharp] (done) | time=11ms
[15:04:58]: INFO: Sensor C# Properties [csharp]
[15:04:58]: INFO: Sensor C# Properties [csharp] (done) | time=0ms
[15:04:58]: INFO: Sensor SurefireSensor [java]
[15:04:58]: INFO: parsing [/bitrise/src/target/surefire-reports]
[15:04:58]: INFO: Sensor SurefireSensor [java] (done) | time=1ms
[15:04:58]: INFO: Sensor HTML [web]
[15:04:58]: INFO: Sensor HTML is restricted to changed files only
[15:04:58]: INFO: Sensor HTML [web] (done) | time=27ms
[15:04:58]: INFO: Sensor XML Sensor [xml]
[15:04:58]: INFO: Sensor XML Sensor is restricted to changed files only
[15:04:58]: INFO: Sensor XML Sensor [xml] (done) | time=8ms
[15:04:58]: INFO: Sensor TextAndSecretsSensor [text]
[15:04:58]: INFO: Sensor TextAndSecretsSensor is restricted to changed files only
[15:04:58]: INFO: 1 source file to be analyzed
[15:04:58]: INFO: 1/1 source file has been analyzed
[15:04:58]: INFO: Sensor TextAndSecretsSensor [text] (done) | time=31ms
[15:04:58]: INFO: Sensor CheckstyleSensor [checkstyle]
[15:04:58]: INFO: Checkstyle output report: /bitrise/src/.scannerwork/checkstyle-result.xml
[15:04:58]: INFO: Checkstyle configuration: /bitrise/src/.scannerwork/checkstyle.xml
[15:04:58]: INFO: Checkstyle charset: UTF-8
[15:04:59]: INFO: Sensor CheckstyleSensor [checkstyle] (done) | time=1035ms
[15:04:59]: INFO: Sensor VB.NET Project Type Information [vbnet]
[15:04:59]: INFO: Sensor VB.NET Project Type Information [vbnet] (done) | time=5ms
[15:04:59]: INFO: Sensor VB.NET Analysis Log [vbnet]
[15:04:59]: INFO: Sensor VB.NET Analysis Log [vbnet] (done) | time=12ms
[15:04:59]: INFO: Sensor VB.NET Properties [vbnet]
[15:04:59]: INFO: Sensor VB.NET Properties [vbnet] (done) | time=0ms
[15:04:59]: INFO: Sensor Python Sensor [python]
[15:04:59]: WARN: Your code is analyzed as compatible with python 2 and 3 by default. This will prevent the detection of issues specific to python 2 or python 3. You can get a more precise analysis by setting a python version in your configuration via the parameter "sonar.python.version"
[15:04:59]: INFO: Using cached data to retrieve global symbols.
[15:04:59]: INFO: Cached information of global symbols will be used for 6 out of 6 main files. Global symbols will be recomputed for the remaining files.
[15:04:59]: INFO: Fully optimized analysis can be performed for 6 out of 6 files.
[15:04:59]: INFO: Partially optimized analysis can be performed for 6 out of 6 files.
[15:04:59]: INFO: Starting global symbols computation
[15:04:59]: INFO: 0 source files to be analyzed
[15:04:59]: INFO: 0/0 source files have been analyzed
[15:04:59]: INFO: Starting rules execution
[15:04:59]: INFO: 6 source files to be analyzed
[15:04:59]: INFO: 6/6 source files have been analyzed
[15:04:59]: INFO: The Python analyzer was able to leverage cached data from previous analyses for 6 out of 6 files. These files were not parsed.
[15:04:59]: INFO: Sensor Python Sensor [python] (done) | time=470ms
[15:04:59]: INFO: Sensor Cobertura Sensor for Python coverage [python]
[15:05:01]: INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=1896ms
[15:05:01]: INFO: Sensor PythonXUnitSensor [python]
[15:05:03]: INFO: Sensor PythonXUnitSensor [python] (done) | time=1876ms
[15:05:03]: INFO: Sensor JaCoCo XML Report Importer [jacoco]
[15:05:05]: INFO: Importing 233 report(s). Turn your logs in debug mode in order to see the exhaustive list.
[15:05:06]: ERROR: Cannot import coverage information for file 'app/src/release/java/com/[REDACTED]/[REDACTED]app/initializer/FlipperInitializer.kt', coverage data is invalid. Error: {}
[15:05:06]: java.lang.IllegalStateException: Line 14 is out of range in the file app/src/release/java/com/[REDACTED]/[REDACTED]app/initializer/FlipperInitializer.kt (lines: 4)
[15:05:06]: at org.sonar.api.utils.Preconditions.checkState(Preconditions.java:61)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.validateLine(DefaultCoverage.java:81)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.lineHits(DefaultCoverage.java:69)
[15:05:06]: at org.sonar.plugins.jacoco.ReportImporter.importCoverage(ReportImporter.java:45)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReport(JacocoSensor.java:81)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReports(JacocoSensor.java:64)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.execute(JacocoSensor.java:55)
[15:05:06]: at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:64)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:88)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:79)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.scan.SpringModuleScanContainer.doAfterStart(SpringModuleScanContainer.java:82)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scan(SpringProjectScanContainer.java:403)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scanRecursively(SpringProjectScanContainer.java:399)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.doAfterStart(SpringProjectScanContainer.java:368)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.bootstrap.SpringGlobalContainer.doAfterStart(SpringGlobalContainer.java:137)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:71)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:65)
[15:05:06]: at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/java.lang.reflect.Method.invoke(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
[15:05:06]: at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
[15:05:06]: at org.sonarsource.scanner.cli.Main.main(Main.java:62)
[15:05:06]: ERROR: Cannot import coverage information for file 'app/src/release/java/com/[REDACTED]/[REDACTED]app/HfLifecycleCallbacks.kt', coverage data is invalid. Error: {}
[15:05:06]: java.lang.IllegalStateException: Line 51 is out of range in the file app/src/release/java/com/[REDACTED]/[REDACTED]app/HfLifecycleCallbacks.kt (lines: 50)
[15:05:06]: at org.sonar.api.utils.Preconditions.checkState(Preconditions.java:61)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.validateLine(DefaultCoverage.java:81)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.lineHits(DefaultCoverage.java:69)
[15:05:06]: at org.sonar.plugins.jacoco.ReportImporter.importCoverage(ReportImporter.java:45)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReport(JacocoSensor.java:81)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReports(JacocoSensor.java:64)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.execute(JacocoSensor.java:55)
[15:05:06]: at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:64)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:88)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:79)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.scan.SpringModuleScanContainer.doAfterStart(SpringModuleScanContainer.java:82)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scan(SpringProjectScanContainer.java:403)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scanRecursively(SpringProjectScanContainer.java:399)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.doAfterStart(SpringProjectScanContainer.java:368)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.bootstrap.SpringGlobalContainer.doAfterStart(SpringGlobalContainer.java:137)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:71)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:65)
[15:05:06]: at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/java.lang.reflect.Method.invoke(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
[15:05:06]: at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
[15:05:06]: at org.sonarsource.scanner.cli.Main.main(Main.java:62)
[15:05:07]: INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3995ms
[15:05:07]: INFO: Sensor Kotlin Sensor [kotlin]
[15:05:07]: INFO: Only analyzing 8314 changed Kotlin files out of 8314.
[15:09:42]: INFO: 8314 source files to be analyzed
[15:09:52]: INFO: 1783/8314 files analyzed, current file: features/debug-web-browser/src/main/java/com/[REDACTED]/features/debugwebbrowser/ui/DebugWebBrowserViewModel.kt
[15:10:02]: INFO: 3754/8314 files analyzed, current file: features/legacy/src/main/java/com/[REDACTED]/features/legacy/features/deeplink/domain/path/AuthPath.kt
[15:10:12]: INFO: 5711/8314 files analyzed, current file: domain-layer/menu/src/main/java/com/[REDACTED]/domain/menu/experiment/browsebycategories/BrowseByCategoriesExperiment.kt
[15:10:22]: INFO: 7656/8314 files analyzed, current file: features/order-summary/src/main/java/com/[REDACTED]/features/ordersummary/domain/usecase/GetOrderSummaryMenuInfoUseCase.kt
[15:10:26]: INFO: 8314/8314 source files have been analyzed
[15:10:26]: INFO: Sensor Kotlin Sensor [kotlin] (done) | time=318605ms
[15:10:26]: INFO: Sensor KotlinSurefireSensor [kotlin]
[15:10:26]: INFO: parsing [/bitrise/src/target/surefire-reports]
[15:10:26]: INFO: Sensor KotlinSurefireSensor [kotlin] (done) | time=1ms
[15:10:26]: INFO: Sensor ShellCheck Sensor [shellcheck]
[15:10:26]: INFO: Plugin disabled by configuration for this project: the code will not be analyzed but will be highlighted.
[15:10:26]: INFO: Sensor ShellCheck Sensor [shellcheck] (done) | time=41ms
[15:10:26]: INFO: Sensor Packages sensor [jdepend]
[15:10:26]: INFO: Sensor Packages sensor [jdepend] (done) | time=2ms
[15:10:26]: INFO: Sensor JavaScript/TypeScript analysis [javascript]
[15:10:29]: INFO: 1 source file to be analyzed
[15:10:29]: INFO: 1/1 source file has been analyzed
[15:10:29]: INFO: Hit the cache for 1 out of 1
[15:10:29]: INFO: Miss the cache for 0 out of 1
[15:10:29]: INFO: Sensor JavaScript/TypeScript analysis [javascript] (done) | time=3025ms
[15:10:29]: INFO: Sensor CSS Rules [javascript]
[15:10:29]: INFO: Sensor CSS Rules is restricted to changed files only
[15:10:29]: INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
[15:10:29]: INFO: Sensor CSS Rules [javascript] (done) | time=10ms
[15:10:29]: INFO: Sensor CSS Metrics [javascript]
[15:10:29]: INFO: Sensor CSS Metrics is restricted to changed files only
[15:10:29]: INFO: Sensor CSS Metrics [javascript] (done) | time=3ms
[15:10:29]: INFO: Sensor Ruby Sensor [ruby]
[15:10:29]: INFO: Sensor Ruby Sensor is restricted to changed files only
[15:10:29]: INFO: 1 source file to be analyzed
[15:10:30]: java.io.IOException: Resource not found: "org/joda/time/tz/data/ZoneInfoMap" ClassLoader: ClassRealm{ruby}
[15:10:30]: at org.joda.time.tz.ZoneInfoProvider.openResource(ZoneInfoProvider.java:225)
[15:10:30]: at org.joda.time.tz.ZoneInfoProvider.<init>(ZoneInfoProvider.java:138)
[15:10:30]: at org.joda.time.tz.ZoneInfoProvider.<init>(ZoneInfoProvider.java:97)
[15:10:30]: at org.joda.time.DateTimeZone.getDefaultProvider(DateTimeZone.java:555)
[15:10:30]: at org.joda.time.DateTimeZone.getProvider(DateTimeZone.java:449)
[15:10:30]: at org.joda.time.DateTimeZone.forID(DateTimeZone.java:234)
[15:10:30]: at org.joda.time.DateTimeZone.getDefault(DateTimeZone.java:169)
[15:10:30]: at org.joda.time.chrono.ISOChronology.getInstance(ISOChronology.java:79)
[15:10:30]: at org.joda.time.base.BaseDateTime.<init>(BaseDateTime.java:97)
[15:10:30]: at org.joda.time.DateTime.<init>(DateTime.java:209)
[15:10:30]: at org.jruby.util.log.OutputStreamLogger.formatMessage(OutputStreamLogger.java:146)
[15:10:30]: at org.jruby.util.log.StandardErrorLogger.write(StandardErrorLogger.java:58)
[15:10:30]: at org.jruby.util.log.OutputStreamLogger.warn(OutputStreamLogger.java:67)
[15:10:30]: at org.jruby.util.io.FilenoUtil$ReflectiveAccess.<clinit>(FilenoUtil.java:278)
[15:10:30]: at org.jruby.util.io.FilenoUtil.getFilenoUsingReflection(FilenoUtil.java:143)
[15:10:30]: at org.jruby.util.io.FilenoUtil.filenoFrom(FilenoUtil.java:139)
[15:10:30]: at org.jruby.util.io.ChannelFD.initFileno(ChannelFD.java:51)
[15:10:30]: at org.jruby.util.io.ChannelFD.<init>(ChannelFD.java:37)
[15:10:30]: at org.jruby.util.io.ChannelFD.<init>(ChannelFD.java:47)
[15:10:30]: at org.jruby.util.io.OpenFile.setChannel(OpenFile.java:195)
[15:10:30]: at org.jruby.RubyIO.prepIO(RubyIO.java:263)
[15:10:30]: at org.jruby.RubyIO.prepStdio(RubyIO.java:192)
[15:10:30]: at org.jruby.RubyGlobal.initSTDIO(RubyGlobal.java:314)
[15:10:30]: at org.jruby.RubyGlobal.createGlobals(RubyGlobal.java:228)
[15:10:30]: at org.jruby.Ruby.<init>(Ruby.java:513)
[15:10:30]: at org.jruby.Ruby.newInstance(Ruby.java:716)
[15:10:30]: at org.jruby.javasupport.JavaEmbedUtils.initialize(JavaEmbedUtils.java:79)
[15:10:30]: at org.jruby.javasupport.JavaEmbedUtils.initialize(JavaEmbedUtils.java:69)
[15:10:30]: at org.sonarsource.ruby.converter.RubyConverter.initializeRubyRuntime(RubyConverter.java:182)
[15:10:30]: at org.sonarsource.ruby.converter.RubyConverter.<init>(RubyConverter.java:75)
[15:10:30]: at org.sonarsource.ruby.converter.RubyConverter.<init>(RubyConverter.java:82)
[15:10:30]: at org.sonarsource.ruby.plugin.RubySensor.astConverter(RubySensor.java:45)
[15:10:30]: at org.sonarsource.slang.plugin.SlangSensor.execute(SlangSensor.java:201)
[15:10:30]: at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:64)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:88)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:61)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:79)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:61)
[15:10:30]: at org.sonar.scanner.scan.SpringModuleScanContainer.doAfterStart(SpringModuleScanContainer.java:82)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:10:30]: at org.sonar.scanner.scan.SpringProjectScanContainer.scan(SpringProjectScanContainer.java:403)
[15:10:30]: at org.sonar.scanner.scan.SpringProjectScanContainer.scanRecursively(SpringProjectScanContainer.java:399)
[15:10:30]: at org.sonar.scanner.scan.SpringProjectScanContainer.doAfterStart(SpringProjectScanContainer.java:368)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:10:30]: at org.sonar.scanner.bootstrap.SpringGlobalContainer.doAfterStart(SpringGlobalContainer.java:137)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:10:30]: at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:71)
[15:10:30]: at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:65)
[15:10:30]: at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
[15:10:30]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[15:10:30]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
[15:10:30]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
[15:10:30]: at java.base/java.lang.reflect.Method.invoke(Unknown Source)
[15:10:30]: at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
[15:10:30]: at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
[15:10:30]: at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
[15:10:30]: at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
[15:10:30]: at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
[15:10:30]: at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
[15:10:30]: at org.sonarsource.scanner.cli.Main.main(Main.java:62)
[15:10:30]: 2024-03-20T14:10:30.059Z [main] WARN FilenoUtil : Native subprocess control requires open access to the JDK IO subsystem
[15:10:30]: Pass '--add-opens java.base/sun.nio.ch=ALL-UNNAMED --add-opens java.base/java.io=ALL-UNNAMED' to enable.
[15:10:32]: INFO: 1/1 source file has been analyzed
[15:10:32]: INFO: Sensor Ruby Sensor [ruby] (done) | time=2712ms
[15:10:32]: INFO: Sensor SimpleCov Sensor for Ruby coverage [ruby]
[15:10:32]: INFO: Sensor SimpleCov Sensor for Ruby coverage [ruby] (done) | time=1ms
[15:10:32]: INFO: Sensor ThymeLeaf template sensor [securityjavafrontend]
[15:10:32]: INFO: Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=11ms
[15:10:32]: INFO: Sensor DetektSensor [detekt]
[15:10:32]: INFO: Sensor DetektSensor [detekt] (done) | time=750ms
[15:10:32]: INFO: Sensor FindBugs Sensor [findbugs]
[15:10:32]: INFO: Findbugs plugin version: 4.2.2
[15:10:32]: INFO: Sensor FindBugs Sensor [findbugs] (done) | time=1ms
[15:10:32]: INFO: Sensor Python HTML templates processing [securitypythonfrontend]
[15:10:32]: INFO: HTML files are not indexed : you may want to add them in the scanned files of this project to detect Python XSS vulnerabilities
[15:10:32]: INFO: Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=2ms
[15:10:32]: INFO: Sensor IaC Docker Sensor [iac]
[15:10:32]: INFO: Sensor IaC Docker Sensor is restricted to changed files only
[15:10:33]: INFO: 0 source files to be analyzed
[15:10:33]: INFO: 0/0 source files have been analyzed
[15:10:33]: INFO: Sensor IaC Docker Sensor [iac] (done) | time=280ms
[15:10:33]: INFO: Sensor Serverless configuration file sensor [security]
[15:10:33]: INFO: 0 Serverless function entries were found in the project
[15:10:33]: INFO: 0 Serverless function handlers were kept as entrypoints
[15:10:33]: INFO: Sensor Serverless configuration file sensor [security] (done) | time=7ms
[15:10:33]: INFO: Sensor AWS SAM template file sensor [security]
[15:10:33]: INFO: Sensor AWS SAM template file sensor [security] (done) | time=6ms
[15:10:33]: INFO: Sensor AWS SAM Inline template file sensor [security]
[15:10:33]: INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=5ms
[15:10:33]: INFO: Sensor javabugs [dbd]
[15:10:33]: INFO: Reading IR files from: /bitrise/src/.scannerwork/ir/java
[15:10:33]: INFO: Analyzing 109 functions to detect bugs.
[15:10:33]: INFO: Sensor javabugs [dbd] (done) | time=380ms
[15:10:33]: INFO: Sensor pythonbugs [dbd]
[15:10:33]: INFO: Reading IR files from: /bitrise/src/.scannerwork/ir/python
[15:10:33]: INFO: Analyzing 38 functions to detect bugs.
[15:10:33]: INFO: Sensor pythonbugs [dbd] (done) | time=71ms
[15:10:33]: INFO: Sensor JavaSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/java
[15:10:33]: INFO: Read 71 type definitions
[15:10:33]: INFO: Reading UCFGs from: /bitrise/src/.scannerwork/ucfg2/java
[15:10:33]: INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=129, typeDefinitionsHashes.count=71}
[15:10:33]: INFO: No relevant changes detected, skipping analysis.
[15:10:33]: INFO: Sensor JavaSecuritySensor [security] (done) | time=132ms
[15:10:33]: INFO: Sensor CSharpSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/ucfg_cs2
[15:10:33]: INFO: Read 0 type definitions
[15:10:33]: INFO: No UCFGs have been included for analysis.
[15:10:33]: INFO: Sensor CSharpSecuritySensor [security] (done) | time=1ms
[15:10:33]: INFO: Sensor PhpSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/php
[15:10:33]: INFO: Read 0 type definitions
[15:10:33]: INFO: No UCFGs have been included for analysis.
[15:10:33]: INFO: Sensor PhpSecuritySensor [security] (done) | time=0ms
[15:10:33]: INFO: Sensor PythonSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/python
[15:10:33]: INFO: Read 236 type definitions
[15:10:33]: INFO: Reading UCFGs from: /bitrise/src/.scannerwork/ucfg2/python
[15:10:33]: INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=1192, typeDefinitionsHashes.count=236}
[15:10:33]: INFO: No relevant changes detected, skipping analysis.
[15:10:33]: INFO: Sensor PythonSecuritySensor [security] (done) | time=102ms
[15:10:33]: INFO: Sensor JsSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/js
[15:10:33]: INFO: Read 0 type definitions
[15:10:33]: INFO: Reading UCFGs from: /bitrise/src/.scannerwork/ucfg2/js
[15:10:33]: INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=10, typeDefinitionsHashes.count=0}
[15:10:33]: INFO: No relevant changes detected, skipping analysis.
[15:10:33]: INFO: Sensor JsSecuritySensor [security] (done) | time=7ms
[15:10:33]: INFO: ------------- Run sensors on project
[15:10:33]: INFO: Sensor Analysis Warnings import [csharp]
[15:10:33]: INFO: Sensor Analysis Warnings import [csharp] (done) | time=1ms
[15:10:33]: INFO: Sensor Dependency-Check [dependencycheck]
[15:10:33]: INFO: Process Dependency-Check report
[15:10:33]: INFO: Dependency-Check skipped
[15:10:33]: INFO: Process Dependency-Check report (done) | time=1ms
[15:10:33]: INFO: Sensor Dependency-Check [dependencycheck] (done) | time=1ms
[15:10:33]: INFO: Sensor Zero Coverage Sensor
[15:10:33]: INFO: Sensor Zero Coverage Sensor (done) | time=32ms
[15:10:33]: INFO: Sensor Java CPD Block Indexer
[15:10:34]: INFO: Sensor Java CPD Block Indexer (done) | time=50ms
[15:10:34]: INFO: SCM Publisher SCM provider for this project is: git
[15:10:34]: INFO: SCM Publisher 1 source file to be analyzed
[15:10:34]: WARN: Shallow clone detected, no blame information will be provided. You can convert to non-shallow with 'git fetch --unshallow'.
[15:10:34]: INFO: SCM Publisher 0/1 source files have been analyzed (done) | time=3ms
[15:10:34]: WARN: Missing blame information for the following files:
[15:10:34]: WARN: * utils/bitrise/script/helpers/common_helper.rb
[15:10:34]: WARN: This may lead to missing/broken features in SonarQube
[15:10:34]: INFO: CPD Executor 2327 files had no CPD blocks
[15:10:34]: INFO: CPD Executor Calculating CPD for 5629 files
[15:10:34]: INFO: CPD Executor CPD calculation finished (done) | time=465ms
[15:10:35]: INFO: SCM writing changed lines
[15:10:35]: INFO: Merge base sha1: ec517434c4c6e1b1bfa947838e81f86f6be391f9
[15:10:35]: INFO: SCM writing changed lines (done) | time=44ms
[15:10:36]: INFO: Analysis report generated in 1184ms, dir size=5.2 MB
[15:10:39]: INFO: Analysis report compressed in 3847ms, zip size=6.7 MB
[15:10:41]: INFO: Analysis report uploaded in 1624ms
[15:10:41]: INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarqube.tools-k8s.[REDACTED].io/dashboard?id=com.[REDACTED]%3A[REDACTED]&pullRequest=[REDACTED]
[15:10:41]: INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
[15:10:41]: INFO: More about the report processing at https://sonarqube.tools-k8s.[REDACTED].io/api/ce/task?id=[REDACTED]
[15:10:46]: INFO: Time spent writing ucfgs 0ms
[15:10:47]: INFO: Analysis total time: 6:27.880 s
[15:10:47]: INFO: ------------------------------------------------------------------------
[15:10:47]: INFO: EXECUTION SUCCESS
[15:10:47]: INFO: ------------------------------------------------------------------------
[15:10:47]: INFO: Total time: 6:48.778s
[15:10:47]: INFO: Final Memory: 213M/912M
[15:10:47]: INFO: ------------------------------------------------------------------------
Here I noticed that all the files are been analysed, but I want to analyse only the files that have been changed in this PR.
[15:05:07]: INFO: Only analyzing 8314 changed Kotlin files out of 8314.
Other thing that can be useful, is if there is a way to increase the number of threads to try to run the analysis faster.
Thank you in advance!