Why Kotlin sensor is not skipping unchanged files on PR?

Hello there,
I’m facing an increase time of scanning time with sonar-scanner.
Version: 5.0.1.3006
Executable: sonar-scanner-5.0.1.3006-linux/bin/sonar-scanner
Deployed: zip

Since August/23 I’m facing high time to analyse the Kotlin files. I noticed that no files has been skipped, even running on PR.

I need to find alternatives to reduce this time.

Logs:

[15:03:58]: $ /bitrise/src/sonar-scanner-5.0.1.3006-linux/bin/sonar-scanner -Dsonar.projectBaseDir=/bitrise/src -Dsonar.login=[REDACTED] -Dsonar.pullrequest.base=master -Dsonar.pullrequest.branch=[REDACTED] -Dsonar.pullrequest.key=[REDACTED]
[15:03:58]: INFO: Scanner configuration file: /bitrise/src/sonar-scanner-5.0.1.3006-linux/conf/sonar-scanner.properties
[15:03:58]: INFO: Project root configuration file: /bitrise/src/sonar-project.properties
[15:03:58]: INFO: SonarScanner 5.0.1.3006
[15:03:58]: INFO: Java 17.0.7 Eclipse Adoptium (64-bit)
[15:03:58]: INFO: Linux 5.13.0-1015-gcp amd64
[15:03:58]: INFO: User cache: /root/.sonar/cache
[15:04:01]: INFO: Analyzing on SonarQube server 10.1.0.73491
[15:04:01]: INFO: Default locale: "en_US", source code encoding: "UTF-8"
[15:04:01]: INFO: Load global settings
[15:04:02]: INFO: Load global settings (done) | time=598ms
[15:04:02]: INFO: Server id: 711B5945-AW2HMGIM4FIMCG6vEv29
[15:04:02]: INFO: User cache: /root/.sonar/cache
[15:04:02]: INFO: Load/download plugins
[15:04:02]: INFO: Load plugins index
[15:04:02]: INFO: Load plugins index (done) | time=133ms
[15:04:18]: INFO: Load/download plugins (done) | time=15921ms
[15:04:19]: INFO: Loaded core extensions: developer-scanner
[15:04:19]: INFO: Process project properties
[15:04:19]: INFO: Process project properties (done) | time=7ms
[15:04:19]: INFO: Execute project builders
[15:04:19]: INFO: Execute project builders (done) | time=1ms
[15:04:19]: INFO: Project key: com.[REDACTED]:[REDACTED]
[15:04:19]: INFO: Base dir: /bitrise/src
[15:04:19]: INFO: Working dir: /bitrise/src/.scannerwork
[15:04:19]: INFO: Load project settings for component key: 'com.[REDACTED]:[REDACTED]'
[15:04:19]: INFO: Load project settings for component key: 'com.[REDACTED]:[REDACTED]' (done) | time=173ms
[15:04:20]: INFO: Load project branches
[15:04:20]: INFO: Load project branches (done) | time=114ms
[15:04:20]: INFO: Load branch configuration
[15:04:20]: INFO: Found manual configuration of branch/PR analysis. Skipping automatic configuration.
[15:04:20]: INFO: Load branch configuration (done) | time=2ms
[15:04:20]: INFO: Auto-configuring with CI 'Bitrise'
[15:04:20]: INFO: Load quality profiles
[15:04:20]: INFO: Load quality profiles (done) | time=141ms
[15:04:20]: INFO: Load active rules
[15:04:26]: INFO: Load active rules (done) | time=6354ms
[15:04:26]: INFO: Load analysis cache
[15:04:27]: INFO: Load analysis cache | time=567ms
[15:04:27]: INFO: Pull request 17374 for merge into master from tests/sonar_qube
[15:04:27]: WARN: The property 'sonar.login' is deprecated and will be removed in the future. Please use the 'sonar.token' property instead when passing a token.
[15:04:27]: INFO: Load project repositories
[15:04:27]: INFO: Load project repositories (done) | time=220ms
[15:04:27]: INFO: SCM collecting changed files in the branch
[15:04:27]: INFO: Merge base sha1: ec517434c4c6e1b1bfa947838e81f86f6be391f9
[15:04:27]: INFO: SCM collecting changed files in the branch (done) | time=209ms
[15:04:27]: INFO: Indexing files...
[15:04:27]: INFO: Project configuration:
[15:04:27]: INFO:   Excluded sources: **/ci/**, **/*_test.go, **/vendor/**, **/testdata/*, **/*.yaml, **/*.yml, **/__init__.py, **/tests-acceptance/**, **/tests/**, **/node_modules/**, **/*test.js, **__tests__**, **/webpack/**, *.html, *.htm, *.css, *.sql, **/build/**, **/src/test/**, **/src/[REDACTED]Test/**, **/*.groovy, **/*.html, gallery, presets, lint-rules, **/*.md, **/*.jpg, **/*.png, **/*.zip, **/*.webp, **/*.ttf, **/docs/**
[15:04:27]: INFO:   Excluded sources for coverage: **/*Activity.kt, **/*Fragment.kt, **/*View.kt, **/*Sheet.kt, **/*Dialog*.kt, **/*Adapter.kt, **/*Screen.kt, **/*AdapterDelegate.kt, **/*Experiment.kt, **/*Destination.kt, **/*NavHost.kt, **/BaseRoute.kt, **/BasePath.kt, **/*Navigator.kt, **/*Wrapper.kt, **/AndroidDevice*.kt, **/legacy/**/deeplink/providers/**, **/deeplink-test/**, **/screen/**, **/view/**, **/composable/**, **/com/[REDACTED]/design/**, utils/**, **/di/**, **/buildSrc/**, **/*Dagger**, **/*MembersInjector*.*, **/*_Factory*.*, **/*_Provide*Factory*.*, **/*Module.*, **/*Module_*Factory.class, **/Dagger*Component.class, **/Dagger*Component$Builder.class, **/lint-rules/**, **/adyen/**, fastlane/**, **/*.yaml, **/*.yml, **/tests/**, tests_*, *.html, *.htm, .CSS, *.sql, **features/devtoggles/**, **/plugins/**
[15:04:27]: INFO:   Excluded sources for duplication: **/di/**, **/*Module.*, **/*Module_*Factory.class
[15:04:34]: WARN: File '/bitrise/src/utils/detekt/rulesets/detekt-compose-0.3.9.jar' is bigger than 20MB and as consequence is removed from the analysis scope.
[15:04:34]: WARN: File '/bitrise/src/sonar-scanner-5.0.1.3006-linux/jre/lib/server/libjvm.so' is bigger than 20MB and as consequence is removed from the analysis scope.
[15:04:34]: WARN: File '/bitrise/src/sonar-scanner-5.0.1.3006-linux/jre/lib/modules' is bigger than 20MB and as consequence is removed from the analysis scope.
[15:04:37]: INFO: 6688 files indexed...  (last one was features/food-editable-order-summary/build.gradle.kts)
[15:04:42]: INFO: 10055 files indexed
[15:04:42]: INFO: 235218 files ignored because of inclusion/exclusion patterns
[15:04:42]: INFO: 4 files ignored because of scm ignore settings
[15:04:42]: INFO: Quality profile for css: Sonar way
[15:04:42]: INFO: Quality profile for java: Sonar way
[15:04:42]: INFO: Quality profile for js: Sonar way
[15:04:42]: INFO: Quality profile for json: SonarQube Way (outdated copy since 2022-08-19 06:19:39+0000)
[15:04:42]: INFO: Quality profile for kotlin: Android - Sonar way
[15:04:42]: INFO: Quality profile for py: Sonar way
[15:04:42]: INFO: Quality profile for ruby: Sonar way
[15:04:42]: INFO: Quality profile for shell: ShellCheck
[15:04:42]: INFO: Quality profile for xml: Sonar way
[15:04:42]: INFO: ------------- Run sensors on module [REDACTED]
[15:04:42]: INFO: Load metrics repository
[15:04:42]: INFO: Load metrics repository (done) | time=117ms
[15:04:44]: INFO: Sensor JavaSensor [java]
[15:04:44]: INFO: Configured Java source version (sonar.java.source): 8, preview features enabled (sonar.java.enablePreview): false
[15:04:44]: INFO: JavaClasspath initialization
[15:04:49]: INFO: JavaClasspath initialization (done) | time=5462ms
[15:04:49]: INFO: JavaTestClasspath initialization
[15:04:49]: INFO: JavaTestClasspath initialization (done) | time=2ms
[15:04:49]: INFO: The Java analyzer is running in a context where unchanged files can be skipped. Full analysis is performed for changed files, optimized analysis for unchanged files.
[15:04:50]: INFO: Server-side caching is enabled. The Java analyzer was able to leverage cached data from previous analyses for 0 out of 2 files. These files will not be parsed.
[15:04:50]: INFO: Using ECJ batch to parse 2 Main java source files with batch size 500 KB.
[15:04:50]: INFO: Starting batch processing.
[15:04:57]: INFO: 100% analyzed
[15:04:57]: INFO: Batch processing: Done.
[15:04:57]: INFO: Optimized analysis for 2 of 2 files.
[15:04:57]: WARN: Unresolved imports/types have been detected during analysis. Enable DEBUG mode to see them.
[15:04:57]: WARN: Use of preview features have been detected during analysis. Enable DEBUG mode to see them.
[15:04:57]: INFO: No "Test" source files to scan.
[15:04:57]: INFO: No "Generated" source files to scan.
[15:04:57]: INFO: Sensor JavaSensor [java] (done) | time=13430ms
[15:04:57]: INFO: Sensor PmdSensor [pmd]
[15:04:57]: INFO: Sensor PmdSensor [pmd] (done) | time=4ms
[15:04:57]: INFO: Sensor IaC CloudFormation Sensor [iac]
[15:04:58]: INFO: 0 source files to be analyzed
[15:04:58]: INFO: 0/0 source files have been analyzed
[15:04:58]: INFO: Sensor IaC CloudFormation Sensor [iac] (done) | time=420ms
[15:04:58]: INFO: Sensor IaC Kubernetes Sensor [iac]
[15:04:58]: INFO: 0 source files to be analyzed
[15:04:58]: INFO: 0/0 source files have been analyzed
[15:04:58]: INFO: Sensor IaC Kubernetes Sensor [iac] (done) | time=26ms
[15:04:58]: INFO: Sensor C# Project Type Information [csharp]
[15:04:58]: INFO: Sensor C# Project Type Information [csharp] (done) | time=7ms
[15:04:58]: INFO: Sensor C# Analysis Log [csharp]
[15:04:58]: INFO: Sensor C# Analysis Log [csharp] (done) | time=11ms
[15:04:58]: INFO: Sensor C# Properties [csharp]
[15:04:58]: INFO: Sensor C# Properties [csharp] (done) | time=0ms
[15:04:58]: INFO: Sensor SurefireSensor [java]
[15:04:58]: INFO: parsing [/bitrise/src/target/surefire-reports]
[15:04:58]: INFO: Sensor SurefireSensor [java] (done) | time=1ms
[15:04:58]: INFO: Sensor HTML [web]
[15:04:58]: INFO: Sensor HTML is restricted to changed files only
[15:04:58]: INFO: Sensor HTML [web] (done) | time=27ms
[15:04:58]: INFO: Sensor XML Sensor [xml]
[15:04:58]: INFO: Sensor XML Sensor is restricted to changed files only
[15:04:58]: INFO: Sensor XML Sensor [xml] (done) | time=8ms
[15:04:58]: INFO: Sensor TextAndSecretsSensor [text]
[15:04:58]: INFO: Sensor TextAndSecretsSensor is restricted to changed files only
[15:04:58]: INFO: 1 source file to be analyzed
[15:04:58]: INFO: 1/1 source file has been analyzed
[15:04:58]: INFO: Sensor TextAndSecretsSensor [text] (done) | time=31ms
[15:04:58]: INFO: Sensor CheckstyleSensor [checkstyle]
[15:04:58]: INFO: Checkstyle output report: /bitrise/src/.scannerwork/checkstyle-result.xml
[15:04:58]: INFO: Checkstyle configuration: /bitrise/src/.scannerwork/checkstyle.xml
[15:04:58]: INFO: Checkstyle charset: UTF-8
[15:04:59]: INFO: Sensor CheckstyleSensor [checkstyle] (done) | time=1035ms
[15:04:59]: INFO: Sensor VB.NET Project Type Information [vbnet]
[15:04:59]: INFO: Sensor VB.NET Project Type Information [vbnet] (done) | time=5ms
[15:04:59]: INFO: Sensor VB.NET Analysis Log [vbnet]
[15:04:59]: INFO: Sensor VB.NET Analysis Log [vbnet] (done) | time=12ms
[15:04:59]: INFO: Sensor VB.NET Properties [vbnet]
[15:04:59]: INFO: Sensor VB.NET Properties [vbnet] (done) | time=0ms
[15:04:59]: INFO: Sensor Python Sensor [python]
[15:04:59]: WARN: Your code is analyzed as compatible with python 2 and 3 by default. This will prevent the detection of issues specific to python 2 or python 3. You can get a more precise analysis by setting a python version in your configuration via the parameter "sonar.python.version"
[15:04:59]: INFO: Using cached data to retrieve global symbols.
[15:04:59]: INFO: Cached information of global symbols will be used for 6 out of 6 main files. Global symbols will be recomputed for the remaining files.
[15:04:59]: INFO: Fully optimized analysis can be performed for 6 out of 6 files.
[15:04:59]: INFO: Partially optimized analysis can be performed for 6 out of 6 files.
[15:04:59]: INFO: Starting global symbols computation
[15:04:59]: INFO: 0 source files to be analyzed
[15:04:59]: INFO: 0/0 source files have been analyzed
[15:04:59]: INFO: Starting rules execution
[15:04:59]: INFO: 6 source files to be analyzed
[15:04:59]: INFO: 6/6 source files have been analyzed
[15:04:59]: INFO: The Python analyzer was able to leverage cached data from previous analyses for 6 out of 6 files. These files were not parsed.
[15:04:59]: INFO: Sensor Python Sensor [python] (done) | time=470ms
[15:04:59]: INFO: Sensor Cobertura Sensor for Python coverage [python]
[15:05:01]: INFO: Sensor Cobertura Sensor for Python coverage [python] (done) | time=1896ms
[15:05:01]: INFO: Sensor PythonXUnitSensor [python]
[15:05:03]: INFO: Sensor PythonXUnitSensor [python] (done) | time=1876ms
[15:05:03]: INFO: Sensor JaCoCo XML Report Importer [jacoco]
[15:05:05]: INFO: Importing 233 report(s). Turn your logs in debug mode in order to see the exhaustive list.
[15:05:06]: ERROR: Cannot import coverage information for file 'app/src/release/java/com/[REDACTED]/[REDACTED]app/initializer/FlipperInitializer.kt', coverage data is invalid. Error: {}
[15:05:06]: java.lang.IllegalStateException: Line 14 is out of range in the file app/src/release/java/com/[REDACTED]/[REDACTED]app/initializer/FlipperInitializer.kt (lines: 4)
[15:05:06]: at org.sonar.api.utils.Preconditions.checkState(Preconditions.java:61)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.validateLine(DefaultCoverage.java:81)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.lineHits(DefaultCoverage.java:69)
[15:05:06]: at org.sonar.plugins.jacoco.ReportImporter.importCoverage(ReportImporter.java:45)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReport(JacocoSensor.java:81)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReports(JacocoSensor.java:64)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.execute(JacocoSensor.java:55)
[15:05:06]: at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:64)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:88)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:79)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.scan.SpringModuleScanContainer.doAfterStart(SpringModuleScanContainer.java:82)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scan(SpringProjectScanContainer.java:403)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scanRecursively(SpringProjectScanContainer.java:399)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.doAfterStart(SpringProjectScanContainer.java:368)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.bootstrap.SpringGlobalContainer.doAfterStart(SpringGlobalContainer.java:137)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:71)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:65)
[15:05:06]: at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/java.lang.reflect.Method.invoke(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
[15:05:06]: at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
[15:05:06]: at org.sonarsource.scanner.cli.Main.main(Main.java:62)
[15:05:06]: ERROR: Cannot import coverage information for file 'app/src/release/java/com/[REDACTED]/[REDACTED]app/HfLifecycleCallbacks.kt', coverage data is invalid. Error: {}
[15:05:06]: java.lang.IllegalStateException: Line 51 is out of range in the file app/src/release/java/com/[REDACTED]/[REDACTED]app/HfLifecycleCallbacks.kt (lines: 50)
[15:05:06]: at org.sonar.api.utils.Preconditions.checkState(Preconditions.java:61)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.validateLine(DefaultCoverage.java:81)
[15:05:06]: at org.sonar.api.batch.sensor.coverage.internal.DefaultCoverage.lineHits(DefaultCoverage.java:69)
[15:05:06]: at org.sonar.plugins.jacoco.ReportImporter.importCoverage(ReportImporter.java:45)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReport(JacocoSensor.java:81)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.importReports(JacocoSensor.java:64)
[15:05:06]: at org.sonar.plugins.jacoco.JacocoSensor.execute(JacocoSensor.java:55)
[15:05:06]: at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:64)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:88)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:79)
[15:05:06]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:61)
[15:05:06]: at org.sonar.scanner.scan.SpringModuleScanContainer.doAfterStart(SpringModuleScanContainer.java:82)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scan(SpringProjectScanContainer.java:403)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.scanRecursively(SpringProjectScanContainer.java:399)
[15:05:06]: at org.sonar.scanner.scan.SpringProjectScanContainer.doAfterStart(SpringProjectScanContainer.java:368)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.scanner.bootstrap.SpringGlobalContainer.doAfterStart(SpringGlobalContainer.java:137)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:05:06]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:71)
[15:05:06]: at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:65)
[15:05:06]: at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[15:05:06]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
[15:05:06]: at java.base/java.lang.reflect.Method.invoke(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
[15:05:06]: at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
[15:05:06]: at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
[15:05:06]: at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
[15:05:06]: at org.sonarsource.scanner.cli.Main.main(Main.java:62)
[15:05:07]: INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=3995ms
[15:05:07]: INFO: Sensor Kotlin Sensor [kotlin]
[15:05:07]: INFO: Only analyzing 8314 changed Kotlin files out of 8314.
[15:09:42]: INFO: 8314 source files to be analyzed
[15:09:52]: INFO: 1783/8314 files analyzed, current file: features/debug-web-browser/src/main/java/com/[REDACTED]/features/debugwebbrowser/ui/DebugWebBrowserViewModel.kt
[15:10:02]: INFO: 3754/8314 files analyzed, current file: features/legacy/src/main/java/com/[REDACTED]/features/legacy/features/deeplink/domain/path/AuthPath.kt
[15:10:12]: INFO: 5711/8314 files analyzed, current file: domain-layer/menu/src/main/java/com/[REDACTED]/domain/menu/experiment/browsebycategories/BrowseByCategoriesExperiment.kt
[15:10:22]: INFO: 7656/8314 files analyzed, current file: features/order-summary/src/main/java/com/[REDACTED]/features/ordersummary/domain/usecase/GetOrderSummaryMenuInfoUseCase.kt
[15:10:26]: INFO: 8314/8314 source files have been analyzed
[15:10:26]: INFO: Sensor Kotlin Sensor [kotlin] (done) | time=318605ms
[15:10:26]: INFO: Sensor KotlinSurefireSensor [kotlin]
[15:10:26]: INFO: parsing [/bitrise/src/target/surefire-reports]
[15:10:26]: INFO: Sensor KotlinSurefireSensor [kotlin] (done) | time=1ms
[15:10:26]: INFO: Sensor ShellCheck Sensor [shellcheck]
[15:10:26]: INFO: Plugin disabled by configuration for this project: the code will not be analyzed but will be highlighted.
[15:10:26]: INFO: Sensor ShellCheck Sensor [shellcheck] (done) | time=41ms
[15:10:26]: INFO: Sensor Packages sensor [jdepend]
[15:10:26]: INFO: Sensor Packages sensor [jdepend] (done) | time=2ms
[15:10:26]: INFO: Sensor JavaScript/TypeScript analysis [javascript]
[15:10:29]: INFO: 1 source file to be analyzed
[15:10:29]: INFO: 1/1 source file has been analyzed
[15:10:29]: INFO: Hit the cache for 1 out of 1
[15:10:29]: INFO: Miss the cache for 0 out of 1
[15:10:29]: INFO: Sensor JavaScript/TypeScript analysis [javascript] (done) | time=3025ms
[15:10:29]: INFO: Sensor CSS Rules [javascript]
[15:10:29]: INFO: Sensor CSS Rules is restricted to changed files only
[15:10:29]: INFO: No CSS, PHP, HTML or VueJS files are found in the project. CSS analysis is skipped.
[15:10:29]: INFO: Sensor CSS Rules [javascript] (done) | time=10ms
[15:10:29]: INFO: Sensor CSS Metrics [javascript]
[15:10:29]: INFO: Sensor CSS Metrics is restricted to changed files only
[15:10:29]: INFO: Sensor CSS Metrics [javascript] (done) | time=3ms
[15:10:29]: INFO: Sensor Ruby Sensor [ruby]
[15:10:29]: INFO: Sensor Ruby Sensor is restricted to changed files only
[15:10:29]: INFO: 1 source file to be analyzed
[15:10:30]: java.io.IOException: Resource not found: "org/joda/time/tz/data/ZoneInfoMap" ClassLoader: ClassRealm{ruby}
[15:10:30]: at org.joda.time.tz.ZoneInfoProvider.openResource(ZoneInfoProvider.java:225)
[15:10:30]: at org.joda.time.tz.ZoneInfoProvider.<init>(ZoneInfoProvider.java:138)
[15:10:30]: at org.joda.time.tz.ZoneInfoProvider.<init>(ZoneInfoProvider.java:97)
[15:10:30]: at org.joda.time.DateTimeZone.getDefaultProvider(DateTimeZone.java:555)
[15:10:30]: at org.joda.time.DateTimeZone.getProvider(DateTimeZone.java:449)
[15:10:30]: at org.joda.time.DateTimeZone.forID(DateTimeZone.java:234)
[15:10:30]: at org.joda.time.DateTimeZone.getDefault(DateTimeZone.java:169)
[15:10:30]: at org.joda.time.chrono.ISOChronology.getInstance(ISOChronology.java:79)
[15:10:30]: at org.joda.time.base.BaseDateTime.<init>(BaseDateTime.java:97)
[15:10:30]: at org.joda.time.DateTime.<init>(DateTime.java:209)
[15:10:30]: at org.jruby.util.log.OutputStreamLogger.formatMessage(OutputStreamLogger.java:146)
[15:10:30]: at org.jruby.util.log.StandardErrorLogger.write(StandardErrorLogger.java:58)
[15:10:30]: at org.jruby.util.log.OutputStreamLogger.warn(OutputStreamLogger.java:67)
[15:10:30]: at org.jruby.util.io.FilenoUtil$ReflectiveAccess.<clinit>(FilenoUtil.java:278)
[15:10:30]: at org.jruby.util.io.FilenoUtil.getFilenoUsingReflection(FilenoUtil.java:143)
[15:10:30]: at org.jruby.util.io.FilenoUtil.filenoFrom(FilenoUtil.java:139)
[15:10:30]: at org.jruby.util.io.ChannelFD.initFileno(ChannelFD.java:51)
[15:10:30]: at org.jruby.util.io.ChannelFD.<init>(ChannelFD.java:37)
[15:10:30]: at org.jruby.util.io.ChannelFD.<init>(ChannelFD.java:47)
[15:10:30]: at org.jruby.util.io.OpenFile.setChannel(OpenFile.java:195)
[15:10:30]: at org.jruby.RubyIO.prepIO(RubyIO.java:263)
[15:10:30]: at org.jruby.RubyIO.prepStdio(RubyIO.java:192)
[15:10:30]: at org.jruby.RubyGlobal.initSTDIO(RubyGlobal.java:314)
[15:10:30]: at org.jruby.RubyGlobal.createGlobals(RubyGlobal.java:228)
[15:10:30]: at org.jruby.Ruby.<init>(Ruby.java:513)
[15:10:30]: at org.jruby.Ruby.newInstance(Ruby.java:716)
[15:10:30]: at org.jruby.javasupport.JavaEmbedUtils.initialize(JavaEmbedUtils.java:79)
[15:10:30]: at org.jruby.javasupport.JavaEmbedUtils.initialize(JavaEmbedUtils.java:69)
[15:10:30]: at org.sonarsource.ruby.converter.RubyConverter.initializeRubyRuntime(RubyConverter.java:182)
[15:10:30]: at org.sonarsource.ruby.converter.RubyConverter.<init>(RubyConverter.java:75)
[15:10:30]: at org.sonarsource.ruby.converter.RubyConverter.<init>(RubyConverter.java:82)
[15:10:30]: at org.sonarsource.ruby.plugin.RubySensor.astConverter(RubySensor.java:45)
[15:10:30]: at org.sonarsource.slang.plugin.SlangSensor.execute(SlangSensor.java:201)
[15:10:30]: at org.sonar.scanner.sensor.AbstractSensorWrapper.analyse(AbstractSensorWrapper.java:64)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:88)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.lambda$execute$1(ModuleSensorsExecutor.java:61)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.withModuleStrategy(ModuleSensorsExecutor.java:79)
[15:10:30]: at org.sonar.scanner.sensor.ModuleSensorsExecutor.execute(ModuleSensorsExecutor.java:61)
[15:10:30]: at org.sonar.scanner.scan.SpringModuleScanContainer.doAfterStart(SpringModuleScanContainer.java:82)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:10:30]: at org.sonar.scanner.scan.SpringProjectScanContainer.scan(SpringProjectScanContainer.java:403)
[15:10:30]: at org.sonar.scanner.scan.SpringProjectScanContainer.scanRecursively(SpringProjectScanContainer.java:399)
[15:10:30]: at org.sonar.scanner.scan.SpringProjectScanContainer.doAfterStart(SpringProjectScanContainer.java:368)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:10:30]: at org.sonar.scanner.bootstrap.SpringGlobalContainer.doAfterStart(SpringGlobalContainer.java:137)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.startComponents(SpringComponentContainer.java:188)
[15:10:30]: at org.sonar.core.platform.SpringComponentContainer.execute(SpringComponentContainer.java:167)
[15:10:30]: at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:71)
[15:10:30]: at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:65)
[15:10:30]: at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
[15:10:30]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
[15:10:30]: at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
[15:10:30]: at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
[15:10:30]: at java.base/java.lang.reflect.Method.invoke(Unknown Source)
[15:10:30]: at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
[15:10:30]: at jdk.proxy1/jdk.proxy1.$Proxy0.execute(Unknown Source)
[15:10:30]: at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
[15:10:30]: at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
[15:10:30]: at org.sonarsource.scanner.cli.Main.execute(Main.java:126)
[15:10:30]: at org.sonarsource.scanner.cli.Main.execute(Main.java:81)
[15:10:30]: at org.sonarsource.scanner.cli.Main.main(Main.java:62)
[15:10:30]: 2024-03-20T14:10:30.059Z [main] WARN FilenoUtil : Native subprocess control requires open access to the JDK IO subsystem
[15:10:30]: Pass '--add-opens java.base/sun.nio.ch=ALL-UNNAMED --add-opens java.base/java.io=ALL-UNNAMED' to enable.
[15:10:32]: INFO: 1/1 source file has been analyzed
[15:10:32]: INFO: Sensor Ruby Sensor [ruby] (done) | time=2712ms
[15:10:32]: INFO: Sensor SimpleCov Sensor for Ruby coverage [ruby]
[15:10:32]: INFO: Sensor SimpleCov Sensor for Ruby coverage [ruby] (done) | time=1ms
[15:10:32]: INFO: Sensor ThymeLeaf template sensor [securityjavafrontend]
[15:10:32]: INFO: Sensor ThymeLeaf template sensor [securityjavafrontend] (done) | time=11ms
[15:10:32]: INFO: Sensor DetektSensor [detekt]
[15:10:32]: INFO: Sensor DetektSensor [detekt] (done) | time=750ms
[15:10:32]: INFO: Sensor FindBugs Sensor [findbugs]
[15:10:32]: INFO: Findbugs plugin version: 4.2.2
[15:10:32]: INFO: Sensor FindBugs Sensor [findbugs] (done) | time=1ms
[15:10:32]: INFO: Sensor Python HTML templates processing [securitypythonfrontend]
[15:10:32]: INFO: HTML files are not indexed : you may want to add them in the scanned files of this project to detect Python XSS vulnerabilities
[15:10:32]: INFO: Sensor Python HTML templates processing [securitypythonfrontend] (done) | time=2ms
[15:10:32]: INFO: Sensor IaC Docker Sensor [iac]
[15:10:32]: INFO: Sensor IaC Docker Sensor is restricted to changed files only
[15:10:33]: INFO: 0 source files to be analyzed
[15:10:33]: INFO: 0/0 source files have been analyzed
[15:10:33]: INFO: Sensor IaC Docker Sensor [iac] (done) | time=280ms
[15:10:33]: INFO: Sensor Serverless configuration file sensor [security]
[15:10:33]: INFO: 0 Serverless function entries were found in the project
[15:10:33]: INFO: 0 Serverless function handlers were kept as entrypoints
[15:10:33]: INFO: Sensor Serverless configuration file sensor [security] (done) | time=7ms
[15:10:33]: INFO: Sensor AWS SAM template file sensor [security]
[15:10:33]: INFO: Sensor AWS SAM template file sensor [security] (done) | time=6ms
[15:10:33]: INFO: Sensor AWS SAM Inline template file sensor [security]
[15:10:33]: INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=5ms
[15:10:33]: INFO: Sensor javabugs [dbd]
[15:10:33]: INFO: Reading IR files from: /bitrise/src/.scannerwork/ir/java
[15:10:33]: INFO: Analyzing 109 functions to detect bugs.
[15:10:33]: INFO: Sensor javabugs [dbd] (done) | time=380ms
[15:10:33]: INFO: Sensor pythonbugs [dbd]
[15:10:33]: INFO: Reading IR files from: /bitrise/src/.scannerwork/ir/python
[15:10:33]: INFO: Analyzing 38 functions to detect bugs.
[15:10:33]: INFO: Sensor pythonbugs [dbd] (done) | time=71ms
[15:10:33]: INFO: Sensor JavaSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/java
[15:10:33]: INFO: Read 71 type definitions
[15:10:33]: INFO: Reading UCFGs from: /bitrise/src/.scannerwork/ucfg2/java
[15:10:33]: INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=129, typeDefinitionsHashes.count=71}
[15:10:33]: INFO: No relevant changes detected, skipping analysis.
[15:10:33]: INFO: Sensor JavaSecuritySensor [security] (done) | time=132ms
[15:10:33]: INFO: Sensor CSharpSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/ucfg_cs2
[15:10:33]: INFO: Read 0 type definitions
[15:10:33]: INFO: No UCFGs have been included for analysis.
[15:10:33]: INFO: Sensor CSharpSecuritySensor [security] (done) | time=1ms
[15:10:33]: INFO: Sensor PhpSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/php
[15:10:33]: INFO: Read 0 type definitions
[15:10:33]: INFO: No UCFGs have been included for analysis.
[15:10:33]: INFO: Sensor PhpSecuritySensor [security] (done) | time=0ms
[15:10:33]: INFO: Sensor PythonSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/python
[15:10:33]: INFO: Read 236 type definitions
[15:10:33]: INFO: Reading UCFGs from: /bitrise/src/.scannerwork/ucfg2/python
[15:10:33]: INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=1192, typeDefinitionsHashes.count=236}
[15:10:33]: INFO: No relevant changes detected, skipping analysis.
[15:10:33]: INFO: Sensor PythonSecuritySensor [security] (done) | time=102ms
[15:10:33]: INFO: Sensor JsSecuritySensor [security]
[15:10:33]: INFO: Reading type hierarchy from: /bitrise/src/.scannerwork/ucfg2/js
[15:10:33]: INFO: Read 0 type definitions
[15:10:33]: INFO: Reading UCFGs from: /bitrise/src/.scannerwork/ucfg2/js
[15:10:33]: INFO: Cache loaded: SecuritySensorCache{ucfgsHashes.count=10, typeDefinitionsHashes.count=0}
[15:10:33]: INFO: No relevant changes detected, skipping analysis.
[15:10:33]: INFO: Sensor JsSecuritySensor [security] (done) | time=7ms
[15:10:33]: INFO: ------------- Run sensors on project
[15:10:33]: INFO: Sensor Analysis Warnings import [csharp]
[15:10:33]: INFO: Sensor Analysis Warnings import [csharp] (done) | time=1ms
[15:10:33]: INFO: Sensor Dependency-Check [dependencycheck]
[15:10:33]: INFO: Process Dependency-Check report
[15:10:33]: INFO: Dependency-Check skipped
[15:10:33]: INFO: Process Dependency-Check report (done) | time=1ms
[15:10:33]: INFO: Sensor Dependency-Check [dependencycheck] (done) | time=1ms
[15:10:33]: INFO: Sensor Zero Coverage Sensor
[15:10:33]: INFO: Sensor Zero Coverage Sensor (done) | time=32ms
[15:10:33]: INFO: Sensor Java CPD Block Indexer
[15:10:34]: INFO: Sensor Java CPD Block Indexer (done) | time=50ms
[15:10:34]: INFO: SCM Publisher SCM provider for this project is: git
[15:10:34]: INFO: SCM Publisher 1 source file to be analyzed
[15:10:34]: WARN: Shallow clone detected, no blame information will be provided. You can convert to non-shallow with 'git fetch --unshallow'.
[15:10:34]: INFO: SCM Publisher 0/1 source files have been analyzed (done) | time=3ms
[15:10:34]: WARN: Missing blame information for the following files:
[15:10:34]: WARN:   * utils/bitrise/script/helpers/common_helper.rb
[15:10:34]: WARN: This may lead to missing/broken features in SonarQube
[15:10:34]: INFO: CPD Executor 2327 files had no CPD blocks
[15:10:34]: INFO: CPD Executor Calculating CPD for 5629 files
[15:10:34]: INFO: CPD Executor CPD calculation finished (done) | time=465ms
[15:10:35]: INFO: SCM writing changed lines
[15:10:35]: INFO: Merge base sha1: ec517434c4c6e1b1bfa947838e81f86f6be391f9
[15:10:35]: INFO: SCM writing changed lines (done) | time=44ms
[15:10:36]: INFO: Analysis report generated in 1184ms, dir size=5.2 MB
[15:10:39]: INFO: Analysis report compressed in 3847ms, zip size=6.7 MB
[15:10:41]: INFO: Analysis report uploaded in 1624ms
[15:10:41]: INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarqube.tools-k8s.[REDACTED].io/dashboard?id=com.[REDACTED]%3A[REDACTED]&pullRequest=[REDACTED]
[15:10:41]: INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report
[15:10:41]: INFO: More about the report processing at https://sonarqube.tools-k8s.[REDACTED].io/api/ce/task?id=[REDACTED]
[15:10:46]: INFO: Time spent writing ucfgs 0ms
[15:10:47]: INFO: Analysis total time: 6:27.880 s
[15:10:47]: INFO: ------------------------------------------------------------------------
[15:10:47]: INFO: EXECUTION SUCCESS
[15:10:47]: INFO: ------------------------------------------------------------------------
[15:10:47]: INFO: Total time: 6:48.778s
[15:10:47]: INFO: Final Memory: 213M/912M
[15:10:47]: INFO: ------------------------------------------------------------------------

Here I noticed that all the files are been analysed, but I want to analyse only the files that have been changed in this PR.

[15:05:07]: INFO: Only analyzing 8314 changed Kotlin files out of 8314.

Other thing that can be useful, is if there is a way to increase the number of threads to try to run the analysis faster.

Thank you in advance!

Someone is facing the similar issue?

I think it doesn’t make too much sense SonarQube analyse all the file of the project in a PR. I really want to make it analyse only the changed files.

Hi,

You mention that the behavior changed in August. What (else) changed in August?

When you look at the PR analysis, do all the Kotlin files show up as new?

The current version is 10.4.1. Can you upgrade and see if this is still replicable?

 
Thx,
Ann

Hey @ganncamp, thank you for your answer.

You mention that the behavior changed in August. What (else) changed in August?
Nothing that I could identify in the project.

When you look at the PR analysis, do all the Kotlin files show up as new?
No, at sonar server I can see only the changed files as expected.

The current version is 10.4.1. Can you upgrade and see if this is still replicable?
I raised a request, but it does not depend of other teams, and we can’t do it easily.

Hi,

Refreshing myself on this thread, something I didn’t catch before jumped out at me:

If you build with Gradle, you should prefer analyzing with the SonarScanner for Gradle. I don’t think it will have an impact on your analysis speed, but it will make configuration easier.

Can you provide a debug / verbose log?

Also,

Where are you executing analysis from? Tell me it’s not the scanner directory itself?

 
Thx,
Ann