##[debug]Evaluating condition for step: 'Run Code Analysis' ##[debug]Evaluating: succeeded() ##[debug]Evaluating succeeded: ##[debug]=> True ##[debug]Result: True ##[section]Starting: Run Code Analysis ============================================================================== Task : Run Code Analysis Description : Run scanner and upload the results to the SonarCloud server. Version : 1.6.3 Author : sonarsource Help : This task is not needed for Maven and Gradle projects since the scanner should be run as part of the build. [More Information](http://redirect.sonarsource.com/doc/install-configure-scanner-tfs-ts.html) ============================================================================== ##[debug]agent.TempDirectory=D:\a\_temp ##[debug]loading inputs and endpoints ##[debug]loading ENDPOINT_AUTH_PARAMETER_SYSTEMVSSCONNECTION_ACCESSTOKEN ##[debug]loading ENDPOINT_AUTH_SCHEME_SYSTEMVSSCONNECTION ##[debug]loading ENDPOINT_AUTH_SYSTEMVSSCONNECTION ##[debug]loading SECRET_SONARQUBE_ENDPOINT ##[debug]loaded 4 ##[debug]Agent.ProxyUrl=undefined ##[debug]Agent.CAInfo=undefined ##[debug]Agent.ClientCert=undefined ##[debug]Agent.SkipCertValidation=undefined ##[debug]SONARQUBE_SCANNER_MODE=MSBuild ##[debug]SONARQUBE_SCANNER_MSBUILD_EXE=D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe ##[debug]which 'D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe' ##[debug]found: 'D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe' ##[debug]which 'D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe' ##[debug]found: 'D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe' ##[debug]D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe arg: end ##[debug]exec tool: D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe ##[debug]arguments: ##[debug] end [command]D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\SonarScanner.MSBuild.exe end SonarScanner for MSBuild 4.6.2 Using the .NET Framework version of the Scanner for MSBuild Post-processing started. 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\4.0\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\10.0\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\11.0\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\12.0\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\14.0\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\15.0\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.624 Uninstalling target: C:\Users\VssAdministrator\AppData\Local\Microsoft\MSBuild\Current\Microsoft.Common.targets\ImportBefore\SonarQube.Integration.ImportBefore.targets 06:03:55.686 06:03:55.686 sonar.verbose=true was specified - setting the log verbosity to 'Debug' 06:03:55.686 Loading the SonarQube analysis config from D:\a\1\.sonarqube\conf\SonarQubeAnalysisConfig.xml 06:03:55.686 TeamBuild environment detected 06:03:55.686 Analysis base directory: D:\a\1\.sonarqube Build directory: D:\a\1 Bin directory: D:\a\1\.sonarqube\bin Config directory: D:\a\1\.sonarqube\conf Output directory: D:\a\1\.sonarqube\out Config file: D:\a\1\.sonarqube\conf\SonarQubeAnalysisConfig.xml 06:03:55.686 Attempting to locate the CodeCoverage.exe tool... 06:03:55.702 Attempting to locate the CodeCoverage.exe tool using setup configuration... 06:03:55.717 Code coverage command line tool: C:\Program Files (x86)\Microsoft Visual Studio\2017\Enterprise\Team Tools\Dynamic Code Coverage Tools\CodeCoverage.exe 06:03:55.717 Fetching code coverage report information from TFS... 06:03:55.717 Attempting to locate a test results (.trx) file... 06:03:56.125 Looking for TRX files in: D:\a\1\TestResults, D:\a\1\s\TestResults 06:03:56.125 The following test results files were found: D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16.trx 06:03:56.515 Absolute path to coverage file: D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639\VssAdministrator_fv-az639 2019-09-06 05_53_50.coverage 06:03:56.515 The following code coverage attachments were found from the trx files: D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639\VssAdministrator_fv-az639 2019-09-06 05_53_50.coverage 06:03:56.515 Not using the fallback mechanism to detect binary coverage files. 06:03:56.531 Executing file C:\Program Files (x86)\Microsoft Visual Studio\2017\Enterprise\Team Tools\Dynamic Code Coverage Tools\CodeCoverage.exe Args: analyze /output:D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639\VssAdministrator_fv-az639 2019-09-06 05_53_50.coveragexml D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639\VssAdministrator_fv-az639 2019-09-06 05_53_50.coverage Working directory: D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639 Timeout (ms):60000 Process id: 4384 06:04:00.256 Process returned exit code 0 Generating SonarQube project properties file to D:\a\1\.sonarqube\out\sonar-project.properties Setting analysis property: sonar.visualstudio.enable=false The supplied Code Analysis ErrorLog file is a valid json file and does not need to be fixed: %%LISTOFCREATEDDLLS%%.RoslynCA.json The supplied Code Analysis ErrorLog file is a valid json file and does not need to be fixed: %%LISTOFCREATEDDLLS%%.RoslynCA.json Using TFS/VSTS sources directory as project base directory: 'D:\a\1\s'. WARNING: File 'D:\a\1\s\Tests.Integration\IntegrationTest.runsettings' does not exist. File was referenced by the following projects: 'D:\a\1\s\Tests.Integration\Tests.Integration.csproj'. Dumping content of sonar-project.properties ------------------------------------------------------------------------ sonar.projectKey=%%PROJ-KEY%% sonar.working.directory=D:\\a\\1\\.sonarqube\\out\\.sonar sonar.projectBaseDir=D:\\a\\1\\s sonar.sources=\ sonar.organization=%NAME% sonar.cs.vstest.reportsPaths=D:\\a\\1\\s\\TestResults\\VssAdministrator_fv-az639_2019-09-06_05_54_16.trx sonar.cs.vscoveragexml.reportsPaths=D:\\a\\1\\s\\TestResults\\VssAdministrator_fv-az639_2019-09-06_05_54_16\\In\\fv-az639\\VssAdministrator_fv-az639 2019-09-06 05_53_50.coveragexml sonar.host.url=https://sonarcloud.io/ sonar.projectKey=%PROJECT% sonar.projectName= sonar.projectVersion=1.0 sonar.branch.name=develop sonar.scanner.metadataFilePath=D:\\a\\_temp\\sonar\\ServiceFabric_develop_20190906.1\\cdf145fb-2e28-bde6-0205-0b4ca3ccb07b\\report-task.txt sonar.visualstudio.enable=false sonar.modules=00509C13-7C68-4FE2-8013-3FBC311C0FF5,4727BDC5-509C-4525-8C1A-5C2C5B65E1A2,5F6F9702-6BDE-4773-9D2A-728A45EFC05B,A0452147-3662-422C-981C-E36581E9B446,97A71552-730E-40C0-A0B5-99CF0601BBC2,5CFE22AC-C368-4968-B259-CDA6F2A0C339,E519093A-8295-4E9B-967A-FDF27BE63446,A3D2A1C1-719F-4F43-A9A4-328B315368D2,788CECE6-9BC3-40F4-8FE4-83F82AD762C8,071AD618-FBA0-4D06-97A8-79E57E2275D5,B79DD88E-F5E4-420C-A8C3-CC7D87F26794,9E3BA4FF-94D6-48A4-BC2B-256A69192E2C,CFF16490-D2E0-4D45-84C3-52CCB8BE21F9,68E9CF0E-4CCF-43EF-9A4A-E1E79908B73B,5FFDE67A-5041-47AC-9C0B-948B82975D31,9F242706-6100-4358-A191-B28EEFDEB108,E9DF49A2-5BCD-416D-A978-30EDB67E0059,5D72C409-C2A4-4070-85D5-822D1D092EBC,1BF4F8EE-CFE9-4D6E-AAE4-6B0785D97C8E,5006B357-CDDB-41AC-81FE-207F84777A95,2703F97D-F50B-46BB-9A52-6FE3AE99238E,0396BD68-C5EC-45BC-866E-96F1C35DA246,511D832B-1A2E-4862-8188-29D8F75E3379,0C62D53E-FCDC-40BB-A3E9-FE4473EABDD9,58543DB7-42A2-4E02-8C64-DB6B2C06E36A,BE878510-D098-4B41-9E5B-429BA3944D97,FC5AADCD-1950-4B7E-AD1E-58990C3B8F2F,3C50200C-3EB2-4B48-9A92-E547573EF5D2,12B60D21-2B08-40B4-8D43-CDF608326BE6,9C1281D1-B273-431F-9995-977EE72B137B,78B903E8-1B72-4E15-8B16-A4F5DD6398F4,A8753C33-0C16-45DC-B7E9-FE4FEFD4EC91,4E0382CD-DF8B-4E9B-85D5-9322010BC378,AE90794A-4F70-4CA0-A937-35FC1CEA733F,42DC15B9-772A-4DF6-8059-049631A6E649,85FFE987-9417-4618-8106-222A82FD3604,5A54ADFE-9124-488A-8A47-D8DBB3377086,C465B3BC-A7A5-4E30-AD1D-0AF536D3D3FE,053CB8B3-A4D2-46E4-A2C4-CEF0A412754A,36030A6B-9B1C-494A-B1B6-AA3413AD3DFF,4B9301DC-E090-41BC-8FDC-1BCA95E632B6,24E2BE11-3F40-44B7-9816-1F1E80111768 ------------------------------------------------------------------------ Writing processing summary to D:\a\1\.sonarqube\out\ProjectInfo.log Calling the SonarQube Scanner... Executing file D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\sonar-scanner-3.3.0.1492\bin\sonar-scanner.bat Args: -Dsonar.scanAllFiles=true -Dproject.settings=D:\a\1\.sonarqube\out\sonar-project.properties --embedded --debug Working directory: D:\a\1 Timeout (ms):-1 Process id: 3468 06:04:05.693 INFO: Scanner configuration file: D:\a\_tasks\SonarCloudPrepare_14d9cde6-c1da-4d55-aa01-2965cd301255\1.8.2\classic-sonar-scanner-msbuild\sonar-scanner-3.3.0.1492\bin\..\conf\sonar-scanner.properties 06:04:05.786 INFO: Project root configuration file: D:\a\1\.sonarqube\out\sonar-project.properties 06:04:06.228 INFO: SonarQube Scanner 3.3.0.1492 06:04:06.228 INFO: Java 1.8.0_222 Azul Systems, Inc. (64-bit) 06:04:06.228 INFO: Windows Server 2016 10.0 amd64 06:04:08.376 DEBUG: keyStore is : 06:04:08.376 DEBUG: keyStore type is : jks 06:04:08.376 DEBUG: keyStore provider is : 06:04:08.376 DEBUG: init keystore 06:04:08.391 DEBUG: init keymanager of type SunX509 06:04:09.502 DEBUG: Create: C:\Users\VssAdministrator\.sonar\cache 06:04:09.502 INFO: User cache: C:\Users\VssAdministrator\.sonar\cache 06:04:09.502 DEBUG: Create: C:\Users\VssAdministrator\.sonar\cache\_tmp 06:04:09.502 DEBUG: Extract sonar-scanner-api-batch in temp... 06:04:09.596 DEBUG: Get bootstrap index... 06:04:09.596 DEBUG: Download: https://sonarcloud.io/batch/index 06:04:11.019 DEBUG: Get bootstrap completed 06:04:11.192 DEBUG: Download https://sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.485-all.jar to C:\Users\VssAdministrator\.sonar\cache\_tmp\fileCache2795050465864402403.tmp 06:04:12.739 DEBUG: Create isolated classloader... 06:04:13.036 DEBUG: Start temp cleaning... 06:04:13.067 DEBUG: Temp cleaning done 06:04:13.067 DEBUG: Execution getVersion 06:04:13.067 INFO: SonarQube server 8.0.0 06:04:13.083 INFO: Default locale: "en_US", source code encoding: "windows-1252" (analysis is platform dependent) 06:04:13.083 DEBUG: Work directory: D:\a\1\.sonarqube\out\.sonar 06:04:13.083 DEBUG: Execution execute 06:04:14.750 DEBUG: SonarCloud 8.0.0.485 06:04:14.875 INFO: Load global settings 06:04:15.469 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=579ms 06:04:15.500 INFO: Load global settings (done) | time=625ms 06:04:15.515 INFO: Server id: 74E9293D-AWHW8ct9-T_TB3XqouNu 06:04:15.640 DEBUG: Create : C:\Users\VssAdministrator\.sonar\_tmp 06:04:15.656 INFO: User cache: C:\Users\VssAdministrator\.sonar\cache 06:04:15.656 INFO: Load/download plugins 06:04:15.656 INFO: Load plugins index 06:04:15.750 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=94ms 06:04:15.953 INFO: Load plugins index (done) | time=297ms 06:04:15.953 DEBUG: Download plugin 'scmgit' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache8513089433627754094.tmp' 06:04:16.062 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=109ms 06:04:16.657 DEBUG: Unpacking plugin scmgit 06:04:17.519 DEBUG: Download plugin 'jacoco' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache2921844020365828466.tmp' 06:04:17.612 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=93ms 06:04:17.612 DEBUG: Unpacking plugin jacoco 06:04:17.612 DEBUG: Download plugin 'license' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache2182222882996006384.tmp' 06:04:17.722 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=110ms 06:04:17.722 DEBUG: Unpacking plugin license 06:04:17.722 DEBUG: Download plugin 'scmmercurial' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache3037860364250715907.tmp' 06:04:17.815 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=93ms 06:04:17.831 DEBUG: Unpacking plugin scmmercurial 06:04:17.831 DEBUG: Download plugin 'abap' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache9155606361202204276.tmp' 06:04:17.930 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=99ms 06:04:18.024 DEBUG: Unpacking plugin abap 06:04:18.260 DEBUG: Download plugin 'sonarapex' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache7573752824491122400.tmp' 06:04:18.354 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=94ms 06:04:18.557 DEBUG: Unpacking plugin sonarapex 06:04:19.200 DEBUG: Download plugin 'csharp' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache2233885597909194968.tmp' 06:04:19.309 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=109ms 06:04:19.418 DEBUG: Unpacking plugin csharp 06:04:19.965 DEBUG: Download plugin 'cpp' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache2026410598651454708.tmp' 06:04:20.059 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=94ms 06:04:21.502 DEBUG: Unpacking plugin cpp 06:04:23.034 DEBUG: Download plugin 'cobol' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache811363020425711314.tmp' 06:04:23.146 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=112ms 06:04:23.177 DEBUG: Unpacking plugin cobol 06:04:23.645 DEBUG: Download plugin 'cssfamily' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache2103745832088283910.tmp' 06:04:23.739 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=94ms 06:04:24.005 DEBUG: Unpacking plugin cssfamily 06:04:24.490 DEBUG: Download plugin 'flex' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache2298105684427769630.tmp' 06:04:24.584 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=94ms 06:04:24.600 DEBUG: Unpacking plugin flex 06:04:24.818 DEBUG: Download plugin 'go' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache7383253244433783162.tmp' 06:04:24.912 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=94ms 06:04:25.382 DEBUG: Unpacking plugin go 06:04:26.414 DEBUG: Download plugin 'web' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache4612016788804382718.tmp' 06:04:26.508 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=94ms 06:04:26.524 DEBUG: Unpacking plugin web 06:04:26.680 DEBUG: Download plugin 'javascript' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache1215434782071535664.tmp' 06:04:26.773 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=93ms 06:04:26.914 DEBUG: Unpacking plugin javascript 06:04:27.603 DEBUG: Download plugin 'java' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache1700676001784172537.tmp' 06:04:27.712 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=109ms 06:04:27.774 DEBUG: Unpacking plugin java 06:04:28.980 DEBUG: Download plugin 'kotlin' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache7204759642581766203.tmp' 06:04:29.076 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=96ms 06:04:29.166 DEBUG: Unpacking plugin kotlin 06:04:30.324 DEBUG: Download plugin 'php' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache1614657319517669321.tmp' 06:04:30.433 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=109ms 06:04:30.464 DEBUG: Unpacking plugin php 06:04:31.188 DEBUG: Download plugin 'plsql' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache9099284904667146766.tmp' 06:04:31.281 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=93ms 06:04:31.297 DEBUG: Unpacking plugin plsql 06:04:31.594 DEBUG: Download plugin 'python' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache5702435599814966144.tmp' 06:04:31.688 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=94ms 06:04:31.719 DEBUG: Unpacking plugin python 06:04:32.189 DEBUG: Download plugin 'ruby' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache24655275981584457.tmp' 06:04:32.296 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=107ms 06:04:32.374 DEBUG: Unpacking plugin ruby 06:04:33.893 DEBUG: Download plugin 'sonarscala' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache4909799498488067340.tmp' 06:04:33.986 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=93ms 06:04:34.316 DEBUG: Unpacking plugin sonarscala 06:04:36.051 DEBUG: Download plugin 'swift' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache5692191857151574738.tmp' 06:04:36.145 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=94ms 06:04:36.176 DEBUG: Unpacking plugin swift 06:04:36.507 DEBUG: Download plugin 'typescript' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache7755628189597390278.tmp' 06:04:36.601 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=typescript&acceptCompressions=pack200 | time=94ms 06:04:36.664 DEBUG: Unpacking plugin typescript 06:04:36.835 DEBUG: Download plugin 'tsql' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache4941151282033989082.tmp' 06:04:36.929 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=94ms 06:04:36.945 DEBUG: Unpacking plugin tsql 06:04:37.269 DEBUG: Download plugin 'vbnet' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache8601001201246182394.tmp' 06:04:37.379 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=110ms 06:04:37.426 DEBUG: Unpacking plugin vbnet 06:04:38.005 DEBUG: Download plugin 'xml' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache4739295312271103353.tmp' 06:04:38.099 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=94ms 06:04:38.114 DEBUG: Unpacking plugin xml 06:04:38.428 DEBUG: Download plugin 'security' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache1298030951027718754.tmp' 06:04:38.522 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=94ms 06:04:38.569 DEBUG: Unpacking plugin security 06:04:38.834 DEBUG: Download plugin 'securitycsharpfrontend' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache6334724323527045503.tmp' 06:04:38.928 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=94ms 06:04:39.116 DEBUG: Unpacking plugin securitycsharpfrontend 06:04:39.320 DEBUG: Download plugin 'securityjavafrontend' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache4380912737372002993.tmp' 06:04:39.426 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=106ms 06:04:39.488 DEBUG: Unpacking plugin securityjavafrontend 06:04:39.598 DEBUG: Download plugin 'securityphpfrontend' to 'C:\Users\VssAdministrator\.sonar\_tmp\fileCache7209512259580896390.tmp' 06:04:39.691 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=93ms 06:04:39.769 DEBUG: Unpacking plugin securityphpfrontend 06:04:40.082 INFO: Load/download plugins (done) | time=24426ms 06:04:41.256 DEBUG: Plugins: 06:04:41.256 DEBUG: * SonarCSS 1.1.1.1010 (cssfamily) 06:04:41.256 DEBUG: * SonarPLSQL 3.4.1.2576 (plsql) 06:04:41.256 DEBUG: * SonarScala 1.7.0.883 (sonarscala) 06:04:41.256 DEBUG: * SonarC# 7.16.0.8981 (csharp) 06:04:41.256 DEBUG: * Vulnerability Analysis 8.0.0-M1.5391 (security) 06:04:41.256 DEBUG: * SonarJava 5.14.0.18788 (java) 06:04:41.256 DEBUG: * SonarHTML 3.2.0.2082 (web) 06:04:41.256 DEBUG: * SonarFlex 2.5.1.1831 (flex) 06:04:41.256 DEBUG: * SonarXML 2.0.1.2020 (xml) 06:04:41.256 DEBUG: * SonarTS 1.9.0.3766 (typescript) 06:04:41.256 DEBUG: * SonarVB 7.16.0.8981 (vbnet) 06:04:41.256 DEBUG: * SonarSwift 4.1.0.3087 (swift) 06:04:41.256 DEBUG: * SonarCFamily 6.3.0.11371 (cpp) 06:04:41.256 DEBUG: * SonarPython 1.14.1.3143 (python) 06:04:41.256 DEBUG: * JaCoCo 1.0.2.475 (jacoco) 06:04:41.256 DEBUG: * Mercurial 1.1.2 (scmmercurial) 06:04:41.256 DEBUG: * SonarGo 1.7.0.883 (go) 06:04:41.256 DEBUG: * SonarKotlin 1.7.0.883 (kotlin) 06:04:41.256 DEBUG: * SonarTSQL 1.4.0.3334 (tsql) 06:04:41.256 DEBUG: * SonarApex 1.7.0.883 (sonarapex) 06:04:41.256 DEBUG: * SonarJS 5.2.1.7778 (javascript) 06:04:41.256 DEBUG: * SonarRuby 1.7.0.883 (ruby) 06:04:41.256 DEBUG: * Vulnerability Rules for C# 8.0.0-M1.5391 (securitycsharpfrontend) 06:04:41.256 DEBUG: * Vulnerability Rules for Java 8.0.0-M1.5391 (securityjavafrontend) 06:04:41.256 DEBUG: * License for SonarLint 8.0.0.485 (license) 06:04:41.256 DEBUG: * SonarCOBOL 4.4.0.3403 (cobol) 06:04:41.256 DEBUG: * Git 1.10.0.1786 (scmgit) 06:04:41.256 DEBUG: * SonarPHP 3.2.0.4868 (php) 06:04:41.256 DEBUG: * SonarABAP 3.8.0.2034 (abap) 06:04:41.256 DEBUG: * Vulnerability Rules for PHP 8.0.0-M1.5391 (securityphpfrontend) 06:04:41.318 INFO: Loaded core extensions: developer-scanner 06:04:41.350 DEBUG: Installed core extension: developer-scanner 06:04:42.242 INFO: Process project properties 06:04:42.320 DEBUG: Process project properties (done) | time=78ms 06:04:42.335 INFO: Execute project builders 06:04:42.335 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor 06:04:42.460 DEBUG: Processing D:\a\1\.sonarqube\out\83\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\0\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\42\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\84\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\1\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\43\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\98\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\10\output-cs\file-metadata.pb 06:04:42.507 DEBUG: Processing D:\a\1\.sonarqube\out\57\output-cs\file-metadata.pb 06:04:42.523 DEBUG: Processing D:\a\1\.sonarqube\out\100\output-cs\file-metadata.pb 06:04:42.523 DEBUG: Processing D:\a\1\.sonarqube\out\19\output-cs\file-metadata.pb 06:04:42.523 DEBUG: Processing D:\a\1\.sonarqube\out\59\output-cs\file-metadata.pb 06:04:42.538 DEBUG: Processing D:\a\1\.sonarqube\out\99\output-cs\file-metadata.pb 06:04:42.538 DEBUG: Processing D:\a\1\.sonarqube\out\11\output-cs\file-metadata.pb 06:04:42.538 DEBUG: Processing D:\a\1\.sonarqube\out\58\output-cs\file-metadata.pb 06:04:42.538 DEBUG: Processing D:\a\1\.sonarqube\out\12\output-cs\file-metadata.pb 06:04:42.538 DEBUG: Processing D:\a\1\.sonarqube\out\95\output-cs\file-metadata.pb 06:04:42.538 DEBUG: Processing D:\a\1\.sonarqube\out\54\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\13\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\79\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\87\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\14\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\46\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\88\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\15\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\47\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\89\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\16\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\48\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\92\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\17\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\51\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\18\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\96\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\55\output-cs\file-metadata.pb 06:04:42.554 DEBUG: Processing D:\a\1\.sonarqube\out\85\output-cs\file-metadata.pb 06:04:42.570 DEBUG: Processing D:\a\1\.sonarqube\out\2\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\44\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\20\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\61\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\21\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\62\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\22\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\63\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\23\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\64\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\24\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\65\output-cs\file-metadata.pb 06:04:42.585 DEBUG: Processing D:\a\1\.sonarqube\out\25\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\66\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\26\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\67\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\27\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\68\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\28\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\69\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\29\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\70\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\3\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\60\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\30\output-cs\file-metadata.pb 06:04:42.601 DEBUG: Processing D:\a\1\.sonarqube\out\71\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\31\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\72\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\32\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\73\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\33\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\74\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\34\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\75\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\35\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\76\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\36\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\77\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\37\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\78\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\38\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\80\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\39\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\81\output-cs\file-metadata.pb 06:04:42.632 DEBUG: Processing D:\a\1\.sonarqube\out\86\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\4\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\45\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\41\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\90\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\49\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\5\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\91\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\50\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\6\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\93\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\52\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\7\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\94\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\53\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\8\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\97\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\56\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Processing D:\a\1\.sonarqube\out\9\output-cs\file-metadata.pb 06:04:42.648 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor 06:04:42.648 INFO: Execute project builders (done) | time=313ms 06:04:42.663 INFO: Project key: %%ProjKey%% 06:04:42.663 INFO: Base dir: D:\a\1\s 06:04:42.663 INFO: Working dir: D:\a\1\.sonarqube\out\.sonar 06:04:42.663 DEBUG: Project global encoding: windows-1252, default locale: en_US 06:04:42.679 DEBUG: Creating module hierarchy 06:04:43.321 INFO: Load branch configuration 06:04:43.321 DEBUG: Found manual configuration of branch/PR analysis. Skipping automatic configuration. 06:04:43.321 INFO: Load branch configuration (done) | time=0ms 06:04:43.368 DEBUG: Available languages: 06:04:43.368 DEBUG: * CSS => "css" 06:04:43.368 DEBUG: * PL/SQL => "plsql" 06:04:43.368 DEBUG: * Scala => "scala" 06:04:43.368 DEBUG: * C# => "cs" 06:04:43.368 DEBUG: * Java => "java" 06:04:43.368 DEBUG: * HTML => "web" 06:04:43.368 DEBUG: * JSP => "jsp" 06:04:43.368 DEBUG: * Flex => "flex" 06:04:43.368 DEBUG: * XML => "xml" 06:04:43.368 DEBUG: * TypeScript => "ts" 06:04:43.368 DEBUG: * VB.NET => "vbnet" 06:04:43.368 DEBUG: * Swift => "swift" 06:04:43.368 DEBUG: * C => "c" 06:04:43.368 DEBUG: * C++ => "cpp" 06:04:43.368 DEBUG: * Objective-C => "objc" 06:04:43.368 DEBUG: * Python => "py" 06:04:43.368 DEBUG: * Go => "go" 06:04:43.368 DEBUG: * Kotlin => "kotlin" 06:04:43.368 DEBUG: * T-SQL => "tsql" 06:04:43.368 DEBUG: * Apex => "apex" 06:04:43.368 DEBUG: * JavaScript => "js" 06:04:43.368 DEBUG: * Ruby => "ruby" 06:04:43.368 DEBUG: * COBOL => "cobol" 06:04:43.368 DEBUG: * PHP => "php" 06:04:43.368 DEBUG: * ABAP => "abap" 06:04:43.368 INFO: Load quality profiles 06:04:43.493 DEBUG: GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=%%ProjKey%%&organization=%%org%% | time=125ms 06:04:43.540 INFO: Load quality profiles (done) | time=172ms 06:04:43.540 INFO: Detected Azure DevOps 06:04:43.555 INFO: Load active rules 06:04:43.682 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_5&ps=500&p=1 | time=127ms 06:04:43.901 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAI&ps=500&p=1 | time=109ms 06:04:44.026 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_1&ps=500&p=1 | time=109ms 06:04:44.135 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_6&ps=500&p=1 | time=109ms 06:04:44.293 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_0&ps=500&p=1 | time=111ms 06:04:44.402 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_z&ps=500&p=1 | time=109ms 06:04:44.543 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_3&ps=500&p=1 | time=125ms 06:04:44.762 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_8&ps=500&p=1 | time=172ms 06:04:44.887 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_w&ps=500&p=1 | time=110ms 06:04:44.996 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_y&ps=500&p=1 | time=109ms 06:04:45.105 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_4&ps=500&p=1 | time=109ms 06:04:45.216 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN__&ps=500&p=1 | time=111ms 06:04:45.341 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_-&ps=500&p=1 | time=109ms 06:04:45.498 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAH&ps=500&p=1 | time=141ms 06:04:45.623 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAK&ps=500&p=1 | time=110ms 06:04:45.748 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAJ&ps=500&p=1 | time=110ms 06:04:45.848 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAD&ps=500&p=1 | time=100ms 06:04:45.957 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_9&ps=500&p=1 | time=109ms 06:04:46.066 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAA&ps=500&p=1 | time=109ms 06:04:46.216 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_2&ps=500&p=1 | time=150ms 06:04:46.326 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_v&ps=500&p=1 | time=110ms 06:04:46.451 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAE&ps=500&p=1 | time=110ms 06:04:46.576 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAB&ps=500&p=1 | time=125ms 06:04:46.701 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLOAC&ps=500&p=1 | time=125ms 06:04:46.810 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AWt5k8AwYxfuI0qRLN_x&ps=500&p=1 | time=109ms 06:04:46.826 INFO: Load active rules (done) | time=3271ms 06:04:46.951 INFO: Organization key: %%OrgKey%% 06:04:46.951 INFO: Branch name: develop, type: long living 06:04:46.998 DEBUG: Declared extensions of language CSS were converted to sonar.lang.patterns.css : **/*.css,**/*.less,**/*.scss 06:04:46.998 DEBUG: Declared extensions of language PL/SQL were converted to sonar.lang.patterns.plsql : **/*.sql,**/*.tab,**/*.pkb 06:04:46.998 DEBUG: Declared extensions of language Scala were converted to sonar.lang.patterns.scala : **/*.scala 06:04:46.998 DEBUG: Declared extensions of language C# were converted to sonar.lang.patterns.cs : **/*.cs 06:04:46.998 DEBUG: Declared extensions of language Java were converted to sonar.lang.patterns.java : **/*.java,**/*.jav 06:04:46.998 DEBUG: Declared extensions of language HTML were converted to sonar.lang.patterns.web : **/*.html,**/*.xhtml,**/*.cshtml,**/*.vbhtml,**/*.aspx,**/*.ascx,**/*.rhtml,**/*.erb,**/*.shtm,**/*.shtml 06:04:46.998 DEBUG: Declared extensions of language JSP were converted to sonar.lang.patterns.jsp : **/*.jsp,**/*.jspf,**/*.jspx 06:04:46.998 DEBUG: Declared extensions of language Flex were converted to sonar.lang.patterns.flex : **/*.as 06:04:46.998 DEBUG: Declared extensions of language XML were converted to sonar.lang.patterns.xml : **/*.xml,**/*.xsd,**/*.xsl 06:04:46.998 DEBUG: Declared extensions of language TypeScript were converted to sonar.lang.patterns.ts : **/*.ts,**/*.tsx 06:04:46.998 DEBUG: Declared extensions of language VB.NET were converted to sonar.lang.patterns.vbnet : **/*.vb 06:04:46.998 DEBUG: Declared extensions of language Swift were converted to sonar.lang.patterns.swift : **/*.swift 06:04:46.998 DEBUG: Declared extensions of language C were converted to sonar.lang.patterns.c : **/*.c,**/*.h 06:04:46.998 DEBUG: Declared extensions of language C++ were converted to sonar.lang.patterns.cpp : **/*.cc,**/*.cpp,**/*.cxx,**/*.c++,**/*.hh,**/*.hpp,**/*.hxx,**/*.h++,**/*.ipp 06:04:46.998 DEBUG: Declared extensions of language Objective-C were converted to sonar.lang.patterns.objc : **/*.m 06:04:46.998 DEBUG: Declared extensions of language Python were converted to sonar.lang.patterns.py : **/*.py 06:04:46.998 DEBUG: Declared extensions of language Go were converted to sonar.lang.patterns.go : **/*.go 06:04:46.998 DEBUG: Declared extensions of language Kotlin were converted to sonar.lang.patterns.kotlin : **/*.kt 06:04:46.998 DEBUG: Declared extensions of language T-SQL were converted to sonar.lang.patterns.tsql : **/*.tsql 06:04:46.998 DEBUG: Declared extensions of language Apex were converted to sonar.lang.patterns.apex : **/*.cls,**/*.trigger 06:04:46.998 DEBUG: Declared extensions of language JavaScript were converted to sonar.lang.patterns.js : **/*.js,**/*.jsx,**/*.vue 06:04:46.998 DEBUG: Declared extensions of language Ruby were converted to sonar.lang.patterns.ruby : **/*.rb 06:04:46.998 DEBUG: Declared extensions of language COBOL were converted to sonar.lang.patterns.cobol : 06:04:46.998 DEBUG: Declared extensions of language PHP were converted to sonar.lang.patterns.php : **/*.php,**/*.php3,**/*.php4,**/*.php5,**/*.phtml,**/*.inc 06:04:46.998 DEBUG: Declared extensions of language ABAP were converted to sonar.lang.patterns.abap : **/*.abap,**/*.ab4,**/*.flow,**/*.asprog 06:04:47.013 DEBUG: Will ignore generated code 06:04:47.013 DEBUG: Will ignore generated code 06:04:47.013 INFO: Indexing files... 06:04:47.013 INFO: Project configuration: 06:04:47.029 DEBUG: readpipe [git, --version],C:\agents\2.155.1\externals\git\cmd 06:04:47.185 DEBUG: readpipe may return 'git version 2.21.0.windows.1' 06:04:47.185 DEBUG: remaining output: 06:04:47.185 DEBUG: readpipe [git, config, --system, --edit],C:\agents\2.155.1\externals\git\cmd 06:04:48.078 DEBUG: readpipe may return 'C:/agents/2.155.1/externals/git/mingw64/etc/gitconfig' 06:04:48.078 DEBUG: remaining output: 06:04:48.437 DEBUG: 1199 non excluded files in this Git repository 06:04:48.437 INFO: Indexing files of module 'Common.Helpers' 06:04:50.278 INFO: 1062 files indexed 06:04:50.278 INFO: 0 files ignored because of scm ignore settings 06:04:50.278 INFO: Quality profile for cs: Sonar way 06:04:50.278 INFO: Quality profile for xml: Sonar way 06:04:50.278 INFO: ------------- Run sensors on moduless 06:05:05.316 INFO: Importing 60 Roslyn reports 06:05:06.369 INFO: Sensor C# [csharp] (done) | time=5410ms 06:05:06.369 INFO: Sensor C# Tests Coverage Report Import [csharp] 06:05:06.369 INFO: Parsing the Visual Studio coverage XML report D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639\VssAdministrator_fv-az639 2019-09-06 05_53_50.coveragexml 06:05:06.745 INFO: Adding this code coverage report to the cache for later reuse: D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16\In\fv-az639\VssAdministrator_fv-az639 2019-09-06 05_53_50.coveragexml 06:05:06.745 INFO: Sensor C# Tests Coverage Report Import [csharp] (done) | time=376ms 06:05:06.745 INFO: Sensor C# Unit Test Results Import [csharp] 06:05:06.745 INFO: Parsing the Visual Studio Test Results file D:\a\1\s\TestResults\VssAdministrator_fv-az639_2019-09-06_05_54_16.trx 06:05:06.760 INFO: Sensor C# Unit Test Results Import [csharp] (done) | time=15ms 06:05:06.760 INFO: Sensor JavaSecuritySensor [security] 06:05:06.760 INFO: Reading type hierarchy from: D:\a\1\.sonarqube\out\.sonar\ucfg2\java 06:05:06.776 INFO: Read 0 type definitions 06:05:06.776 INFO: Reading UCFGs from: D:\a\1\.sonarqube\out\.sonar\ucfg2\java 06:05:06.776 INFO: No UCFGs have been included for analysis. 06:05:06.776 INFO: Sensor JavaSecuritySensor [security] (done) | time=16ms 06:05:06.776 INFO: Sensor CSharpSecuritySensor [security] 06:05:06.776 INFO: Reading type hierarchy from: D:\a\1\.sonarqube\out\ucfg_cs2 06:05:07.198 INFO: Read 2692 type definitions 06:05:07.229 INFO: Reading UCFGs from: D:\a\1\.sonarqube\out\ucfg_cs2 06:05:10.145 DEBUG: Excluding 8143 UCFGs as they are using the same method Ids. 06:05:10.145 INFO: No UCFGs have been included for analysis. 06:05:10.145 INFO: Sensor CSharpSecuritySensor [security] (done) | time=3369ms 06:05:10.145 INFO: Sensor PhpSecuritySensor [security] 06:05:10.145 INFO: Reading type hierarchy from: D:\a\1\.sonarqube\out\.sonar\ucfg2\php 06:05:10.145 INFO: Read 0 type definitions 06:05:10.145 INFO: Reading UCFGs from: D:\a\1\.sonarqube\out\.sonar\ucfg2\php 06:05:10.145 INFO: No UCFGs have been included for analysis. 06:05:10.145 INFO: Sensor PhpSecuritySensor [security] (done) | time=0ms 06:05:10.145 INFO: ------------- Run sensors on project 06:05:10.145 DEBUG: 'Java CPD Block Indexer' skipped because there is no related file in current project 06:05:10.145 DEBUG: Sensors : Zero Coverage Sensor 06:05:10.145 INFO: Sensor Zero Coverage Sensor 06:05:10.395 INFO: Sensor Zero Coverage Sensor (done) | time=250ms 06:05:10.826 INFO: 83 files had no CPD blocks 06:05:10.826 INFO: Calculating CPD for 759 files 06:05:11.593 INFO: CPD calculation finished 06:05:12.521 INFO: Analysis report generated in 741ms, dir size=10 MB 06:05:14.791 INFO: Analysis report compressed in 2270ms, zip size=3 MB 06:05:14.791 INFO: Analysis report generated in D:\a\1\.sonarqube\out\.sonar\scanner-report 06:05:14.791 DEBUG: Upload report 06:05:15.715 DEBUG: POST 200 https://sonarcloud.io/api/ce/submit?organization=%%company%%&projectKey=%%PROJ%%&projectName=%%PROJENAME%%&characteristic=branch%3Ddevelop&characteristic=branchType%3DLONG | time=924ms 06:05:15.715 INFO: Analysis report uploaded in 924ms 06:05:15.746 INFO: ANALYSIS SUCCESSFUL, you can browse https://sonarcloud.io/dashboard?id=%%ID%%&branch=develop 06:05:15.746 INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report 06:05:15.746 INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AW0FLUNssAr6WERzzxQF 06:05:15.746 DEBUG: Report metadata written to D:\a\_temp\sonar\ServiceFabric_develop_20190906.1\cdf145fb-2e28-bde6-0205-0b4ca3ccb07b\report-task.txt 06:05:15.746 DEBUG: Post-jobs : 06:05:15.762 INFO: Analysis total time: 34.444 s 06:05:15.777 INFO: ------------------------------------------------------------------------ 06:05:15.777 INFO: EXECUTION SUCCESS 06:05:15.777 INFO: ------------------------------------------------------------------------ 06:05:15.777 INFO: Total time: 1:10.726s 06:05:15.997 INFO: Final Memory: 41M/723M 06:05:15.997 INFO: ------------------------------------------------------------------------ Process returned exit code 0 The SonarQube Scanner has finished 06:05:16.138 Post-processing succeeded. ##[debug]rc:0 ##[debug]success:true ##[section]Finishing: Run Code Analysis