Page MenuHomePhabricator
Paste P8316

docker run
ArchivedPublic

Authored by zeljkofilipin on Mar 29 2019, 6:10 PM.
Tags
None
Referenced Files
F28511670: raw.txt
Mar 29 2019, 6:10 PM
Subscribers
None
~$ docker run \
> --volume /Users/z/Desktop/T219156/mediawiki_extensions_3D/log://var/lib/jenkins/log \
> --volume /Users/z/tmp/sonar-scanner-cache://cache \
> --volume /Users/z/Desktop/T219156/mediawiki_extensions_3D://src \
> --env SONAR_API_KEY=not-the-real-one \
> --env ZUUL_PROJECT=mediawiki-extensions-3D \
> docker-registry.wikimedia.org/releng/java8-sonar-scanner:0.4.0 -X -Dsonar.host.url=https://sonarcloud.io -Dsonar.organization=wmftest -Dsonar.projectKey=mediawiki-extensions-3D -Dsonar.projectName=mediawiki-extensions-3D -Dsonar.branch.target="master" -Dsonar.branch.name="master"
Unable to find image 'docker-registry.wikimedia.org/releng/java8-sonar-scanner:0.4.0' locally
0.4.0: Pulling from releng/java8-sonar-scanner
3f12a0f9adcd: Pull complete
32d27383a608: Pull complete
daa85dc59689: Pull complete
c3a3de09edbf: Pull complete
4ae8ed9af03f: Pull complete
427d08ad7d39: Pull complete
8ad7ad2de6e8: Pull complete
8f048498efd8: Pull complete
1d6b9cb592ed: Pull complete
a5ea3b72289e: Pull complete
e38a93b66096: Pull complete
4dd966879c2a: Pull complete
b0280f91af4d: Pull complete
Digest: sha256:bf06f503b9a94f1abfe7f9079f483db5547e3456a2d0719c01e13b870f178cb4
Status: Downloaded newer image for docker-registry.wikimedia.org/releng/java8-sonar-scanner:0.4.0
18:07:37.405 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
18:07:37.414 INFO: Project root configuration file: /src/sonar-project.properties
18:07:37.489 INFO: SonarQube Scanner 3.3.0.1492
18:07:37.489 INFO: Java 1.8.0_181 Oracle Corporation (64-bit)
18:07:37.490 INFO: Linux 4.9.125-linuxkit amd64
18:07:37.829 DEBUG: keyStore is :
18:07:37.829 DEBUG: keyStore type is : jks
18:07:37.829 DEBUG: keyStore provider is :
18:07:37.830 DEBUG: init keystore
18:07:37.832 DEBUG: init keymanager of type SunX509
18:07:37.989 DEBUG: Create: /cache/sonar/cache
18:07:37.994 INFO: User cache: /cache/sonar/cache
18:07:37.994 DEBUG: Create: /cache/sonar/cache/_tmp
18:07:38.003 DEBUG: Extract sonar-scanner-api-batch in temp...
18:07:38.029 DEBUG: Get bootstrap index...
18:07:38.029 DEBUG: Download: https://sonarcloud.io/batch/index
18:07:38.467 DEBUG: Get bootstrap completed
18:07:38.495 DEBUG: Download https://sonarcloud.io/batch/file?name=sonar-scanner-engine-shaded-developer-7.7.0.23020-all.jar to /cache/sonar/cache/_tmp/fileCache3275237568748342140.tmp
18:07:44.458 DEBUG: Create isolated classloader...
18:07:44.479 DEBUG: Start temp cleaning...
18:07:44.499 DEBUG: Temp cleaning done
18:07:44.500 DEBUG: Execution getVersion
18:07:44.516 INFO: SonarQube server 7.7.0
18:07:44.517 INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
18:07:44.519 DEBUG: Work directory: /src/.scannerwork
18:07:44.522 DEBUG: Execution execute
18:07:45.415 INFO: Load global settings
18:07:45.681 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=234ms
18:07:45.782 INFO: Load global settings (done) | time=373ms
18:07:45.799 INFO: Server id: BD367519-AWHW8ct9-T_TB3XqouNu
18:07:45.856 DEBUG: Create : /cache/sonar/_tmp
18:07:45.859 INFO: User cache: /cache/sonar/cache
18:07:45.873 INFO: Load/download plugins
18:07:45.874 INFO: Load plugins index
18:07:45.909 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=34ms
18:07:46.020 INFO: Load plugins index (done) | time=146ms
18:07:46.029 DEBUG: Download plugin 'scmgit' to '/cache/sonar/_tmp/fileCache2419719954805684459.tmp'
18:07:46.064 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=35ms
18:07:46.380 DEBUG: Unpacking plugin scmgit
18:07:46.881 DEBUG: Download plugin 'jacoco' to '/cache/sonar/_tmp/fileCache1025582200541708464.tmp'
18:07:46.910 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=29ms
18:07:46.920 DEBUG: Unpacking plugin jacoco
18:07:46.938 DEBUG: Download plugin 'license' to '/cache/sonar/_tmp/fileCache914062239334127926.tmp'
18:07:46.971 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=33ms
18:07:46.978 DEBUG: Unpacking plugin license
18:07:46.994 DEBUG: Download plugin 'scmmercurial' to '/cache/sonar/_tmp/fileCache5804797148747691522.tmp'
18:07:47.025 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=31ms
18:07:47.034 DEBUG: Unpacking plugin scmmercurial
18:07:47.051 DEBUG: Download plugin 'abap' to '/cache/sonar/_tmp/fileCache287620892816000914.tmp'
18:07:47.093 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=41ms
18:07:47.227 DEBUG: Unpacking plugin abap
18:07:47.491 DEBUG: Download plugin 'sonarapex' to '/cache/sonar/_tmp/fileCache326779987047005561.tmp'
18:07:47.522 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=31ms
18:07:47.801 DEBUG: Unpacking plugin sonarapex
18:07:48.525 DEBUG: Download plugin 'csharp' to '/cache/sonar/_tmp/fileCache6097623797694643923.tmp'
18:07:48.563 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=36ms
18:07:49.010 DEBUG: Unpacking plugin csharp
18:07:49.448 DEBUG: Download plugin 'cpp' to '/cache/sonar/_tmp/fileCache5623823181279888260.tmp'
18:07:49.486 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=36ms
18:07:56.624 DEBUG: Unpacking plugin cpp
18:07:59.856 DEBUG: Download plugin 'cobol' to '/cache/sonar/_tmp/fileCache7159415961953374676.tmp'
18:07:59.888 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=31ms
18:08:00.232 DEBUG: Unpacking plugin cobol
18:08:00.815 DEBUG: Download plugin 'cssfamily' to '/cache/sonar/_tmp/fileCache9013481071976146369.tmp'
18:08:00.854 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=39ms
18:08:02.478 DEBUG: Unpacking plugin cssfamily
18:08:03.379 DEBUG: Download plugin 'flex' to '/cache/sonar/_tmp/fileCache39527072322208116.tmp'
18:08:03.417 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=37ms
18:08:03.602 DEBUG: Unpacking plugin flex
18:08:03.869 DEBUG: Download plugin 'go' to '/cache/sonar/_tmp/fileCache7520217083262625308.tmp'
18:08:03.901 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=32ms
18:08:04.903 DEBUG: Unpacking plugin go
18:08:05.859 DEBUG: Download plugin 'web' to '/cache/sonar/_tmp/fileCache2365309221888560580.tmp'
18:08:05.891 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=31ms
18:08:06.102 DEBUG: Unpacking plugin web
18:08:06.427 DEBUG: Download plugin 'javascript' to '/cache/sonar/_tmp/fileCache3598408381108464618.tmp'
18:08:06.463 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=36ms
18:08:07.601 DEBUG: Unpacking plugin javascript
18:08:08.569 DEBUG: Download plugin 'java' to '/cache/sonar/_tmp/fileCache4622744748409356368.tmp'
18:08:08.607 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=38ms
18:08:09.203 DEBUG: Unpacking plugin java
18:08:10.617 DEBUG: Download plugin 'kotlin' to '/cache/sonar/_tmp/fileCache83189441279359643.tmp'
18:08:10.651 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=34ms
18:08:11.447 DEBUG: Unpacking plugin kotlin
18:08:12.680 DEBUG: Download plugin 'php' to '/cache/sonar/_tmp/fileCache7507534567220645300.tmp'
18:08:12.709 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=29ms
18:08:13.096 DEBUG: Unpacking plugin php
18:08:13.856 DEBUG: Download plugin 'plsql' to '/cache/sonar/_tmp/fileCache3820231594005837142.tmp'
18:08:13.891 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=34ms
18:08:14.142 DEBUG: Unpacking plugin plsql
18:08:14.501 DEBUG: Download plugin 'python' to '/cache/sonar/_tmp/fileCache4810850280604712777.tmp'
18:08:14.536 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=35ms
18:08:14.793 DEBUG: Unpacking plugin python
18:08:15.254 DEBUG: Download plugin 'ruby' to '/cache/sonar/_tmp/fileCache7646449072787380881.tmp'
18:08:15.287 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=32ms
18:08:16.031 DEBUG: Unpacking plugin ruby
18:08:17.776 DEBUG: Download plugin 'sonarscala' to '/cache/sonar/_tmp/fileCache3717544450877617534.tmp'
18:08:17.810 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=32ms
18:08:19.536 DEBUG: Unpacking plugin sonarscala
18:08:20.969 DEBUG: Download plugin 'swift' to '/cache/sonar/_tmp/fileCache65168359721470649.tmp'
18:08:21.001 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=31ms
18:08:21.368 DEBUG: Unpacking plugin swift
18:08:21.835 DEBUG: Download plugin 'typescript' to '/cache/sonar/_tmp/fileCache7599019644260130062.tmp'
18:08:21.870 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=typescript&acceptCompressions=pack200 | time=35ms
18:08:22.532 DEBUG: Unpacking plugin typescript
18:08:22.940 DEBUG: Download plugin 'tsql' to '/cache/sonar/_tmp/fileCache4047905403494429037.tmp'
18:08:22.978 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=37ms
18:08:23.156 DEBUG: Unpacking plugin tsql
18:08:23.523 DEBUG: Download plugin 'vbnet' to '/cache/sonar/_tmp/fileCache6454379608200781996.tmp'
18:08:23.554 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=31ms
18:08:23.850 DEBUG: Unpacking plugin vbnet
18:08:24.254 DEBUG: Download plugin 'xml' to '/cache/sonar/_tmp/fileCache9015444188423027004.tmp'
18:08:24.284 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=29ms
18:08:24.474 DEBUG: Unpacking plugin xml
18:08:24.842 DEBUG: Download plugin 'security' to '/cache/sonar/_tmp/fileCache933435610599490314.tmp'
18:08:24.875 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=33ms
18:08:25.057 DEBUG: Unpacking plugin security
18:08:25.426 DEBUG: Download plugin 'securitycsharpfrontend' to '/cache/sonar/_tmp/fileCache3488504779492792964.tmp'
18:08:25.456 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=30ms
18:08:26.616 DEBUG: Unpacking plugin securitycsharpfrontend
18:08:27.071 DEBUG: Download plugin 'securityjavafrontend' to '/cache/sonar/_tmp/fileCache2823209447974200312.tmp'
18:08:27.109 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=37ms
18:08:27.733 DEBUG: Unpacking plugin securityjavafrontend
18:08:27.981 DEBUG: Download plugin 'securityphpfrontend' to '/cache/sonar/_tmp/fileCache764927499107424341.tmp'
18:08:28.010 DEBUG: GET 200 https://sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=29ms
18:08:28.655 DEBUG: Unpacking plugin securityphpfrontend
18:08:28.919 INFO: Load/download plugins (done) | time=43046ms
18:08:30.911 DEBUG: Plugins:
18:08:30.912 DEBUG: * SonarCSS 1.0.3.724 (cssfamily)
18:08:30.912 DEBUG: * SonarPLSQL 3.4.1.2576 (plsql)
18:08:30.913 DEBUG: * SonarScala 1.5.0.315 (sonarscala)
18:08:30.914 DEBUG: * SonarC# 7.11.0.8083 (csharp)
18:08:30.914 DEBUG: * Vulnerability Analysis 7.7.0.4011 (security)
18:08:30.915 DEBUG: * SonarJava 5.11.0.17289 (java)
18:08:30.916 DEBUG: * SonarHTML 3.1.0.1615 (web)
18:08:30.916 DEBUG: * SonarFlex 2.4.0.1222 (flex)
18:08:30.917 DEBUG: * SonarXML 2.0.1.2020 (xml)
18:08:30.918 DEBUG: * SonarTS 1.9.0.3766 (typescript)
18:08:30.918 DEBUG: * SonarVB 7.11.0.8083 (vbnet)
18:08:30.919 DEBUG: * SonarSwift 4.1.0.3087 (swift)
18:08:30.920 DEBUG: * SonarCFamily 6.1.0.11021 (cpp)
18:08:30.920 DEBUG: * SonarPython 1.13.0.2922 (python)
18:08:30.921 DEBUG: * JaCoCo 1.0.1.143 (jacoco)
18:08:30.921 DEBUG: * Mercurial 1.1.2 (scmmercurial)
18:08:30.922 DEBUG: * SonarGo 1.1.0.1612 (go)
18:08:30.922 DEBUG: * SonarKotlin 1.5.0.315 (kotlin)
18:08:30.922 DEBUG: * SonarTSQL 1.3.1.3067 (tsql)
18:08:30.922 DEBUG: * SonarApex 1.5.0.315 (sonarapex)
18:08:30.922 DEBUG: * SonarJS 5.1.1.7506 (javascript)
18:08:30.922 DEBUG: * SonarRuby 1.5.0.315 (ruby)
18:08:30.922 DEBUG: * Vulnerability Rules for C# 7.7.0.4011 (securitycsharpfrontend)
18:08:30.922 DEBUG: * Vulnerability Rules for Java 7.7.0.4011 (securityjavafrontend)
18:08:30.922 DEBUG: * License for SonarLint 7.7.0.23020 (license)
18:08:30.922 DEBUG: * SonarCOBOL 4.4.0.3403 (cobol)
18:08:30.923 DEBUG: * Git 1.8.0.1517 (scmgit)
18:08:30.923 DEBUG: * SonarPHP 3.0.0.4537 (php)
18:08:30.923 DEBUG: * SonarABAP 3.7.1.1762 (abap)
18:08:30.923 DEBUG: * Vulnerability Rules for PHP 7.7.0.4011 (securityphpfrontend)
18:08:30.967 INFO: Loaded core extensions: developer-scanner
18:08:31.029 DEBUG: Installed core extension: developer-scanner
18:08:32.388 INFO: Process project properties
18:08:32.427 DEBUG: Process project properties (done) | time=40ms
18:08:32.429 INFO: Execute project builders
18:08:32.430 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
18:08:32.439 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
18:08:32.449 INFO: Execute project builders (done) | time=20ms
18:08:32.463 INFO: Project key: mediawiki-extensions-3D
18:08:32.464 INFO: Base dir: /src
18:08:32.465 INFO: Working dir: /src/.scannerwork
18:08:32.466 DEBUG: Project global encoding: UTF-8, default locale: en_US
18:08:32.474 DEBUG: Creating module hierarchy
18:08:32.474 DEBUG: Init module 'mediawiki-extensions-3D'
18:08:32.480 DEBUG: Base dir: /src
18:08:32.480 DEBUG: Working dir: /src/.scannerwork
18:08:32.481 DEBUG: Module global encoding: UTF-8, default locale: en_US
18:08:32.515 INFO: Load project settings for component key: 'mediawiki-extensions-3D'
18:08:32.556 DEBUG: GET 404 https://sonarcloud.io/api/settings/values.protobuf?component=mediawiki-extensions-3D | time=41ms
18:08:32.570 INFO: Load project branches
18:08:32.612 DEBUG: GET 404 https://sonarcloud.io/api/project_branches/list?project=mediawiki-extensions-3D | time=40ms
18:08:32.613 DEBUG: Could not process project branches - continuing without it
18:08:32.614 INFO: Load project branches (done) | time=44ms
18:08:32.616 INFO: Load project pull requests
18:08:32.656 DEBUG: GET 404 https://sonarcloud.io/api/project_pull_requests/list?project=mediawiki-extensions-3D | time=37ms
18:08:32.658 DEBUG: Could not process project pull requests - continuing without it
18:08:32.661 INFO: Load project pull requests (done) | time=45ms
18:08:32.662 INFO: Load branch configuration
18:08:32.671 DEBUG: Found manual configuration of branch/PR analysis. Skipping automatic configuration.
18:08:32.705 INFO: ------------------------------------------------------------------------
18:08:32.705 INFO: EXECUTION FAILURE
18:08:32.706 INFO: ------------------------------------------------------------------------
18:08:32.707 INFO: Total time: 55.336s
18:08:32.798 INFO: Final Memory: 19M/62M
18:08:32.798 INFO: ------------------------------------------------------------------------
18:08:32.800 ERROR: Error during SonarQube Scanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.filesystem.InputComponentStore
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:65)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:135)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:122)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:128)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:136)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:122)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:73)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:67)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at com.sun.proxy.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:185)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:137)
at org.sonarsource.scanner.cli.Main.execute(Main.java:111)
at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component interface org.sonar.scanner.scan.branch.BranchConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:65)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:63)
... 34 more
Caused by: Project was never analyzed. A regular analysis is required before a branch analysis