-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sonarqube 9.4 issue #151
Comments
We are also experiencing this problem, it only appears when using the sonar scanner for gradle. If we scan the same project with the standalone scanner or the maven scanner, it works. We added the parameter below to the gradle command line to disable scanning of groovy files only on gradle projects. |
Any updates on this issue ? |
Looking at the SonarQube 9.4 changelog, this looks like a possible root cause: [SONAR-15966] Use Spring instead of Pico as dependency injection framework in the scanner-engine |
Disabling the "Duplicated string literal" rule fixed the issue for us (the stacktrace is not the same as yours though). I recommend to carefully inspect the stacktrace for references to specific rules or any other hints. |
I just tested out the groovy plugin with: I'm using the gradle sonarqube plugin in a grails application. I'm seeing the groovy files in the code coverage, but there's no security/vulnerabilities being found. When inspecting the rules for the groovy language, i also saw none were defined. is it safe to say that the groovy plugin doesn't identify security hotspots and vulnerabilities in the scans or do i have an environment issue? |
Hi @TobiX , any updates on this issue? We are also experiencing this problem with sonarqube 9.7.1 and 1.8 groovy plugin |
See #179 - Pull requests always welcome! |
The text was updated successfully, but these errors were encountered: