Analysis Failed

  • ID: 570c7728-6bf5-42f7-b503-5438e20b43f0
  • ALM used: GitHub
  • CI system used: N/A
  • Scanner command used when applicable (private details masked)
  • Languages of the repository: Python, TypeScript, Javascript, CSS, SCSS
  • Error observed (wrap logs/code around with triple quotes ``` for proper formatting):
    UI shows error and suggests contacting support. Logs from running command line:
20:13:24.938 INFO: Scanner configuration file: /Users/eahlgren/Downloads/sonar-scanner-4.2.0.1873-macosx/conf/sonar-scanner.properties
20:13:24.941 INFO: Project root configuration file: NONE
20:13:24.962 INFO: SonarQube Scanner 4.2.0.1873
20:13:24.963 INFO: Java 11.0.3 AdoptOpenJDK (64-bit)
20:13:24.963 INFO: Mac OS X 10.15.3 x86_64
20:13:25.120 DEBUG: keyStore is : 
20:13:25.120 DEBUG: keyStore type is : pkcs12
20:13:25.120 DEBUG: keyStore provider is : 
20:13:25.120 DEBUG: init keystore
20:13:25.120 DEBUG: init keymanager of type SunX509
20:13:25.230 DEBUG: Create: /Users/eahlgren/.sonar/cache
20:13:25.232 INFO: User cache: /Users/eahlgren/.sonar/cache
20:13:25.232 DEBUG: Create: /Users/eahlgren/.sonar/cache/_tmp
20:13:25.235 DEBUG: Extract sonar-scanner-api-batch in temp...
20:13:25.238 DEBUG: Get bootstrap index...
20:13:25.239 DEBUG: Download: https://sonarcloud.io/batch/index
20:13:26.031 DEBUG: Get bootstrap completed
20:13:26.034 DEBUG: Create isolated classloader...
20:13:26.052 DEBUG: Start temp cleaning...
20:13:26.076 DEBUG: Temp cleaning done
20:13:26.076 DEBUG: Execution getVersion
20:13:26.091 INFO: SonarQube server 8.0.0
20:13:26.091 INFO: Default locale: "en_US", source code encoding: "UTF-8" (analysis is platform dependent)
20:13:26.092 DEBUG: Work directory: /Users/eahlgren/IdeaProjects/frontier-signal/.scannerwork
20:13:26.093 DEBUG: Execution execute
20:13:26.300 DEBUG: SonarCloud 8.0.0.6147
20:13:26.398 INFO: Load global settings
20:13:27.048 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf | time=649ms
20:13:27.085 INFO: Load global settings (done) | time=687ms
20:13:27.092 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
20:13:27.094 INFO: User cache: /Users/eahlgren/.sonar/cache
20:13:27.097 INFO: Load/download plugins
20:13:27.097 INFO: Load plugins index
20:13:27.204 DEBUG: GET 200 https://sonarcloud.io/api/plugins/installed | time=107ms
20:13:27.246 INFO: Load plugins index (done) | time=149ms
20:13:27.413 INFO: Load/download plugins (done) | time=317ms
20:13:27.568 DEBUG: Plugins:
20:13:27.569 DEBUG:   * SonarCSS 1.2.0.1325 (cssfamily)
20:13:27.569 DEBUG:   * SonarPLSQL 3.4.1.2576 (plsql)
20:13:27.569 DEBUG:   * SonarScala 1.7.0.883 (sonarscala)
20:13:27.569 DEBUG:   * SonarC# 8.5.0.15942 (csharp)
20:13:27.569 DEBUG:   * Vulnerability Analysis 8.2.1.1259 (security)
20:13:27.569 DEBUG:   * SonarJava 6.2.0.21135 (java)
20:13:27.569 DEBUG:   * SonarHTML 3.2.0.2082 (web)
20:13:27.569 DEBUG:   * SonarFlex 2.5.1.1831 (flex)
20:13:27.569 DEBUG:   * SonarXML 2.0.1.2020 (xml)
20:13:27.569 DEBUG:   * SonarTS 2.1.0.4359 (typescript)
20:13:27.569 DEBUG:   * SonarVB 8.5.0.15942 (vbnet)
20:13:27.569 DEBUG:   * SonarSwift 4.2.2.77 (swift)
20:13:27.570 DEBUG:   * SonarCFamily 6.7.0.15300 (cpp)
20:13:27.570 DEBUG:   * SonarPython 2.7.0.5975 (python)
20:13:27.570 DEBUG:   * JaCoCo 1.0.2.475 (jacoco)
20:13:27.570 DEBUG:   * Mercurial 1.1.2 (scmmercurial)
20:13:27.570 DEBUG:   * SonarGo 1.7.0.883 (go)
20:13:27.570 DEBUG:   * SonarKotlin 1.7.0.883 (kotlin)
20:13:27.570 DEBUG:   * SonarTSQL 1.4.0.3334 (tsql)
20:13:27.570 DEBUG:   * SonarApex 1.7.0.883 (sonarapex)
20:13:27.570 DEBUG:   * SonarJS 6.2.0.12043 (javascript)
20:13:27.571 DEBUG:   * SonarRuby 1.7.0.883 (ruby)
20:13:27.571 DEBUG:   * Vulnerability Rules for C# 8.2.1.1259 (securitycsharpfrontend)
20:13:27.571 DEBUG:   * Vulnerability Rules for Java 8.2.1.1259 (securityjavafrontend)
20:13:27.571 DEBUG:   * License for SonarLint 8.0.0.6147 (license)
20:13:27.571 DEBUG:   * SonarCOBOL 4.4.0.3403 (cobol)
20:13:27.571 DEBUG:   * Vulnerability Rules for Python 8.2.1.1259 (securitypythonfrontend)
20:13:27.571 DEBUG:   * Git 1.11.0.11 (scmgit)
20:13:27.571 DEBUG:   * SonarPHP 3.3.0.5166 (php)
20:13:27.571 DEBUG:   * SonarABAP 3.8.0.2034 (abap)
20:13:27.571 DEBUG:   * Vulnerability Rules for PHP 8.2.1.1259 (securityphpfrontend)
20:13:27.621 INFO: Loaded core extensions: developer-scanner
20:13:27.672 DEBUG: Installed core extension: developer-scanner
20:13:28.079 INFO: Process project properties
20:13:28.084 DEBUG: Process project properties (done) | time=5ms
20:13:28.084 INFO: Execute project builders
20:13:28.085 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
20:13:28.086 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
20:13:28.087 INFO: Execute project builders (done) | time=3ms
20:13:28.089 INFO: Project key: FrontierSignal_frontier-signal
20:13:28.089 INFO: Base dir: /Users/eahlgren/IdeaProjects/frontier-signal
20:13:28.089 INFO: Working dir: /Users/eahlgren/IdeaProjects/frontier-signal/.scannerwork
20:13:28.090 DEBUG: Project global encoding: UTF-8, default locale: en_US
20:13:28.092 DEBUG: Creating module hierarchy
20:13:28.092 DEBUG:   Init module 'FrontierSignal_frontier-signal'
20:13:28.092 DEBUG:     Base dir: /Users/eahlgren/IdeaProjects/frontier-signal
20:13:28.092 DEBUG:     Working dir: /Users/eahlgren/IdeaProjects/frontier-signal/.scannerwork
20:13:28.092 DEBUG:     Module global encoding: UTF-8, default locale: en_US
20:13:28.161 INFO: Load project settings for component key: 'FrontierSignal_frontier-signal'
20:13:28.373 DEBUG: GET 200 https://sonarcloud.io/api/settings/values.protobuf?component=FrontierSignal_frontier-signal | time=212ms
20:13:28.375 INFO: Load project settings for component key: 'FrontierSignal_frontier-signal' (done) | time=214ms
20:13:28.457 DEBUG: Could not detect any CI vendor
20:13:28.459 INFO: Load project branches
20:13:28.566 DEBUG: GET 200 https://sonarcloud.io/api/project_branches/list?project=FrontierSignal_frontier-signal | time=107ms
20:13:28.571 INFO: Load project branches (done) | time=112ms
20:13:28.573 INFO: Check ALM binding of project 'FrontierSignal_frontier-signal'
20:13:28.681 DEBUG: GET 200 https://sonarcloud.io/api/alm_integration/is_project_bound?project=FrontierSignal_frontier-signal | time=107ms
20:13:28.684 INFO: Detected project binding: BOUND
20:13:28.684 INFO: Check ALM binding of project 'FrontierSignal_frontier-signal' (done) | time=111ms
20:13:28.686 INFO: Load project pull requests
20:13:28.789 DEBUG: GET 200 https://sonarcloud.io/api/project_pull_requests/list?project=FrontierSignal_frontier-signal | time=103ms
20:13:28.794 INFO: Load project pull requests (done) | time=108ms
20:13:28.801 INFO: Load branch configuration
20:13:28.804 INFO: Load branch configuration (done) | time=3ms
20:13:28.873 DEBUG: Available languages:
20:13:28.873 DEBUG:   * CSS => "css"
20:13:28.874 DEBUG:   * PL/SQL => "plsql"
20:13:28.874 DEBUG:   * Scala => "scala"
20:13:28.874 DEBUG:   * C# => "cs"
20:13:28.874 DEBUG:   * Java => "java"
20:13:28.874 DEBUG:   * HTML => "web"
20:13:28.874 DEBUG:   * JSP => "jsp"
20:13:28.874 DEBUG:   * Flex => "flex"
20:13:28.874 DEBUG:   * XML => "xml"
20:13:28.874 DEBUG:   * VB.NET => "vbnet"
20:13:28.874 DEBUG:   * Swift => "swift"
20:13:28.874 DEBUG:   * C => "c"
20:13:28.874 DEBUG:   * C++ => "cpp"
20:13:28.874 DEBUG:   * Objective-C => "objc"
20:13:28.874 DEBUG:   * Python => "py"
20:13:28.874 DEBUG:   * Go => "go"
20:13:28.874 DEBUG:   * Kotlin => "kotlin"
20:13:28.874 DEBUG:   * T-SQL => "tsql"
20:13:28.874 DEBUG:   * Apex => "apex"
20:13:28.874 DEBUG:   * JavaScript => "js"
20:13:28.875 DEBUG:   * TypeScript => "ts"
20:13:28.875 DEBUG:   * Ruby => "ruby"
20:13:28.875 DEBUG:   * COBOL => "cobol"
20:13:28.875 DEBUG:   * PHP => "php"
20:13:28.875 DEBUG:   * ABAP => "abap"
20:13:28.882 INFO: Load quality profiles
20:13:29.020 DEBUG: GET 200 https://sonarcloud.io/api/qualityprofiles/search.protobuf?projectKey=FrontierSignal_frontier-signal&organization=frontiersignal | time=136ms
20:13:29.035 INFO: Load quality profiles (done) | time=153ms
20:13:29.038 INFO: Load active rules
20:13:29.154 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhN&ps=500&p=1 | time=115ms
20:13:29.341 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2MJd7ZSSIg2Xhf&ps=500&p=1 | time=122ms
20:13:29.458 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhK&ps=500&p=1 | time=110ms
20:13:29.589 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhP&ps=500&p=1 | time=131ms
20:13:29.825 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhO&ps=500&p=1 | time=124ms
20:13:29.957 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhI&ps=500&p=1 | time=120ms
20:13:30.089 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhL&ps=500&p=1 | time=126ms
20:13:30.291 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhJ&ps=500&p=1 | time=186ms
20:13:30.535 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhS&ps=500&p=1 | time=120ms
20:13:30.656 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhH&ps=500&p=1 | time=119ms
20:13:30.772 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhM&ps=500&p=1 | time=114ms
20:13:30.905 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhW&ps=500&p=1 | time=133ms
20:13:31.038 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhV&ps=500&p=1 | time=129ms
20:13:31.207 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2MJd7ZSSIg2Xhe&ps=500&p=1 | time=166ms
20:13:31.360 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2MJd7ZSSIg2Xhh&ps=500&p=1 | time=144ms
20:13:31.485 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2MJd7ZSSIg2Xhg&ps=500&p=1 | time=119ms
20:13:31.602 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2MJd7ZSSIg2Xha&ps=500&p=1 | time=116ms
20:13:31.729 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhU&ps=500&p=1 | time=125ms
20:13:31.861 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhX&ps=500&p=1 | time=130ms
20:13:32.033 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhR&ps=500&p=1 | time=171ms
20:13:32.170 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhG&ps=500&p=1 | time=125ms
20:13:32.312 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2MJd7ZSSIg2Xhb&ps=500&p=1 | time=141ms
20:13:32.431 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhY&ps=500&p=1 | time=117ms
20:13:32.570 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhZ&ps=500&p=1 | time=137ms
20:13:32.703 DEBUG: GET 200 https://sonarcloud.io/api/rules/search.protobuf?f=repo,name,severity,lang,internalKey,templateKey,params,actives,createdAt,updatedAt&activation=true&qprofile=AXEUJe2LJd7ZSSIg2XhT&ps=500&p=1 | time=129ms
20:13:32.713 INFO: Load active rules (done) | time=3675ms
20:13:32.753 INFO: ------------------------------------------------------------------------
20:13:32.753 INFO: EXECUTION FAILURE
20:13:32.753 INFO: ------------------------------------------------------------------------
20:13:32.753 INFO: Total time: 7.836s
20:13:32.806 INFO: Final Memory: 19M/88M
20:13:32.806 INFO: ------------------------------------------------------------------------
20:13:32.807 ERROR: Error during SonarQube Scanner execution
You are running manual analysis while Automatic Analysis is enabled. Please consider disabling one or the other.
  • Steps to reproduce
sonar-scanner -Dsonar.organization=frontiersignal -Dsonar.projectKey=FrontierSignal_frontier-signal -Dsonar.sources=. -Dsonar.host.url=https://sonarcloud.io -Dsonar.login=2a1f12373c44d3b3ed56598b22598ea15039bdf1 -X

Hi @ahlgofrontier,

Thanks for posting to the community!

The error message you got is:
You are running manual analysis while Automatic Analysis is enabled. Please consider disabling one or the other.

This means that your project is configured in SonarCloud to have automatic analyses. It is not expected therefore that you will run the sonar-scanner.

This set-up is visible in the Administration, Analysis Method of your project.

Regards,
Alex

Hi there! Is there any override that would allow me to run sonar-scanner on a project that is configured for automatic analysis? On occasion, I might like to run the scanner locally prior to pushing code but I don’t see a way to do that. Any options?

Thanks!

Hey Tom.

You can flip the switch under project-level Administration > Analysis Method.

And, we’d recommend instead using https://sonarlint.org/ in your IDE if possible :slight_smile: