Using Gitlab, running a pipeline on a specific branch.
Primarily php. Other languages are used(Java, c++ but they set to be ignored)
This appears to be a common error that normally isn’t actually caused by permissions, and I have sifted through the various threads looking for a solution. Based on my findings I have tried the following
things I have tried based on
Doublechecking project keys
Doublechecking organization settings in sonar-project.properties
doublechecking permissions (both in sonarcloud and in gitlab. I have full permissions for each)
Ensuring default branch is setup.
I can run sonar locally without issues. I am trying to get it to run as part of my pipeline in a single branch in my repo.
Below is my sonar-project.properties
sonar.host.url=/sonarcloud.io
SONAR_HOST_URL=/sonarcloud.io
sonar.projectKey=******
sonar.organization=******
sonar.log.level = DEBUG
sonar.projectName=*****
sonar.qualitygate.wait=true
sonar.sourceEncoding=UTF-8
END of sonar-project.properties
Here is the final error
Caused by: You’re not authorized to run analysis. Please contact the project administrator.
And the complete log
Running with gitlab-runner 13.4.0-rc1 (fd488787)
on docker-auto-scale ed2dce3a
Preparing the “docker+machine” executor
Using Docker executor with image sonarsource/sonar-scanner-cli:latest …
Pulling docker image sonarsource/sonar-scanner-cli:latest …
Using docker image sha256:b98bc3b44a6e71ea669d9e2669b4fc7c044ba1bdfbcfd6f271b9f9b34f6785d8 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:058196b33dfbd513ab2f1716894b1ccb3f4dcb3a60cd0b73ddc165d6e2450299 …
Preparing environment
Running on runner-ed2dce3a-project-18251666-concurrent-0 via runner-ed2dce3a-srm-1600701145-f5ba9db8…
Getting source from Git repository
$ eval "CI_PRE_CLONE_SCRIPT"
Fetching changes...
Initialized empty Git repository in *******************
Created fresh repository.
Checking out d549fc2a as feature/updateYamlForJenkins...
Skipping Git submodules setup
Restoring cache
00:01
Checking cache for sonarcloud-check...
FATAL: file does not exist
Failed to extract cache
Executing "step_script" stage of the job script
sonar-scanner
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /sonar-project.properties
15:14:01.064 INFO: SonarScanner 4.4.0.2170
15:14:01.066 INFO: Java 11.0.6 AdoptOpenJDK (64-bit)
15:14:01.067 INFO: Linux 4.19.78-coreos amd64
15:14:01.333 DEBUG: keyStore is :
15:14:01.334 DEBUG: keyStore type is : pkcs12
15:14:01.334 DEBUG: keyStore provider is :
15:14:01.334 DEBUG: init keystore
15:14:01.335 DEBUG: init keymanager of type SunX509
15:14:01.583 DEBUG: Create: /.sonar/cache
15:14:01.589 INFO: User cache: /.sonar/cache
15:14:01.591 DEBUG: Create: /.sonar/cache/_tmp
15:14:01.596 DEBUG: Extract sonar-scanner-api-batch in temp…
15:14:01.604 DEBUG: Get bootstrap index…
15:14:01.604 DEBUG: Download:
15:14:02.499 DEBUG: Get bootstrap completed
15:14:02.512 DEBUG: Download /sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.12128-all.jar to //.sonar/cache/_tmp/fileCache16554239336112333049.tmp
15:14:04.096 DEBUG: Create isolated classloader…
15:14:04.116 DEBUG: Start temp cleaning…
15:14:04.126 DEBUG: Temp cleaning done
15:14:04.127 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
15:14:04.128 INFO: Project root configuration file: /sonar-project.properties
15:14:04.131 INFO: Analyzing on SonarCloud
15:14:04.132 INFO: Default locale: “en_US”, source code encoding: “UTF-8”
15:14:04.133 DEBUG: Work directory: /.scannerwork
15:14:04.135 DEBUG: Execution execute
15:14:04.597 DEBUG: SonarCloud 8.0.0.12128
15:14:04.853 INFO: Load global settings
15:14:05.534 DEBUG: GET 200 /sonarcloud.io/api/settings/values.protobuf | time=678ms
15:14:05.547 INFO: Load global settings (done) | time=694ms
15:14:05.559 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
15:14:05.563 DEBUG: Create : /.sonar/_tmp
15:14:05.564 INFO: User cache: //.sonar/cache
15:14:05.568 INFO: Load/download plugins
15:14:05.568 INFO: Load plugins index
15:14:05.680 DEBUG: GET 200/sonarcloud.io/api/plugins/installed | time=111ms
15:14:05.745 INFO: Load plugins index (done) | time=177ms
15:14:05.750 DEBUG: Download plugin ‘csharp’ to '/.sonar/_tmp/fileCache3986550183030096332.tmp’
15:14:05.956 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=206ms
15:14:06.624 DEBUG: Unpacking plugin csharp
15:14:07.429 DEBUG: Download plugin ‘cpp’ to '/.sonar/_tmp/fileCache4755635660013405993.tmp’
15:14:07.540 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=111ms
15:14:09.096 DEBUG: Unpacking plugin cpp
15:14:10.960 DEBUG: Download plugin ‘cobol’ to '.sonar/_tmp/fileCache5425604492737182818.tmp’
15:14:11.069 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=107ms
15:14:11.185 DEBUG: Unpacking plugin cobol
15:14:11.666 DEBUG: Download plugin ‘scmgit’ to '.sonar/_tmp/fileCache744137610426229803.tmp’
15:14:11.774 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=106ms
15:14:11.798 DEBUG: Unpacking plugin scmgit
15:14:12.439 DEBUG: Download plugin ‘jacoco’ to '.sonar/_tmp/fileCache229003642874486005.tmp’
15:14:12.546 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=107ms
15:14:12.547 DEBUG: Unpacking plugin jacoco
15:14:12.557 DEBUG: Download plugin ‘java’ to ‘/.sonar/_tmp/fileCache15053836360936467847.tmp’
15:14:12.663 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=104ms
15:14:12.886 DEBUG: Unpacking plugin java
15:14:15.402 DEBUG: Download plugin ‘javascript’ to '/.sonar/_tmp/fileCache11634452481000936297.tmp’
15:14:15.509 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=106ms
15:14:15.837 DEBUG: Unpacking plugin javascript
15:14:16.595 DEBUG: Download plugin ‘license’ to ‘.sonar/_tmp/fileCache3362151011305216958.tmp’
15:14:16.701 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=106ms
15:14:16.702 DEBUG: Unpacking plugin license
15:14:16.715 DEBUG: Download plugin ‘scmmercurial’ to '.sonar/_tmp/fileCache8011675141466226131.tmp’
15:14:16.818 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=103ms
15:14:16.821 DEBUG: Unpacking plugin scmmercurial
15:14:16.830 DEBUG: Download plugin ‘php’ to ‘.sonar/_tmp/fileCache2877935928516844038.tmp’
15:14:16.940 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=108ms
15:14:16.971 DEBUG: Unpacking plugin php
15:14:17.721 DEBUG: Download plugin ‘python’ to '.sonar/_tmp/fileCache15502832308102782479.tmp’
15:14:17.830 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=108ms
15:14:17.850 DEBUG: Unpacking plugin python
15:14:18.375 DEBUG: Download plugin ‘abap’ to ‘.sonar/_tmp/fileCache15504295770886815354.tmp’
15:14:18.483 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=108ms
15:14:18.489 DEBUG: Unpacking plugin abap
15:14:18.680 DEBUG: Download plugin ‘sonarapex’ to '//.sonar/_tmp/fileCache10999057790593401746.tmp’
15:14:18.786 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=105ms
15:14:18.798 DEBUG: Unpacking plugin sonarapex
15:14:19.315 DEBUG: Download plugin ‘cssfamily’ to ‘.sonar/_tmp/fileCache17025558692209013328.tmp’
15:14:19.423 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=107ms
15:14:19.676 DEBUG: Unpacking plugin cssfamily
15:14:20.239 DEBUG: Download plugin ‘flex’ to '.sonar/_tmp/fileCache11063767117750253630.tmp’
15:14:20.359 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=119ms
15:14:20.365 DEBUG: Unpacking plugin flex
15:14:20.547 DEBUG: Download plugin ‘go’ to ‘.sonar/_tmp/fileCache5662874262402914115.tmp’
15:14:20.654 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=106ms
15:14:20.807 DEBUG: Unpacking plugin go
15:14:21.754 DEBUG: Download plugin ‘web’ to '/.sonar/_tmp/fileCache16727947491203152697.tmp’
15:14:21.872 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=118ms
15:14:21.882 DEBUG: Unpacking plugin web
15:14:21.978 DEBUG: Download plugin ‘kotlin’ to ‘/.sonar/_tmp/fileCache4934209666946262161.tmp’
15:14:22.086 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=107ms
15:14:22.117 DEBUG: Unpacking plugin kotlin
15:14:23.063 DEBUG: Download plugin ‘plsql’ to '/.sonar/_tmp/fileCache2609858391749553368.tmp’
15:14:23.168 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=105ms
15:14:23.177 DEBUG: Unpacking plugin plsql
15:14:23.431 DEBUG: Download plugin ‘ruby’ to ‘/.sonar/_tmp/fileCache4076252421876711890.tmp’
15:14:23.558 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=126ms
15:14:23.599 DEBUG: Unpacking plugin ruby
15:14:24.970 DEBUG: Download plugin ‘sonarscala’ to '/.sonar/_tmp/fileCache13413128139240901559.tmp’
15:14:25.078 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=107ms
15:14:25.439 DEBUG: Unpacking plugin sonarscala
15:14:27.038 DEBUG: Download plugin ‘swift’ to ‘/.sonar/_tmp/fileCache11080015103236884479.tmp’
15:14:27.144 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=106ms
15:14:27.152 DEBUG: Unpacking plugin swift
15:14:27.423 DEBUG: Download plugin ‘tsql’ to '/.sonar/_tmp/fileCache1677107024167960351.tmp’
15:14:27.529 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=106ms
15:14:27.536 DEBUG: Unpacking plugin tsql
15:14:27.791 DEBUG: Download plugin ‘xml’ to ‘/.sonar/_tmp/fileCache10404085480669982658.tmp’
15:14:27.896 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=104ms
15:14:27.904 DEBUG: Unpacking plugin xml
15:14:28.177 DEBUG: Download plugin ‘vbnet’ to '/.sonar/_tmp/fileCache13144880173101220079.tmp’
15:14:28.307 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=129ms
15:14:28.325 DEBUG: Unpacking plugin vbnet
15:14:28.755 DEBUG: Download plugin ‘security’ to ‘/.sonar/_tmp/fileCache13363852770610585964.tmp’
15:14:28.862 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=106ms
15:14:28.892 DEBUG: Unpacking plugin security
15:14:29.180 DEBUG: Download plugin ‘securitycsharpfrontend’ to '/.sonar/_tmp/fileCache7212122620151637140.tmp’
15:14:29.287 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=107ms
15:14:29.297 DEBUG: Unpacking plugin securitycsharpfrontend
15:14:29.332 DEBUG: Download plugin ‘securityjavafrontend’ to ‘/.sonar/_tmp/fileCache10228237822461222239.tmp’
15:14:29.441 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=108ms
15:14:29.780 DEBUG: Unpacking plugin securityjavafrontend
15:14:30.208 DEBUG: Download plugin ‘securityphpfrontend’ to '/.sonar/_tmp/fileCache629520687443935122.tmp’
15:14:30.315 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=107ms
15:14:30.347 DEBUG: Unpacking plugin securityphpfrontend
15:14:30.473 DEBUG: Download plugin ‘securitypythonfrontend’ to ‘*******************/.sonar/_tmp/fileCache16980695349262921961.tmp’
15:14:30.585 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securitypythonfrontend&acceptCompressions=pack200 | time=111ms
15:14:30.618 DEBUG: Unpacking plugin securitypythonfrontend
15:14:30.764 INFO: Load/download plugins (done) | time=25196ms
15:14:31.205 DEBUG: Plugins:
15:14:31.208 DEBUG: * SonarCSS 1.2.0.1325 (cssfamily)
15:14:31.208 DEBUG: * SonarPLSQL 3.4.1.2576 (plsql)
15:14:31.208 DEBUG: * SonarScala 1.7.0.883 (sonarscala)
15:14:31.208 DEBUG: * C# Code Quality and Security 8.12.0.21095 (csharp)
15:14:31.209 DEBUG: * Vulnerability Analysis 8.5.0-M2.3931 (security)
15:14:31.209 DEBUG: * Java Code Quality and Security 6.7.0.23054 (java)
15:14:31.209 DEBUG: * SonarHTML 3.2.0.2082 (web)
15:14:31.210 DEBUG: * SonarFlex 2.5.1.1831 (flex)
15:14:31.210 DEBUG: * SonarXML 2.0.1.2020 (xml)
15:14:31.210 DEBUG: * VB.NET Code Quality and Security 8.12.0.21095 (vbnet)
15:14:31.210 DEBUG: * SonarSwift 4.2.2.77 (swift)
15:14:31.210 DEBUG: * CFamily Code Quality and Security 6.12.0.20255 (cpp)
15:14:31.211 DEBUG: * Python Code Quality and Security 3.1.0.7619 (python)
15:14:31.211 DEBUG: * JaCoCo 1.1.0.898 (jacoco)
15:14:31.211 DEBUG: * Mercurial 1.1.2 (scmmercurial)
15:14:31.211 DEBUG: * SonarGo 1.7.0.883 (go)
15:14:31.212 DEBUG: * SonarKotlin 1.7.0.883 (kotlin)
15:14:31.212 DEBUG: * SonarTSQL 1.4.0.3334 (tsql)
15:14:31.212 DEBUG: * SonarApex 1.7.0.883 (sonarapex)
15:14:31.213 DEBUG: * JavaScript/TypeScript Code Quality and Security 6.3.0.12464 (javascript)
15:14:31.214 DEBUG: * SonarRuby 1.7.0.883 (ruby)
15:14:31.214 DEBUG: * Vulnerability Rules for C# 8.5.0-M2.3931 (securitycsharpfrontend)
15:14:31.214 DEBUG: * Vulnerability Rules for Java 8.5.0-M2.3931 (securityjavafrontend)
15:14:31.214 DEBUG: * License for SonarLint 8.0.0.12128 (license)
15:14:31.216 DEBUG: * COBOL Code Quality 4.5.1.4460 (cobol)
15:14:31.216 DEBUG: * Vulnerability Rules for Python 8.5.0-M2.3931 (securitypythonfrontend)
15:14:31.216 DEBUG: * Git 1.12.0.2034 (scmgit)
15:14:31.216 DEBUG: * PHP Code Quality and Security 3.9.0.6331 (php)
15:14:31.217 DEBUG: * SonarABAP 3.8.0.2034 (abap)
15:14:31.217 DEBUG: * Vulnerability Rules for PHP 8.5.0-M2.3931 (securityphpfrontend)
15:14:31.289 INFO: Loaded core extensions: developer-scanner
15:14:31.326 DEBUG: Installed core extension: developer-scanner
15:14:32.452 INFO: Process project properties
15:14:32.456 DEBUG: Process project properties (done) | time=4ms
15:14:32.460 INFO: Execute project builders
15:14:32.461 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
15:14:32.462 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
15:14:32.463 INFO: Execute project builders (done) | time=3ms
15:14:32.465 INFO: Project key: **********
15:14:32.465 INFO: Base dir: *******************
15:14:32.466 INFO: Working dir: ******************/.scannerwork
15:14:32.467 DEBUG: Project global encoding: UTF-8, default locale: en_US
15:14:32.471 DEBUG: Creating module hierarchy
15:14:32.472 DEBUG: Init module ‘*****’
15:14:32.472 DEBUG: Base dir: *******************
15:14:32.473 DEBUG: Working dir: /.scannerwork
15:14:32.473 DEBUG: Module global encoding: UTF-8, default locale: en_US
15:14:32.594 INFO: Load project settings for component key: '’
15:14:32.710 DEBUG: GET 403 /sonarcloud.io/api/settings/values.protobuf?component= | time=115ms
15:14:32.722 INFO: ------------------------------------------------------------------------
15:14:32.723 INFO: EXECUTION FAILURE
15:14:32.723 INFO: ------------------------------------------------------------------------
15:14:32.723 INFO: Total time: 31.737s
15:14:32.794 INFO: Final Memory: 8M/56M
15:14:32.795 INFO: ------------------------------------------------------------------------
15:14:32.796 ERROR: Error during SonarScanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.ProjectConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:121)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:126)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at com.sun.proxy.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.ProjectServerSettings
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.SingleMemberInjector.getMemberArguments(SingleMemberInjector.java:61)
at org.picocontainer.injectors.MethodInjector.getMemberArguments(MethodInjector.java:100)
at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:112)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:49)
… 34 more
Caused by: You’re not authorized to run analysis. Please contact the project administrator.
15:14:32.804 ERROR:
15:14:32.804 ERROR: Re-run SonarScanner using the -X switch to enable full debug logging.
ERROR: Job failed: exit code 1