You're not authorized to run analysis. (Not a permissions issue?)

Using Gitlab, running a pipeline on a specific branch.
Primarily php. Other languages are used(Java, c++ but they set to be ignored)
This appears to be a common error that normally isn’t actually caused by permissions, and I have sifted through the various threads looking for a solution. Based on my findings I have tried the following
things I have tried based on
Doublechecking project keys
Doublechecking organization settings in sonar-project.properties
doublechecking permissions (both in sonarcloud and in gitlab. I have full permissions for each)
Ensuring default branch is setup.

I can run sonar locally without issues. I am trying to get it to run as part of my pipeline in a single branch in my repo.
Below is my sonar-project.properties

sonar.host.url=/sonarcloud.io
SONAR_HOST_URL=/sonarcloud.io
sonar.projectKey=******
sonar.organization=******
sonar.log.level = DEBUG
sonar.projectName=*****
sonar.qualitygate.wait=true
sonar.sourceEncoding=UTF-8

END of sonar-project.properties
Here is the final error
Caused by: You’re not authorized to run analysis. Please contact the project administrator.

And the complete log
Running with gitlab-runner 13.4.0-rc1 (fd488787)
on docker-auto-scale ed2dce3a
Preparing the “docker+machine” executor
Using Docker executor with image sonarsource/sonar-scanner-cli:latest …
Pulling docker image sonarsource/sonar-scanner-cli:latest …
Using docker image sha256:b98bc3b44a6e71ea669d9e2669b4fc7c044ba1bdfbcfd6f271b9f9b34f6785d8 for sonarsource/sonar-scanner-cli:latest with digest sonarsource/sonar-scanner-cli@sha256:058196b33dfbd513ab2f1716894b1ccb3f4dcb3a60cd0b73ddc165d6e2450299 …
Preparing environment
Running on runner-ed2dce3a-project-18251666-concurrent-0 via runner-ed2dce3a-srm-1600701145-f5ba9db8…
Getting source from Git repository
$ eval "CI_PRE_CLONE_SCRIPT" Fetching changes... Initialized empty Git repository in ******************* Created fresh repository. Checking out d549fc2a as feature/updateYamlForJenkins... Skipping Git submodules setup Restoring cache 00:01 Checking cache for sonarcloud-check... FATAL: file does not exist Failed to extract cache Executing "step_script" stage of the job script sonar-scanner
INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
INFO: Project root configuration file: /sonar-project.properties
15:14:01.064 INFO: SonarScanner 4.4.0.2170
15:14:01.066 INFO: Java 11.0.6 AdoptOpenJDK (64-bit)
15:14:01.067 INFO: Linux 4.19.78-coreos amd64
15:14:01.333 DEBUG: keyStore is :
15:14:01.334 DEBUG: keyStore type is : pkcs12
15:14:01.334 DEBUG: keyStore provider is :
15:14:01.334 DEBUG: init keystore
15:14:01.335 DEBUG: init keymanager of type SunX509
15:14:01.583 DEBUG: Create: /.sonar/cache
15:14:01.589 INFO: User cache: /.sonar/cache
15:14:01.591 DEBUG: Create: /.sonar/cache/_tmp
15:14:01.596 DEBUG: Extract sonar-scanner-api-batch in temp…
15:14:01.604 DEBUG: Get bootstrap index…
15:14:01.604 DEBUG: Download:
15:14:02.499 DEBUG: Get bootstrap completed
15:14:02.512 DEBUG: Download /sonarcloud.io/batch/file?name=scanner-sonarcloud-8.0.0.12128-all.jar to /
/.sonar/cache/_tmp/fileCache16554239336112333049.tmp
15:14:04.096 DEBUG: Create isolated classloader…
15:14:04.116 DEBUG: Start temp cleaning…
15:14:04.126 DEBUG: Temp cleaning done
15:14:04.127 INFO: Scanner configuration file: /opt/sonar-scanner/conf/sonar-scanner.properties
15:14:04.128 INFO: Project root configuration file: /sonar-project.properties
15:14:04.131 INFO: Analyzing on SonarCloud
15:14:04.132 INFO: Default locale: “en_US”, source code encoding: “UTF-8”
15:14:04.133 DEBUG: Work directory: /.scannerwork
15:14:04.135 DEBUG: Execution execute
15:14:04.597 DEBUG: SonarCloud 8.0.0.12128
15:14:04.853 INFO: Load global settings
15:14:05.534 DEBUG: GET 200 /sonarcloud.io/api/settings/values.protobuf | time=678ms
15:14:05.547 INFO: Load global settings (done) | time=694ms
15:14:05.559 INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu
15:14:05.563 DEBUG: Create : /.sonar/_tmp
15:14:05.564 INFO: User cache: /
/.sonar/cache
15:14:05.568 INFO: Load/download plugins
15:14:05.568 INFO: Load plugins index
15:14:05.680 DEBUG: GET 200/sonarcloud.io/api/plugins/installed | time=111ms
15:14:05.745 INFO: Load plugins index (done) | time=177ms
15:14:05.750 DEBUG: Download plugin ‘csharp’ to '
/.sonar/_tmp/fileCache3986550183030096332.tmp’
15:14:05.956 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=csharp&acceptCompressions=pack200 | time=206ms
15:14:06.624 DEBUG: Unpacking plugin csharp
15:14:07.429 DEBUG: Download plugin ‘cpp’ to '
/.sonar/_tmp/fileCache4755635660013405993.tmp’
15:14:07.540 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=cpp&acceptCompressions=pack200 | time=111ms
15:14:09.096 DEBUG: Unpacking plugin cpp
15:14:10.960 DEBUG: Download plugin ‘cobol’ to '
.sonar/_tmp/fileCache5425604492737182818.tmp’
15:14:11.069 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=cobol&acceptCompressions=pack200 | time=107ms
15:14:11.185 DEBUG: Unpacking plugin cobol
15:14:11.666 DEBUG: Download plugin ‘scmgit’ to '
.sonar/_tmp/fileCache744137610426229803.tmp’
15:14:11.774 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=scmgit&acceptCompressions=pack200 | time=106ms
15:14:11.798 DEBUG: Unpacking plugin scmgit
15:14:12.439 DEBUG: Download plugin ‘jacoco’ to '
.sonar/_tmp/fileCache229003642874486005.tmp’
15:14:12.546 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=jacoco&acceptCompressions=pack200 | time=107ms
15:14:12.547 DEBUG: Unpacking plugin jacoco
15:14:12.557 DEBUG: Download plugin ‘java’ to ‘/.sonar/_tmp/fileCache15053836360936467847.tmp’
15:14:12.663 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=java&acceptCompressions=pack200 | time=104ms
15:14:12.886 DEBUG: Unpacking plugin java
15:14:15.402 DEBUG: Download plugin ‘javascript’ to '
/.sonar/_tmp/fileCache11634452481000936297.tmp’
15:14:15.509 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=javascript&acceptCompressions=pack200 | time=106ms
15:14:15.837 DEBUG: Unpacking plugin javascript
15:14:16.595 DEBUG: Download plugin ‘license’ to ‘.sonar/_tmp/fileCache3362151011305216958.tmp’
15:14:16.701 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=license&acceptCompressions=pack200 | time=106ms
15:14:16.702 DEBUG: Unpacking plugin license
15:14:16.715 DEBUG: Download plugin ‘scmmercurial’ to '
.sonar/_tmp/fileCache8011675141466226131.tmp’
15:14:16.818 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=scmmercurial&acceptCompressions=pack200 | time=103ms
15:14:16.821 DEBUG: Unpacking plugin scmmercurial
15:14:16.830 DEBUG: Download plugin ‘php’ to ‘.sonar/_tmp/fileCache2877935928516844038.tmp’
15:14:16.940 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=php&acceptCompressions=pack200 | time=108ms
15:14:16.971 DEBUG: Unpacking plugin php
15:14:17.721 DEBUG: Download plugin ‘python’ to '
.sonar/_tmp/fileCache15502832308102782479.tmp’
15:14:17.830 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=python&acceptCompressions=pack200 | time=108ms
15:14:17.850 DEBUG: Unpacking plugin python
15:14:18.375 DEBUG: Download plugin ‘abap’ to ‘.sonar/_tmp/fileCache15504295770886815354.tmp’
15:14:18.483 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=abap&acceptCompressions=pack200 | time=108ms
15:14:18.489 DEBUG: Unpacking plugin abap
15:14:18.680 DEBUG: Download plugin ‘sonarapex’ to '/
/.sonar/_tmp/fileCache10999057790593401746.tmp’
15:14:18.786 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=sonarapex&acceptCompressions=pack200 | time=105ms
15:14:18.798 DEBUG: Unpacking plugin sonarapex
15:14:19.315 DEBUG: Download plugin ‘cssfamily’ to ‘.sonar/_tmp/fileCache17025558692209013328.tmp’
15:14:19.423 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=cssfamily&acceptCompressions=pack200 | time=107ms
15:14:19.676 DEBUG: Unpacking plugin cssfamily
15:14:20.239 DEBUG: Download plugin ‘flex’ to '
.sonar/_tmp/fileCache11063767117750253630.tmp’
15:14:20.359 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=flex&acceptCompressions=pack200 | time=119ms
15:14:20.365 DEBUG: Unpacking plugin flex
15:14:20.547 DEBUG: Download plugin ‘go’ to ‘.sonar/_tmp/fileCache5662874262402914115.tmp’
15:14:20.654 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=go&acceptCompressions=pack200 | time=106ms
15:14:20.807 DEBUG: Unpacking plugin go
15:14:21.754 DEBUG: Download plugin ‘web’ to '
/.sonar/_tmp/fileCache16727947491203152697.tmp’
15:14:21.872 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=web&acceptCompressions=pack200 | time=118ms
15:14:21.882 DEBUG: Unpacking plugin web
15:14:21.978 DEBUG: Download plugin ‘kotlin’ to ‘/.sonar/_tmp/fileCache4934209666946262161.tmp’
15:14:22.086 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=kotlin&acceptCompressions=pack200 | time=107ms
15:14:22.117 DEBUG: Unpacking plugin kotlin
15:14:23.063 DEBUG: Download plugin ‘plsql’ to '
/.sonar/_tmp/fileCache2609858391749553368.tmp’
15:14:23.168 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=plsql&acceptCompressions=pack200 | time=105ms
15:14:23.177 DEBUG: Unpacking plugin plsql
15:14:23.431 DEBUG: Download plugin ‘ruby’ to ‘/.sonar/_tmp/fileCache4076252421876711890.tmp’
15:14:23.558 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=ruby&acceptCompressions=pack200 | time=126ms
15:14:23.599 DEBUG: Unpacking plugin ruby
15:14:24.970 DEBUG: Download plugin ‘sonarscala’ to '
/.sonar/_tmp/fileCache13413128139240901559.tmp’
15:14:25.078 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=sonarscala&acceptCompressions=pack200 | time=107ms
15:14:25.439 DEBUG: Unpacking plugin sonarscala
15:14:27.038 DEBUG: Download plugin ‘swift’ to ‘/.sonar/_tmp/fileCache11080015103236884479.tmp’
15:14:27.144 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=swift&acceptCompressions=pack200 | time=106ms
15:14:27.152 DEBUG: Unpacking plugin swift
15:14:27.423 DEBUG: Download plugin ‘tsql’ to '
/.sonar/_tmp/fileCache1677107024167960351.tmp’
15:14:27.529 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=tsql&acceptCompressions=pack200 | time=106ms
15:14:27.536 DEBUG: Unpacking plugin tsql
15:14:27.791 DEBUG: Download plugin ‘xml’ to ‘/.sonar/_tmp/fileCache10404085480669982658.tmp’
15:14:27.896 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=xml&acceptCompressions=pack200 | time=104ms
15:14:27.904 DEBUG: Unpacking plugin xml
15:14:28.177 DEBUG: Download plugin ‘vbnet’ to '
/.sonar/_tmp/fileCache13144880173101220079.tmp’
15:14:28.307 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=vbnet&acceptCompressions=pack200 | time=129ms
15:14:28.325 DEBUG: Unpacking plugin vbnet
15:14:28.755 DEBUG: Download plugin ‘security’ to ‘/.sonar/_tmp/fileCache13363852770610585964.tmp’
15:14:28.862 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=security&acceptCompressions=pack200 | time=106ms
15:14:28.892 DEBUG: Unpacking plugin security
15:14:29.180 DEBUG: Download plugin ‘securitycsharpfrontend’ to '
/.sonar/_tmp/fileCache7212122620151637140.tmp’
15:14:29.287 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securitycsharpfrontend&acceptCompressions=pack200 | time=107ms
15:14:29.297 DEBUG: Unpacking plugin securitycsharpfrontend
15:14:29.332 DEBUG: Download plugin ‘securityjavafrontend’ to ‘/.sonar/_tmp/fileCache10228237822461222239.tmp’
15:14:29.441 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securityjavafrontend&acceptCompressions=pack200 | time=108ms
15:14:29.780 DEBUG: Unpacking plugin securityjavafrontend
15:14:30.208 DEBUG: Download plugin ‘securityphpfrontend’ to '
/.sonar/_tmp/fileCache629520687443935122.tmp’
15:14:30.315 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securityphpfrontend&acceptCompressions=pack200 | time=107ms
15:14:30.347 DEBUG: Unpacking plugin securityphpfrontend
15:14:30.473 DEBUG: Download plugin ‘securitypythonfrontend’ to ‘*******************/.sonar/_tmp/fileCache16980695349262921961.tmp’
15:14:30.585 DEBUG: GET 200 /sonarcloud.io/api/plugins/download?plugin=securitypythonfrontend&acceptCompressions=pack200 | time=111ms
15:14:30.618 DEBUG: Unpacking plugin securitypythonfrontend
15:14:30.764 INFO: Load/download plugins (done) | time=25196ms
15:14:31.205 DEBUG: Plugins:
15:14:31.208 DEBUG: * SonarCSS 1.2.0.1325 (cssfamily)
15:14:31.208 DEBUG: * SonarPLSQL 3.4.1.2576 (plsql)
15:14:31.208 DEBUG: * SonarScala 1.7.0.883 (sonarscala)
15:14:31.208 DEBUG: * C# Code Quality and Security 8.12.0.21095 (csharp)
15:14:31.209 DEBUG: * Vulnerability Analysis 8.5.0-M2.3931 (security)
15:14:31.209 DEBUG: * Java Code Quality and Security 6.7.0.23054 (java)
15:14:31.209 DEBUG: * SonarHTML 3.2.0.2082 (web)
15:14:31.210 DEBUG: * SonarFlex 2.5.1.1831 (flex)
15:14:31.210 DEBUG: * SonarXML 2.0.1.2020 (xml)
15:14:31.210 DEBUG: * VB.NET Code Quality and Security 8.12.0.21095 (vbnet)
15:14:31.210 DEBUG: * SonarSwift 4.2.2.77 (swift)
15:14:31.210 DEBUG: * CFamily Code Quality and Security 6.12.0.20255 (cpp)
15:14:31.211 DEBUG: * Python Code Quality and Security 3.1.0.7619 (python)
15:14:31.211 DEBUG: * JaCoCo 1.1.0.898 (jacoco)
15:14:31.211 DEBUG: * Mercurial 1.1.2 (scmmercurial)
15:14:31.211 DEBUG: * SonarGo 1.7.0.883 (go)
15:14:31.212 DEBUG: * SonarKotlin 1.7.0.883 (kotlin)
15:14:31.212 DEBUG: * SonarTSQL 1.4.0.3334 (tsql)
15:14:31.212 DEBUG: * SonarApex 1.7.0.883 (sonarapex)
15:14:31.213 DEBUG: * JavaScript/TypeScript Code Quality and Security 6.3.0.12464 (javascript)
15:14:31.214 DEBUG: * SonarRuby 1.7.0.883 (ruby)
15:14:31.214 DEBUG: * Vulnerability Rules for C# 8.5.0-M2.3931 (securitycsharpfrontend)
15:14:31.214 DEBUG: * Vulnerability Rules for Java 8.5.0-M2.3931 (securityjavafrontend)
15:14:31.214 DEBUG: * License for SonarLint 8.0.0.12128 (license)
15:14:31.216 DEBUG: * COBOL Code Quality 4.5.1.4460 (cobol)
15:14:31.216 DEBUG: * Vulnerability Rules for Python 8.5.0-M2.3931 (securitypythonfrontend)
15:14:31.216 DEBUG: * Git 1.12.0.2034 (scmgit)
15:14:31.216 DEBUG: * PHP Code Quality and Security 3.9.0.6331 (php)
15:14:31.217 DEBUG: * SonarABAP 3.8.0.2034 (abap)
15:14:31.217 DEBUG: * Vulnerability Rules for PHP 8.5.0-M2.3931 (securityphpfrontend)
15:14:31.289 INFO: Loaded core extensions: developer-scanner
15:14:31.326 DEBUG: Installed core extension: developer-scanner
15:14:32.452 INFO: Process project properties
15:14:32.456 DEBUG: Process project properties (done) | time=4ms
15:14:32.460 INFO: Execute project builders
15:14:32.461 DEBUG: Execute project builder: org.sonar.plugins.csharp.CSharpGlobalProtobufFileProcessor
15:14:32.462 DEBUG: Execute project builder: org.sonar.plugins.vbnet.VbNetGlobalProtobufFileProcessor
15:14:32.463 INFO: Execute project builders (done) | time=3ms
15:14:32.465 INFO: Project key: **********
15:14:32.465 INFO: Base dir: *******************
15:14:32.466 INFO: Working dir: ******************/.scannerwork
15:14:32.467 DEBUG: Project global encoding: UTF-8, default locale: en_US
15:14:32.471 DEBUG: Creating module hierarchy
15:14:32.472 DEBUG: Init module ‘*****’
15:14:32.472 DEBUG: Base dir: *******************
15:14:32.473 DEBUG: Working dir: /.scannerwork
15:14:32.473 DEBUG: Module global encoding: UTF-8, default locale: en_US
15:14:32.594 INFO: Load project settings for component key: '

15:14:32.710 DEBUG: GET 403 /sonarcloud.io/api/settings/values.protobuf?component=
| time=115ms
15:14:32.722 INFO: ------------------------------------------------------------------------
15:14:32.723 INFO: EXECUTION FAILURE
15:14:32.723 INFO: ------------------------------------------------------------------------
15:14:32.723 INFO: Total time: 31.737s
15:14:32.794 INFO: Final Memory: 8M/56M
15:14:32.795 INFO: ------------------------------------------------------------------------
15:14:32.796 ERROR: Error during SonarScanner execution
java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.ProjectConfiguration
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.ConstructorInjector$CtorAndAdapters.getParameterArguments(ConstructorInjector.java:309)
at org.picocontainer.injectors.ConstructorInjector$1.run(ConstructorInjector.java:335)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.ConstructorInjector.getComponentInstance(ConstructorInjector.java:364)
at org.picocontainer.injectors.AbstractInjectionFactory$LifecycleAdapter.getComponentInstance(AbstractInjectionFactory.java:56)
at org.picocontainer.behaviors.AbstractBehavior.getComponentInstance(AbstractBehavior.java:64)
at org.picocontainer.behaviors.Stored.getComponentInstance(Stored.java:91)
at org.picocontainer.DefaultPicoContainer.instantiateComponentAsIsStartable(DefaultPicoContainer.java:1034)
at org.picocontainer.DefaultPicoContainer.addAdapterIfStartable(DefaultPicoContainer.java:1026)
at org.picocontainer.DefaultPicoContainer.startAdapters(DefaultPicoContainer.java:1003)
at org.picocontainer.DefaultPicoContainer.start(DefaultPicoContainer.java:767)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:121)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
at org.sonar.scanner.bootstrap.GlobalContainer.doAfterStart(GlobalContainer.java:126)
at org.sonar.core.platform.ComponentContainer.startComponents(ComponentContainer.java:122)
at org.sonar.core.platform.ComponentContainer.execute(ComponentContainer.java:108)
at org.sonar.batch.bootstrapper.Batch.doExecute(Batch.java:58)
at org.sonar.batch.bootstrapper.Batch.execute(Batch.java:52)
at org.sonarsource.scanner.api.internal.batch.BatchIsolatedLauncher.execute(BatchIsolatedLauncher.java:46)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source)
at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source)
at java.base/java.lang.reflect.Method.invoke(Unknown Source)
at org.sonarsource.scanner.api.internal.IsolatedLauncherProxy.invoke(IsolatedLauncherProxy.java:60)
at com.sun.proxy.$Proxy0.execute(Unknown Source)
at org.sonarsource.scanner.api.EmbeddedScanner.doExecute(EmbeddedScanner.java:189)
at org.sonarsource.scanner.api.EmbeddedScanner.execute(EmbeddedScanner.java:138)
at org.sonarsource.scanner.cli.Main.execute(Main.java:112)
at org.sonarsource.scanner.cli.Main.execute(Main.java:75)
at org.sonarsource.scanner.cli.Main.main(Main.java:61)
Caused by: java.lang.IllegalStateException: Unable to load component class org.sonar.scanner.scan.ProjectServerSettings
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:51)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:632)
at org.picocontainer.parameters.BasicComponentParameter$1.resolveInstance(BasicComponentParameter.java:118)
at org.picocontainer.parameters.ComponentParameter$1.resolveInstance(ComponentParameter.java:136)
at org.picocontainer.injectors.SingleMemberInjector.getParameter(SingleMemberInjector.java:78)
at org.picocontainer.injectors.SingleMemberInjector.getMemberArguments(SingleMemberInjector.java:61)
at org.picocontainer.injectors.MethodInjector.getMemberArguments(MethodInjector.java:100)
at org.picocontainer.injectors.MethodInjector$2.run(MethodInjector.java:112)
at org.picocontainer.injectors.AbstractInjector$ThreadLocalCyclicDependencyGuard.observe(AbstractInjector.java:270)
at org.picocontainer.injectors.MethodInjector.decorateComponentInstance(MethodInjector.java:120)
at org.picocontainer.injectors.CompositeInjector.decorateComponentInstance(CompositeInjector.java:58)
at org.picocontainer.injectors.Reinjector.reinject(Reinjector.java:142)
at org.picocontainer.injectors.ProviderAdapter.getComponentInstance(ProviderAdapter.java:96)
at org.picocontainer.DefaultPicoContainer.getInstance(DefaultPicoContainer.java:699)
at org.picocontainer.DefaultPicoContainer.getComponent(DefaultPicoContainer.java:647)
at org.sonar.core.platform.ComponentContainer$ExtendedDefaultPicoContainer.getComponent(ComponentContainer.java:49)
… 34 more
Caused by: You’re not authorized to run analysis. Please contact the project administrator.
15:14:32.804 ERROR:
15:14:32.804 ERROR: Re-run SonarScanner using the -X switch to enable full debug logging.
ERROR: Job failed: exit code 1

Hi @MightMoose

Could you please first test the validity of you token by calling this API (api/settings/values?component=xxx) with Postman for example ?

Auth is Basic token: (in Base 64)

HTH,
Mickaël

I’m not sure what you are referring to by token… Like the project or organization key?
I made the following call with both my project and organization key
https://sonarcloud.io/api/settings/values?component=MyKeyHere
I got the following response with my organization key
{

"errors": [

    {

        "msg": "Component key 'My Organization Key' not found"

    }

]

}
And this with my project key
{

"errors": [

    {

        "msg": "Insufficient privileges"

    }

]

}

What we call the token is the “password” you generate in the Security part of your account on SonarCloud, allowing the CI tool you use to push analysis.

Once this token is generated, it should be passed as either sonar.login property, of SONAR_TOKEN, depending on the tool you used (but for you, sonar.login should be ok)

Can you try that and see if it works better ?

Thanks.

Looks like that was it! I fixed the token and it’s working now.
Thank you!

1 Like

This topic was automatically closed 7 days after the last reply. New replies are no longer allowed.