[IM-stage_2-merge_v15.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
✔ OK flake8 in 9.916 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: -r/home/jenkins/workspace/IM-stage_2-merge_v15.0/requirements.txt
flake8 installed: enum34==1.1.10,lxml==4.9.3,pyang==2.5.3,pyangbind==0.8.3.post1,PyYAML==6.0.1,regex==2023.8.8,six==1.16.0
flake8 run-test-pre: PYTHONHASHSEED='3582838075'
flake8 run-test: commands[0] | python3 -c 'print("Skipping due to generated code")'
Skipping due to generated code
✔ OK black in 9.94 seconds
black create: /tmp/.tox/black
black installdeps: -r/home/jenkins/workspace/IM-stage_2-merge_v15.0/requirements.txt
black installed: enum34==1.1.10,lxml==4.9.3,pyang==2.5.3,pyangbind==0.8.3.post1,PyYAML==6.0.1,regex==2023.8.8,six==1.16.0
black run-test-pre: PYTHONHASHSEED='541767513'
black run-test: commands[0] | python3 -c 'print("Skipping due to generated code")'
Skipping due to generated code
✔ OK pylint in 10.259 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/IM-stage_2-merge_v15.0/requirements.txt
pylint installed: enum34==1.1.10,lxml==4.9.3,pyang==2.5.3,pyangbind==0.8.3.post1,PyYAML==6.0.1,regex==2023.8.8,six==1.16.0
pylint run-test-pre: PYTHONHASHSEED='3848577247'
pylint run-test: commands[0] | python3 -c 'print("Skipping due to generated code")'
Skipping due to generated code
✔ OK safety in 30.295 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/IM-stage_2-merge_v15.0/requirements.txt, safety
safety installed: annotated-types==0.6.0,Authlib==1.3.0,certifi==2024.2.2,cffi==1.16.0,charset-normalizer==3.3.2,click==8.1.7,cryptography==42.0.7,dparse==0.6.4b0,enum34==1.1.10,idna==3.7,Jinja2==3.1.4,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.5,marshmallow==3.21.2,mdurl==0.1.2,packaging==24.0,pyang==2.5.3,pyangbind==0.8.3.post1,pycparser==2.22,pydantic==2.7.1,pydantic_core==2.18.2,Pygments==2.18.0,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,six==1.16.0,tomli==2.0.1,typer==0.12.3,typing_extensions==4.11.0,urllib3==2.2.1
safety run-test-pre: PYTHONHASHSEED='1863135862'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.2.0[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /usr/lib/python310.zip
-> /usr/lib/python3.10/lib-dynload
-> /tmp/.tox/safety/lib/python3.10/site-packages
-> /usr/lib/python3.10
-> /tmp/.tox/safety/bin
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 40 packages[0m
Timestamp [1m2024-05-12 10:16:00[0m
[1m 3[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mAffected versions of Pip are vulnerable to Command
Injection. When installing a package from a Mercurial VCS URL (ie "pip
install hg+...") with pip prior to v23.3, the specified Mercurial revision
could be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not affect
users who aren't installing from Mercurial.
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m67599
[1m Affected spec: [0m>=0
[1m ADVISORY: [0m** DISPUTED ** An issue was discovered in pip (all
versions) because it installs the version with the highest version number,
even if the user had intended to obtain a private package from a private
index. This only affects use of the --extra-index-url option, and
exploitation requires that the package does not already exist in the
public index (and thus the attacker can put the package there with an
arbitrary version number). NOTE: it has been reported that this is
intended functionality and the user is responsible for using --extra-
index-url securely.
[1m CVE-2018-20225[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67599/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67599 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
3 vulnerabilities were reported in 2 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 3 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
✔ OK cover in 1 minute, 24.542 seconds
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/IM-stage_2-merge_v15.0/requirements.txt, -r/home/jenkins/workspace/IM-stage_2-merge_v15.0/requirements-test.txt
cover develop-inst: /home/jenkins/workspace/IM-stage_2-merge_v15.0
cover installed: coverage==7.3.1,enum34==1.1.10,lxml==4.9.3,nose2==0.13.0,-e git+https://osm.etsi.org/gerrit/osm/IM.git@53dddb85f956ac3fbd372ecb2b278e5e5362b66b#egg=osm_im,pyang==2.5.3,pyangbind==0.8.3.post1,PyYAML==6.0.1,regex==2023.8.8,six==1.16.0
cover run-test-pre: PYTHONHASHSEED='1167802976'
cover run-test: commands[0] | sh -c 'make clean'
cover run-test: commands[1] | sh -c 'make models Q=""'
git clone --single-branch --branch v2.6.1 https://forge.etsi.org/rep/nfv/SOL006.git sol006_model
Cloning into 'sol006_model'...
patch -p2 < patch/deref_warnings.patch
patching file sol006_model/src/yang/etsi-nfv-ns.yang
patch -p2 < patch/nested_workaround.patch
patching file sol006_model/src/yang/etsi-nfv-ns.yang
wget -q https://raw.githubusercontent.com/YangModels/yang/master/standard/ietf/RFC/ietf-yang-types%402013-07-15.yang -O models/yang/ietf-yang-types.yang
wget -q https://raw.githubusercontent.com/YangModels/yang/master/standard/ietf/RFC/ietf-inet-types%402013-07-15.yang -O models/yang/ietf-inet-types.yang
cp models/yang/ietf-yang-types.yang sol006_model/src/yang/ietf-yang-types.yang
cp models/yang/ietf-inet-types.yang sol006_model/src/yang/ietf-inet-types.yang
echo generating vnfd.py from vnfd.yang
generating vnfd.py from vnfd.yang
pyang -Werror --path models/yang --plugindir "/tmp/.tox/cover/lib/python3.10/site-packages/pyangbind/plugin" -f pybind -o osm_im/vnfd.py models/yang/vnfd.yang
echo generating nsd.py from nsd.yang
generating nsd.py from nsd.yang
pyang -Werror --path models/yang --plugindir "/tmp/.tox/cover/lib/python3.10/site-packages/pyangbind/plugin" -f pybind -o osm_im/nsd.py models/yang/nsd.yang
echo generating nst.py from nst.yang
generating nst.py from nst.yang
pyang -Werror --path models/yang --plugindir "/tmp/.tox/cover/lib/python3.10/site-packages/pyangbind/plugin" -f pybind -o osm_im/nst.py models/yang/nst.yang
echo generating nsi.py from nsi.yang
generating nsi.py from nsi.yang
pyang -Werror --path models/yang --plugindir "/tmp/.tox/cover/lib/python3.10/site-packages/pyangbind/plugin" -f pybind -o osm_im/nsi.py models/yang/nsi.yang
echo generating etsi-nfv-vnfd.py from etsi-nfv-vnfd.yang
generating etsi-nfv-vnfd.py from etsi-nfv-vnfd.yang
pyang -Werror --path sol006_model/src/yang --plugindir "/tmp/.tox/cover/lib/python3.10/site-packages/pyangbind/plugin" -f pybind -o osm_im/etsi-nfv-vnfd.py models/augments/* sol006_model/src/yang/etsi-nfv-vnfd.yang
echo generating etsi-nfv-nsd.py from etsi-nfv-nsd.yang
generating etsi-nfv-nsd.py from etsi-nfv-nsd.yang
pyang -Werror --path sol006_model/src/yang --plugindir "/tmp/.tox/cover/lib/python3.10/site-packages/pyangbind/plugin" -f pybind -o osm_im/etsi-nfv-nsd.py models/augments/* sol006_model/src/yang/etsi-nfv-nsd.yang
mv osm_im/etsi-nfv-nsd.py osm_im/etsi_nfv_nsd.py
mv osm_im/etsi-nfv-vnfd.py osm_im/etsi_nfv_vnfd.py
cover run-test: commands[2] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[3] | coverage erase
cover run-test: commands[4] | nose2 -C --coverage osm_im -s tests
.....
----------------------------------------------------------------------
Ran 5 tests in 2.836s
OK
Name Stmts Miss Cover
----------------------------------------------
osm_im/__init__.py 0 0 100%
osm_im/etsi_nfv_nsd.py 16460 11943 27%
osm_im/etsi_nfv_vnfd.py 13719 8420 39%
osm_im/im_translation.py 502 52 90%
osm_im/nsd.py 5232 3935 25%
osm_im/nsi.py 5003 5003 0%
osm_im/nst.py 2901 2180 25%
osm_im/validation.py 50 12 76%
osm_im/vnfd.py 11058 7835 29%
----------------------------------------------
TOTAL 54925 39380 28%
cover run-test: commands[5] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
----------------------------------------------
osm_im/__init__.py 0 0 100%
osm_im/etsi_nfv_nsd.py 16460 11943 27%
osm_im/etsi_nfv_vnfd.py 13719 8420 39%
osm_im/im_translation.py 502 52 90%
osm_im/nsd.py 5232 3935 25%
osm_im/nsi.py 5003 5003 0%
osm_im/nst.py 2901 2180 25%
osm_im/validation.py 50 12 76%
osm_im/vnfd.py 11058 7835 29%
----------------------------------------------
TOTAL 54925 39380 28%
cover run-test: commands[6] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[7] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
congratulations :)