Started by upstream project "LCM-stage_1-merge" build number 682
originally caused by:
Triggered by Gerrit: https://osm.etsi.org/gerrit/13339
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/LCM.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/LCM.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --force --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/ELCM
Seen branch in repository origin/bug-585
Seen branch in repository origin/bug1511
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/lcm-bug-585
Seen branch in repository origin/master
Seen branch in repository origin/n2vc
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen 28 remote branches
Obtained Jenkinsfile from 443060724b85062cbc1f79d4264db4343953d19a
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-3 in /home/jenkins/workspace/LCM-stage_2-merge_master
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/LCM.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/LCM.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/LCM.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 443060724b85062cbc1f79d4264db4343953d19a (master)
> git config core.sparsecheckout # timeout=10
> git checkout -f 443060724b85062cbc1f79d4264db4343953d19a
Commit message: "Coverity-CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
> git rev-list --no-walk c03e17e4bc5bb1a507127aa986000435de3b4338 # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/LCM-stage_2-merge_master/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/master^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 18582e9176d2d4a07d4628fc0db7c6221613c4f2 (refs/remotes/origin/master)
> git config core.sparsecheckout # timeout=10
> git checkout -f 18582e9176d2d4a07d4628fc0db7c6221613c4f2
> git branch -a -v --no-abbrev # timeout=10
> git branch -D master # timeout=10
> git checkout -b master 18582e9176d2d4a07d4628fc0db7c6221613c4f2
Commit message: "Feature 11037 Installation of ingress controller in OSM community installer"
> git rev-list --no-walk 18582e9176d2d4a07d4628fc0db7c6221613c4f2 # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 24503 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect?page=changes
GERRIT_PROJECT=osm/LCM
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/
HUDSON_COOKIE=f7628130-27d9-4825-854d-5ae9c08abd06
JENKINS_SERVER_COOKIE=durable-b223ef56c99dfdf90459d24cdfbfcb32
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=443060724b85062cbc1f79d4264db4343953d19a
WORKSPACE=/home/jenkins/workspace/LCM-stage_2-merge_master
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=master
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=1
XDG_SESSION_ID=3541
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect?page=tests
BUILD_DISPLAY_NAME=#865
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=master
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=865
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-LCM-stage_2-merge-master-865
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/
BUILD_NUMBER=865
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/39/13339/3
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/display/redirect
JOB_NAME=LCM-stage_2-merge/master
TEST_INSTALL=false
PWD=/home/jenkins/workspace/LCM-stage_2-merge_master
SSH_CONNECTION=212.234.161.1 24503 172.21.249.3 22
BRANCH_NAME=master
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ git fetch --tags
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ git fetch origin refs/changes/39/13339/3
From https://osm.etsi.org/gerrit/osm/LCM
* branch refs/changes/39/13339/3 -> FETCH_HEAD
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ git checkout -f 443060724b85062cbc1f79d4264db4343953d19a
HEAD is now at 4430607 Coverity-CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .local/
Removing .safety/
Removing build.env
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing dist/
Removing nosetests.xml
Removing osm_lcm-9.0.0.post164+gc03e17e.tar.gz
Removing osm_lcm.egg-info/
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
No releasenote check present
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/lcm-master .
Sending build context to Docker daemon 166.3MB
Step 1/4 : FROM ubuntu:22.04
---> 52882761a72a
Step 2/4 : ARG APT_PROXY
---> Using cache
---> d8be122d3e42
Step 3/4 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> 80bcbdac0f70
Step 4/4 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools python3-pip tox
---> Using cache
---> 48099a4425a1
Successfully built 48099a4425a1
Successfully tagged osm/lcm-master:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ id -u
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/LCM-stage_2-merge_master -v /home/jenkins/workspace/LCM-stage_2-merge_master:/home/jenkins/workspace/LCM-stage_2-merge_master:rw,z -v /home/jenkins/workspace/LCM-stage_2-merge_master@tmp:/home/jenkins/workspace/LCM-stage_2-merge_master@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/lcm-master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/LCM-stage_2-merge_master -r -g jenkins jenkins
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
โ OK flake8 in 13.621 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8
flake8 develop-inst: /home/jenkins/workspace/LCM-stage_2-merge_master
flake8 installed: flake8==7.0.0,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/LCM.git@443060724b85062cbc1f79d4264db4343953d19a#egg=osm_lcm,pycodestyle==2.11.1,pyflakes==3.2.0
flake8 run-test-pre: PYTHONHASHSEED='4090919666'
flake8 run-test: commands[0] | flake8 osm_lcm/ setup.py
โ OK black in 2 minutes, 12.35 seconds
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.2,tomli==2.0.1,typing_extensions==4.12.0
black run-test-pre: PYTHONHASHSEED='2493489726'
black run-test: commands[0] | black --check --diff osm_lcm/
All done! โจ ๐ฐ โจ
40 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! โจ ๐ฐ โจ
1 file would be left unchanged.
ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/cover/log/cover-0.log
================================== log start ===================================
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt
ERROR: invocation failed (exit code 2), logfile: /tmp/.tox/cover/log/cover-2.log
================================== log start ===================================
Collecting n2vc@ git+https://osm.etsi.org/gerrit/osm/N2VC.git@master
Cloning https://osm.etsi.org/gerrit/osm/N2VC.git (to revision master) to /tmp/pip-install-_sq4v0jb/n2vc_ccdd1b94043e4dbab6c3cf9a964c9ba3
Running command git clone --filter=blob:none --quiet https://osm.etsi.org/gerrit/osm/N2VC.git /tmp/pip-install-_sq4v0jb/n2vc_ccdd1b94043e4dbab6c3cf9a964c9ba3
warning: filtering not recognized by server, ignoring
Resolved https://osm.etsi.org/gerrit/osm/N2VC.git to commit f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8
Preparing metadata (setup.py): started
Preparing metadata (setup.py): finished with status 'done'
Collecting osm-common@ git+https://osm.etsi.org/gerrit/osm/common.git@master
Cloning https://osm.etsi.org/gerrit/osm/common.git (to revision master) to /tmp/pip-install-_sq4v0jb/osm-common_db3de900d1184b2686a5bbda79ad21f7
Running command git clone --filter=blob:none --quiet https://osm.etsi.org/gerrit/osm/common.git /tmp/pip-install-_sq4v0jb/osm-common_db3de900d1184b2686a5bbda79ad21f7
warning: filtering not recognized by server, ignoring
Resolved https://osm.etsi.org/gerrit/osm/common.git to commit 409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd
Preparing metadata (setup.py): started
Preparing metadata (setup.py): finished with status 'done'
Collecting aiohttp==3.8.5
Downloading aiohttp-3.8.5-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (1.0 MB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 1.0/1.0 MB 14.8 kB/s eta 0:00:00
Collecting aiosignal==1.3.1
Downloading aiosignal-1.3.1-py3-none-any.whl (7.6 kB)
Collecting annotated-types==0.5.0
Downloading annotated_types-0.5.0-py3-none-any.whl (11 kB)
Collecting async-timeout==4.0.3
Downloading async_timeout-4.0.3-py3-none-any.whl (5.7 kB)
Collecting attrs==23.1.0
Downloading attrs-23.1.0-py3-none-any.whl (61 kB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 61.2/61.2 KB 22.7 kB/s eta 0:00:00
Collecting boltons==23.0.0
Downloading boltons-23.0.0-py2.py3-none-any.whl (194 kB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 194.8/194.8 KB 29.0 kB/s eta 0:00:00
Collecting charset-normalizer==3.2.0
Downloading charset_normalizer-3.2.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (201 kB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 201.8/201.8 KB 39.7 kB/s eta 0:00:00
Collecting checksumdir==1.2.0
Downloading checksumdir-1.2.0-py3-none-any.whl (5.3 kB)
Collecting config-man==0.0.4
Downloading config_man-0.0.4-py3-none-any.whl (6.3 kB)
Collecting face==20.1.1
Downloading face-20.1.1-py3-none-any.whl (51 kB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 51.1/51.1 KB 28.2 kB/s eta 0:00:00
Collecting frozenlist==1.4.0
Downloading frozenlist-1.4.0-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (225 kB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 225.7/225.7 KB 16.9 kB/s eta 0:00:00
Collecting glom==23.3.0
Downloading glom-23.3.0-py3-none-any.whl (101 kB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 101.9/101.9 KB 20.2 kB/s eta 0:00:00
Collecting grpcio==1.58.0
Downloading grpcio-1.58.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (5.3 MB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 5.3/5.3 MB 22.1 kB/s eta 0:00:00
Collecting grpcio-tools==1.48.1
Downloading grpcio_tools-1.48.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (2.4 MB)
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ 1.8/2.4 MB 22.2 kB/s eta 0:00:27
ERROR: Exception:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 438, in _error_catcher
yield
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 519, in read
data = self._fp.read(amt) if not fp_closed else b""
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/cachecontrol/filewrapper.py", line 90, in read
data = self.__fp.read(amt)
File "/usr/lib/python3.10/http/client.py", line 466, in read
s = self.fp.read(amt)
File "/usr/lib/python3.10/socket.py", line 705, in readinto
return self._sock.recv_into(b)
File "/usr/lib/python3.10/ssl.py", line 1303, in recv_into
return self.read(nbytes, buffer)
File "/usr/lib/python3.10/ssl.py", line 1159, in read
return self._sslobj.read(len, buffer)
TimeoutError: The read operation timed out
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/cli/base_command.py", line 165, in exc_logging_wrapper
status = run_func(*args)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/cli/req_command.py", line 205, in wrapper
return func(self, options, args)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/commands/install.py", line 339, in run
requirement_set = resolver.resolve(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/resolver.py", line 94, in resolve
result = self._result = resolver.resolve(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/resolvers.py", line 481, in resolve
state = resolution.resolve(requirements, max_rounds=max_rounds)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/resolvers.py", line 348, in resolve
self._add_to_criteria(self.state.criteria, r, parent=None)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/resolvers.py", line 172, in _add_to_criteria
if not criterion.candidates:
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/structs.py", line 151, in __bool__
return bool(self._sequence)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/found_candidates.py", line 155, in __bool__
return any(self)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/found_candidates.py", line 143, in <genexpr>
return (c for c in iterator if id(c) not in self._incompatible_ids)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/found_candidates.py", line 47, in _iter_built
candidate = func()
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/factory.py", line 215, in _make_candidate_from_link
self._link_candidate_cache[link] = LinkCandidate(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 288, in __init__
super().__init__(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 158, in __init__
self.dist = self._prepare()
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 227, in _prepare
dist = self._prepare_distribution()
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 299, in _prepare_distribution
return preparer.prepare_linked_requirement(self._ireq, parallel_builds=True)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 487, in prepare_linked_requirement
return self._prepare_linked_requirement(req, parallel_builds)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 532, in _prepare_linked_requirement
local_file = unpack_url(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 214, in unpack_url
file = get_http_url(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 94, in get_http_url
from_path, content_type = download(link, temp_dir.path)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/network/download.py", line 146, in __call__
for chunk in chunks:
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/cli/progress_bars.py", line 304, in _rich_progress_bar
for chunk in iterable:
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/network/utils.py", line 63, in response_chunks
for chunk in response.raw.stream(
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 576, in stream
data = self.read(amt=amt, decode_content=decode_content)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 512, in read
with self._error_catcher():
File "/usr/lib/python3.10/contextlib.py", line 153, in __exit__
self.gen.throw(typ, value, traceback)
File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 443, in _error_catcher
raise ReadTimeoutError(self._pool, None, "Read timed out.")
pip._vendor.urllib3.exceptions.ReadTimeoutError: HTTPSConnectionPool(host='files.pythonhosted.org', port=443): Read timed out.
=================================== log end ====================================
ERROR: could not install deps [-r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt]; v = InvocationError('/tmp/.tox/cover/bin/python -m pip install -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt', 2)
=================================== log end ====================================
โ FAIL cover in 7 minutes, 2.771 seconds
โ OK safety in 14 minutes, 7.979 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/LCM-stage_2-merge_master
safety installed: aiohttp==3.8.5,aiosignal==1.3.1,annotated-types==0.5.0,async-timeout==4.0.3,attrs==23.1.0,Authlib==1.3.0,boltons==23.0.0,certifi==2024.2.2,cffi==1.16.0,charset-normalizer==3.2.0,checksumdir==1.2.0,click==8.1.7,config-man==0.0.4,cryptography==42.0.7,dparse==0.6.4b0,face==20.1.1,frozenlist==1.4.0,glom==23.3.0,grpcio==1.58.0,grpcio-tools==1.48.1,grpclib==0.4.5,h2==4.1.0,hpack==4.0.0,hyperframe==6.0.1,idna==3.4,Jinja2==3.1.2,markdown-it-py==3.0.0,MarkupSafe==2.1.3,marshmallow==3.21.2,mdurl==0.1.2,multidict==6.0.4,-e git+https://osm.etsi.org/gerrit/osm/LCM.git@443060724b85062cbc1f79d4264db4343953d19a#egg=osm_lcm,packaging==24.0,protobuf==3.20.3,pycparser==2.22,pydantic==2.4.2,pydantic_core==2.10.1,Pygments==2.18.0,PyYAML==6.0.1,requests==2.32.3,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,tomli==2.0.1,typer==0.12.3,typing_extensions==4.8.0,urllib3==2.2.1,yarl==1.9.2
safety run-test-pre: PYTHONHASHSEED='2249606852'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.2.0[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /home/jenkins/workspace/LCM-stage_2-merge_master
-> /usr/lib/python310.zip
-> /usr/lib/python3.10/lib-dynload
-> /tmp/.tox/safety/lib/python3.10/site-packages
-> /usr/lib/python3.10
-> /tmp/.tox/safety/bin
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 54 packages[0m
Timestamp [1m2024-05-29 19:48:02[0m
[1m 10[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m67599
[1m Affected spec: [0m>=0
[1m ADVISORY: [0m** DISPUTED ** An issue was discovered in pip (all
versions) because it installs the version with the highest version number,
even if the user had intended to obtain a private package from a private
index. This only affects use of the --extra-index-url option, and
exploitation requires that the package does not already exist in the
public index (and thus the attacker can put the package there with an
arbitrary version number). NOTE: it has been reported that this is
intended functionality and the user is responsible for using --extra-
index-url securely.
[1m CVE-2018-20225[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67599/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67599 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mAffected versions of Pip are vulnerable to Command
Injection. When installing a package from a Mercurial VCS URL (ie "pip
install hg+...") with pip prior to v23.3, the specified Mercurial revision
could be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not affect
users who aren't installing from Mercurial.
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in idna version 3.4[0m
[1m Vulnerability ID: [0m67895
[1m Affected spec: [0m<3.7
[1m ADVISORY: [0mCVE-2024-3651 impacts the idna.encode() function, where
a specially crafted argument could lead to significant resource
consumption, causing a denial-of-service. In version 3.7, this function
has been updated to reject such inputs efficiently, minimizing resource
use. A practical workaround involves enforcing a maximum domain name
length of 253 characters before encoding, as the vulnerability is
triggered by unusually large inputs that normal operations wouldn't
encounter.
[1m CVE-2024-3651[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67895/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67895 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in aiohttp version 3.8.5[0m
[1m Vulnerability ID: [0m62582
[1m Affected spec: [0m<3.9.0
[1m ADVISORY: [0mAiohttp 3.9.0 includes a fix for CVE-2023-49081:
Improper validation made it possible for an attacker to modify the HTTP
request (e.g. to insert a new header) or create a new HTTP request if the
attacker controls the HTTP version. The vulnerability only occurs if the
attacker can control the HTTP version of the
request.https://github.com/aio-
libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2
[1m CVE-2023-49081[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62582/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62582 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in aiohttp version 3.8.5[0m
[1m Vulnerability ID: [0m62583
[1m Affected spec: [0m<3.9.0
[1m ADVISORY: [0mAffected versions of aiohttp are vulnerable to an
Improper Validation vulnerability. It is possible for an attacker to
modify the HTTP request (e.g. insert a new header) or even create a new
HTTP request if the attacker controls the HTTP method. The vulnerability
occurs only if the attacker can control the HTTP method (GET, POST etc.)
of the request. If the attacker can control the HTTP version of the
request it will be able to modify the request (request smuggling).
[1m CVE-2023-49082[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62583/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62583 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in aiohttp version 3.8.5[0m
[1m Vulnerability ID: [0m64642
[1m Affected spec: [0m>1.0.5,<3.9.2
[1m ADVISORY: [0mThe vulnerability lies in the improper configuration of
static resource resolution when aiohttp is used as a web server. It occurs
when the follow_symlinks option is enabled without proper validation,
leading to directory traversal vulnerabilities. Unauthorized access to
arbitrary files on the system could potentially occur. The affected
versions are >1.0.5, and the issue was patched in version 3.9.2. As a
workaround, it is advised to disable the follow_symlinks option outside of
a restricted local development environment, especially in a server
accepting requests from remote users. Using a reverse proxy server to
handle static resources is also recommended.https://github.com/aio-
libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b
[1m CVE-2024-23334[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64642/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64642 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in aiohttp version 3.8.5[0m
[1m Vulnerability ID: [0m62326
[1m Affected spec: [0m<3.8.6
[1m ADVISORY: [0mAiohttp 3.8.6 includes a fix for CVE-2023-47627: The
HTTP parser in AIOHTTP has numerous problems with header parsing, which
could lead to request smuggling. This parser is only used when
AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt
wheel).https://github.com/aio-libs/aiohttp/security/advisories/GHSA-
gfw2-4jvh-wgfg
[1m CVE-2023-47627[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62326/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62326 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in aiohttp version 3.8.5[0m
[1m Vulnerability ID: [0m64644
[1m Affected spec: [0m<3.9.1
[1m ADVISORY: [0mThe aiohttp versions minor than 3.9. has a vulnerability
that affects the Python HTTP parser used in the aiohttp library. It allows
for minor differences in allowable character sets, which could lead to
robust frame boundary matching of proxies to protect against the injection
of additional requests. The vulnerability also allows exceptions during
validation that aren't handled consistently with other malformed inputs.
[1m CVE-2024-23829[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64644/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64644 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in jinja2 version 3.1.2[0m
[1m Vulnerability ID: [0m64227
[1m Affected spec: [0m<3.1.3
[1m ADVISORY: [0mJinja2 before 3.1.3 is affected by a Cross-Site
Scripting vulnerability. Special placeholders in the template allow
writing code similar to Python syntax. It is possible to inject arbitrary
HTML attributes into the rendered HTML template. The Jinja 'xmlattr'
filter can be abused to inject arbitrary HTML attribute keys and values,
bypassing the auto escaping mechanism and potentially leading to XSS. It
may also be possible to bypass attribute validation checks if they are
blacklist-based.
[1m CVE-2024-22195[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64227/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64227 in safetyโs
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
10 vulnerabilities were reported in 5 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 10 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
โ OK pylint in 19 minutes, 51.087 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt, pylint==3.1.1
pylint develop-inst: /home/jenkins/workspace/LCM-stage_2-merge_master
pylint installed: aiohttp==3.8.5,aiokafka==0.8.1,aiosignal==1.3.1,annotated-types==0.5.0,astroid==3.1.0,async-timeout==4.0.3,asynctest==0.13.0,attrs==23.1.0,bcrypt==4.0.1,boltons==23.0.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,checksumdir==1.2.0,config-man==0.0.4,coverage==7.3.1,cryptography==41.0.4,dataclasses==0.6,dill==0.3.8,dnspython==2.4.2,face==20.1.1,frozenlist==1.4.0,glom==23.3.0,google-auth==2.17.3,grpcio==1.58.0,grpcio-tools==1.48.1,grpclib==0.4.5,h2==4.1.0,hpack==4.0.0,hyperframe==6.0.1,idna==3.4,isort==5.13.2,Jinja2==3.1.2,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,kubernetes==26.1.0,macaroonbakery==1.3.1,MarkupSafe==2.1.3,mccabe==0.7.0,mock==5.1.0,motor==3.3.1,multidict==6.0.4,mypy-extensions==1.0.0,N2VC @ git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8,nose2==0.13.0,oauthlib==3.2.2,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd,-e git+https://osm.etsi.org/gerrit/osm/LCM.git@443060724b85062cbc1f79d4264db4343953d19a#egg=osm_lcm,packaging==23.1,paramiko==2.12.0,platformdirs==4.2.2,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,pydantic==2.4.2,pydantic_core==2.10.1,pylint==3.1.1,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyRFC3339==1.1,python-dateutil==2.8.2,pytz==2023.3.post1,PyYAML==6.0.1,requests==2.31.0,requests-oauthlib==1.3.1,retrying-async==2.0.0,rsa==4.9,six==1.16.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.5,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,urllib3==2.0.5,websocket-client==1.6.3,websockets==11.0.3,yarl==1.9.2
pylint run-test-pre: PYTHONHASHSEED='1753103593'
pylint run-test: commands[0] | pylint -E osm_lcm --extension-pkg-allow-list=pydantic
___________________________________ summary ____________________________________
black: commands succeeded
ERROR: cover: parallel child exit code 1
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 a6934f0fc0f317ffa2e49f6b70970690cba12f299446a86cd1859edb6d9a7df8
$ docker rm -f a6934f0fc0f317ffa2e49f6b70970690cba12f299446a86cd1859edb6d9a7df8
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE