FailedConsole Output

Started by upstream project "LCM-stage_1-merge" build number 682
originally caused by:
 Triggered by Gerrit: https://osm.etsi.org/gerrit/13339
 > git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/LCM.git
 > git config remote.origin.url https://osm.etsi.org/gerrit/osm/LCM.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
 > git --version # timeout=10
 > git config --get remote.origin.url # timeout=10
 > git fetch --tags --force --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/ELCM
Seen branch in repository origin/bug-585
Seen branch in repository origin/bug1511
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/lcm-bug-585
Seen branch in repository origin/master
Seen branch in repository origin/n2vc
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen 28 remote branches
Obtained Jenkinsfile from 443060724b85062cbc1f79d4264db4343953d19a
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-3 in /home/jenkins/workspace/LCM-stage_2-merge_master
[Pipeline] {
[Pipeline] checkout
No credentials specified
 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://osm.etsi.org/gerrit/osm/LCM.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/LCM.git
 > git --version # timeout=10
 > git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/LCM.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 443060724b85062cbc1f79d4264db4343953d19a (master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 443060724b85062cbc1f79d4264db4343953d19a
Commit message: "Coverity-CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"
 > git rev-list --no-walk c03e17e4bc5bb1a507127aa986000435de3b4338 # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/LCM-stage_2-merge_master/devops
[Pipeline] {
[Pipeline] git
No credentials specified
 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
 > git --version # timeout=10
 > git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
 > git rev-parse refs/remotes/origin/master^{commit} # timeout=10
 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 18582e9176d2d4a07d4628fc0db7c6221613c4f2 (refs/remotes/origin/master)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 18582e9176d2d4a07d4628fc0db7c6221613c4f2
 > git branch -a -v --no-abbrev # timeout=10
 > git branch -D master # timeout=10
 > git checkout -b master 18582e9176d2d4a07d4628fc0db7c6221613c4f2
Commit message: "Feature 11037 Installation of ingress controller in OSM community installer"
 > git rev-list --no-walk 18582e9176d2d4a07d4628fc0db7c6221613c4f2 # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 24503 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect?page=changes
GERRIT_PROJECT=osm/LCM
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/
HUDSON_COOKIE=f7628130-27d9-4825-854d-5ae9c08abd06
JENKINS_SERVER_COOKIE=durable-b223ef56c99dfdf90459d24cdfbfcb32
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=443060724b85062cbc1f79d4264db4343953d19a
WORKSPACE=/home/jenkins/workspace/LCM-stage_2-merge_master
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=master
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=1
XDG_SESSION_ID=3541
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect?page=tests
BUILD_DISPLAY_NAME=#865
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=master
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=865
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-LCM-stage_2-merge-master-865
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/
BUILD_NUMBER=865
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/865/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/39/13339/3
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/LCM-stage_2-merge/job/master/display/redirect
JOB_NAME=LCM-stage_2-merge/master
TEST_INSTALL=false
PWD=/home/jenkins/workspace/LCM-stage_2-merge_master
SSH_CONNECTION=212.234.161.1 24503 172.21.249.3 22
BRANCH_NAME=master
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ git fetch --tags
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ git fetch origin refs/changes/39/13339/3
From https://osm.etsi.org/gerrit/osm/LCM
 * branch            refs/changes/39/13339/3 -> FETCH_HEAD
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ git checkout -f 443060724b85062cbc1f79d4264db4343953d19a
HEAD is now at 4430607 Coverity-CWE 22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .local/
Removing .safety/
Removing build.env
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing dist/
Removing nosetests.xml
Removing osm_lcm-9.0.0.post164+gc03e17e.tar.gz
Removing osm_lcm.egg-info/
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
No releasenote check present
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/lcm-master .
Sending build context to Docker daemon  166.3MB

Step 1/4 : FROM ubuntu:22.04
 ---> 52882761a72a
Step 2/4 : ARG APT_PROXY
 ---> Using cache
 ---> d8be122d3e42
Step 3/4 : RUN if [ ! -z $APT_PROXY ] ; then     echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ;    echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ;    fi
 ---> Using cache
 ---> 80bcbdac0f70
Step 4/4 : RUN DEBIAN_FRONTEND=noninteractive apt-get update &&     DEBIAN_FRONTEND=noninteractive apt-get -y install         debhelper         dh-python         git         python3         python3-all         python3-dev         python3-setuptools         python3-pip         tox
 ---> Using cache
 ---> 48099a4425a1
Successfully built 48099a4425a1
Successfully tagged osm/lcm-master:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ id -u
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/LCM-stage_2-merge_master -v /home/jenkins/workspace/LCM-stage_2-merge_master:/home/jenkins/workspace/LCM-stage_2-merge_master:rw,z -v /home/jenkins/workspace/LCM-stage_2-merge_master@tmp:/home/jenkins/workspace/LCM-stage_2-merge_master@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/lcm-master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/LCM-stage_2-merge_master -r -g jenkins jenkins
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[LCM-stage_2-merge_master] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
โœ” OK flake8 in 13.621 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8
flake8 develop-inst: /home/jenkins/workspace/LCM-stage_2-merge_master
flake8 installed: flake8==7.0.0,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/LCM.git@443060724b85062cbc1f79d4264db4343953d19a#egg=osm_lcm,pycodestyle==2.11.1,pyflakes==3.2.0
flake8 run-test-pre: PYTHONHASHSEED='4090919666'
flake8 run-test: commands[0] | flake8 osm_lcm/ setup.py

โœ” OK black in 2 minutes, 12.35 seconds
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.2,tomli==2.0.1,typing_extensions==4.12.0
black run-test-pre: PYTHONHASHSEED='2493489726'
black run-test: commands[0] | black --check --diff osm_lcm/
All done! โœจ ๐Ÿฐ โœจ
40 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! โœจ ๐Ÿฐ โœจ
1 file would be left unchanged.

ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/cover/log/cover-0.log
================================== log start ===================================
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt
ERROR: invocation failed (exit code 2), logfile: /tmp/.tox/cover/log/cover-2.log
================================== log start ===================================
Collecting n2vc@ git+https://osm.etsi.org/gerrit/osm/N2VC.git@master
  Cloning https://osm.etsi.org/gerrit/osm/N2VC.git (to revision master) to /tmp/pip-install-_sq4v0jb/n2vc_ccdd1b94043e4dbab6c3cf9a964c9ba3
  Running command git clone --filter=blob:none --quiet https://osm.etsi.org/gerrit/osm/N2VC.git /tmp/pip-install-_sq4v0jb/n2vc_ccdd1b94043e4dbab6c3cf9a964c9ba3
  warning: filtering not recognized by server, ignoring
  Resolved https://osm.etsi.org/gerrit/osm/N2VC.git to commit f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8
  Preparing metadata (setup.py): started
  Preparing metadata (setup.py): finished with status 'done'
Collecting osm-common@ git+https://osm.etsi.org/gerrit/osm/common.git@master
  Cloning https://osm.etsi.org/gerrit/osm/common.git (to revision master) to /tmp/pip-install-_sq4v0jb/osm-common_db3de900d1184b2686a5bbda79ad21f7
  Running command git clone --filter=blob:none --quiet https://osm.etsi.org/gerrit/osm/common.git /tmp/pip-install-_sq4v0jb/osm-common_db3de900d1184b2686a5bbda79ad21f7
  warning: filtering not recognized by server, ignoring
  Resolved https://osm.etsi.org/gerrit/osm/common.git to commit 409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd
  Preparing metadata (setup.py): started
  Preparing metadata (setup.py): finished with status 'done'
Collecting aiohttp==3.8.5
  Downloading aiohttp-3.8.5-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (1.0 MB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 1.0/1.0 MB 14.8 kB/s eta 0:00:00
Collecting aiosignal==1.3.1
  Downloading aiosignal-1.3.1-py3-none-any.whl (7.6 kB)
Collecting annotated-types==0.5.0
  Downloading annotated_types-0.5.0-py3-none-any.whl (11 kB)
Collecting async-timeout==4.0.3
  Downloading async_timeout-4.0.3-py3-none-any.whl (5.7 kB)
Collecting attrs==23.1.0
  Downloading attrs-23.1.0-py3-none-any.whl (61 kB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 61.2/61.2 KB 22.7 kB/s eta 0:00:00
Collecting boltons==23.0.0
  Downloading boltons-23.0.0-py2.py3-none-any.whl (194 kB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 194.8/194.8 KB 29.0 kB/s eta 0:00:00
Collecting charset-normalizer==3.2.0
  Downloading charset_normalizer-3.2.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (201 kB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 201.8/201.8 KB 39.7 kB/s eta 0:00:00
Collecting checksumdir==1.2.0
  Downloading checksumdir-1.2.0-py3-none-any.whl (5.3 kB)
Collecting config-man==0.0.4
  Downloading config_man-0.0.4-py3-none-any.whl (6.3 kB)
Collecting face==20.1.1
  Downloading face-20.1.1-py3-none-any.whl (51 kB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 51.1/51.1 KB 28.2 kB/s eta 0:00:00
Collecting frozenlist==1.4.0
  Downloading frozenlist-1.4.0-cp310-cp310-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl (225 kB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 225.7/225.7 KB 16.9 kB/s eta 0:00:00
Collecting glom==23.3.0
  Downloading glom-23.3.0-py3-none-any.whl (101 kB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 101.9/101.9 KB 20.2 kB/s eta 0:00:00
Collecting grpcio==1.58.0
  Downloading grpcio-1.58.0-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (5.3 MB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ” 5.3/5.3 MB 22.1 kB/s eta 0:00:00
Collecting grpcio-tools==1.48.1
  Downloading grpcio_tools-1.48.1-cp310-cp310-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (2.4 MB)
     โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”           1.8/2.4 MB 22.2 kB/s eta 0:00:27
ERROR: Exception:
Traceback (most recent call last):
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 438, in _error_catcher
    yield
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 519, in read
    data = self._fp.read(amt) if not fp_closed else b""
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/cachecontrol/filewrapper.py", line 90, in read
    data = self.__fp.read(amt)
  File "/usr/lib/python3.10/http/client.py", line 466, in read
    s = self.fp.read(amt)
  File "/usr/lib/python3.10/socket.py", line 705, in readinto
    return self._sock.recv_into(b)
  File "/usr/lib/python3.10/ssl.py", line 1303, in recv_into
    return self.read(nbytes, buffer)
  File "/usr/lib/python3.10/ssl.py", line 1159, in read
    return self._sslobj.read(len, buffer)
TimeoutError: The read operation timed out

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/cli/base_command.py", line 165, in exc_logging_wrapper
    status = run_func(*args)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/cli/req_command.py", line 205, in wrapper
    return func(self, options, args)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/commands/install.py", line 339, in run
    requirement_set = resolver.resolve(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/resolver.py", line 94, in resolve
    result = self._result = resolver.resolve(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/resolvers.py", line 481, in resolve
    state = resolution.resolve(requirements, max_rounds=max_rounds)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/resolvers.py", line 348, in resolve
    self._add_to_criteria(self.state.criteria, r, parent=None)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/resolvers.py", line 172, in _add_to_criteria
    if not criterion.candidates:
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/resolvelib/structs.py", line 151, in __bool__
    return bool(self._sequence)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/found_candidates.py", line 155, in __bool__
    return any(self)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/found_candidates.py", line 143, in <genexpr>
    return (c for c in iterator if id(c) not in self._incompatible_ids)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/found_candidates.py", line 47, in _iter_built
    candidate = func()
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/factory.py", line 215, in _make_candidate_from_link
    self._link_candidate_cache[link] = LinkCandidate(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 288, in __init__
    super().__init__(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 158, in __init__
    self.dist = self._prepare()
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 227, in _prepare
    dist = self._prepare_distribution()
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/resolution/resolvelib/candidates.py", line 299, in _prepare_distribution
    return preparer.prepare_linked_requirement(self._ireq, parallel_builds=True)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 487, in prepare_linked_requirement
    return self._prepare_linked_requirement(req, parallel_builds)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 532, in _prepare_linked_requirement
    local_file = unpack_url(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 214, in unpack_url
    file = get_http_url(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/operations/prepare.py", line 94, in get_http_url
    from_path, content_type = download(link, temp_dir.path)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/network/download.py", line 146, in __call__
    for chunk in chunks:
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/cli/progress_bars.py", line 304, in _rich_progress_bar
    for chunk in iterable:
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_internal/network/utils.py", line 63, in response_chunks
    for chunk in response.raw.stream(
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 576, in stream
    data = self.read(amt=amt, decode_content=decode_content)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 512, in read
    with self._error_catcher():
  File "/usr/lib/python3.10/contextlib.py", line 153, in __exit__
    self.gen.throw(typ, value, traceback)
  File "/tmp/.tox/cover/lib/python3.10/site-packages/pip/_vendor/urllib3/response.py", line 443, in _error_catcher
    raise ReadTimeoutError(self._pool, None, "Read timed out.")
pip._vendor.urllib3.exceptions.ReadTimeoutError: HTTPSConnectionPool(host='files.pythonhosted.org', port=443): Read timed out.

=================================== log end ====================================
ERROR: could not install deps [-r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt]; v = InvocationError('/tmp/.tox/cover/bin/python -m pip install -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt', 2)

=================================== log end ====================================
โœ– FAIL cover in 7 minutes, 2.771 seconds
โœ” OK safety in 14 minutes, 7.979 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/LCM-stage_2-merge_master
safety installed: aiohttp==3.8.5,aiosignal==1.3.1,annotated-types==0.5.0,async-timeout==4.0.3,attrs==23.1.0,Authlib==1.3.0,boltons==23.0.0,certifi==2024.2.2,cffi==1.16.0,charset-normalizer==3.2.0,checksumdir==1.2.0,click==8.1.7,config-man==0.0.4,cryptography==42.0.7,dparse==0.6.4b0,face==20.1.1,frozenlist==1.4.0,glom==23.3.0,grpcio==1.58.0,grpcio-tools==1.48.1,grpclib==0.4.5,h2==4.1.0,hpack==4.0.0,hyperframe==6.0.1,idna==3.4,Jinja2==3.1.2,markdown-it-py==3.0.0,MarkupSafe==2.1.3,marshmallow==3.21.2,mdurl==0.1.2,multidict==6.0.4,-e git+https://osm.etsi.org/gerrit/osm/LCM.git@443060724b85062cbc1f79d4264db4343953d19a#egg=osm_lcm,packaging==24.0,protobuf==3.20.3,pycparser==2.22,pydantic==2.4.2,pydantic_core==2.10.1,Pygments==2.18.0,PyYAML==6.0.1,requests==2.32.3,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,tomli==2.0.1,typer==0.12.3,typing_extensions==4.8.0,urllib3==2.2.1,yarl==1.9.2
safety run-test-pre: PYTHONHASHSEED='2249606852'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+

                               /$$$$$$            /$$
                              /$$__  $$          | $$
           /$$$$$$$  /$$$$$$ | $$  \__//$$$$$$  /$$$$$$   /$$   /$$
          /$$_____/ |____  $$| $$$$   /$$__  $$|_  $$_/  | $$  | $$
         |  $$$$$$   /$$$$$$$| $$_/  | $$$$$$$$  | $$    | $$  | $$
          \____  $$ /$$__  $$| $$    | $$_____/  | $$ /$$| $$  | $$
          /$$$$$$$/|  $$$$$$$| $$    |  $$$$$$$  |  $$$$/|  $$$$$$$
         |_______/  \_______/|__/     \_______/   \___/   \____  $$
                                                          /$$  | $$
                                                         |  $$$$$$/
  by safetycli.com                                        \______/

+==============================================================================+

 REPORT 

  Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. 
  For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io

  Safety v3.2.0 is scanning for Vulnerabilities...
  Scanning dependencies in your environment:

  -> /home/jenkins/workspace/LCM-stage_2-merge_master
  -> /usr/lib/python310.zip
  -> /usr/lib/python3.10/lib-dynload
  -> /tmp/.tox/safety/lib/python3.10/site-packages
  -> /usr/lib/python3.10
  -> /tmp/.tox/safety/bin

  Using open-source vulnerability database
  Found and scanned 54 packages
  Timestamp 2024-05-29 19:48:02
  10 vulnerabilities reported
  0 vulnerabilities ignored

+==============================================================================+
 VULNERABILITIES REPORTED 
+==============================================================================+

-> Vulnerability found in wheel version 0.37.1
   Vulnerability ID: 51499
   Affected spec: <0.38.1
   ADVISORY: Wheel 0.38.1 includes a fix for CVE-2022-40898: An issue
   discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
   allows remote attackers to cause a denial of service via attacker
   controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
   vulnerabilities-in-top-python-packages
   CVE-2022-40898
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/51499/97c
   To ignore this vulnerability, use PyUp vulnerability id 51499 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in pip version 22.0.2
   Vulnerability ID: 67599
   Affected spec: >=0
   ADVISORY: ** DISPUTED ** An issue was discovered in pip (all
   versions) because it installs the version with the highest version number,
   even if the user had intended to obtain a private package from a private
   index. This only affects use of the --extra-index-url option, and
   exploitation requires that the package does not already exist in the
   public index (and thus the attacker can put the package there with an
   arbitrary version number). NOTE: it has been reported that this is
   intended functionality and the user is responsible for using --extra-
   index-url securely.
   CVE-2018-20225
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/67599/97c
   To ignore this vulnerability, use PyUp vulnerability id 67599 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in pip version 22.0.2
   Vulnerability ID: 62044
   Affected spec: <23.3
   ADVISORY: Affected versions of Pip are vulnerable to Command
   Injection. When installing a package from a Mercurial VCS URL (ie "pip
   install hg+...") with pip prior to v23.3, the specified Mercurial revision
   could be used to inject arbitrary configuration options to the "hg clone"
   call (ie "--config"). Controlling the Mercurial configuration can modify
   how and which repository is installed. This vulnerability does not affect
   users who aren't installing from Mercurial.
   CVE-2023-5752
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/62044/97c
   To ignore this vulnerability, use PyUp vulnerability id 62044 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in idna version 3.4
   Vulnerability ID: 67895
   Affected spec: <3.7
   ADVISORY: CVE-2024-3651 impacts the idna.encode() function, where
   a specially crafted argument could lead to significant resource
   consumption, causing a denial-of-service. In version 3.7, this function
   has been updated to reject such inputs efficiently, minimizing resource
   use. A practical workaround involves enforcing a maximum domain name
   length of 253 characters before encoding, as the vulnerability is
   triggered by unusually large inputs that normal operations wouldn't
   encounter.
   CVE-2024-3651
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/67895/97c
   To ignore this vulnerability, use PyUp vulnerability id 67895 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in aiohttp version 3.8.5
   Vulnerability ID: 62582
   Affected spec: <3.9.0
   ADVISORY: Aiohttp 3.9.0 includes a fix for CVE-2023-49081:
   Improper validation made it possible for an attacker to modify the HTTP
   request (e.g. to insert a new header) or create a new HTTP request if the
   attacker controls the HTTP version. The vulnerability only occurs if the
   attacker can control the HTTP version of the
   request.https://github.com/aio-
   libs/aiohttp/security/advisories/GHSA-q3qx-c6g2-7pw2
   CVE-2023-49081
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/62582/97c
   To ignore this vulnerability, use PyUp vulnerability id 62582 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in aiohttp version 3.8.5
   Vulnerability ID: 62583
   Affected spec: <3.9.0
   ADVISORY: Affected versions of aiohttp are vulnerable to an
   Improper Validation vulnerability. It is possible for an attacker to
   modify the HTTP request (e.g. insert a new header) or even create a new
   HTTP request if the attacker controls the HTTP method. The vulnerability
   occurs only if the attacker can control the HTTP method (GET, POST etc.)
   of the request. If the attacker can control the HTTP version of the
   request it will be able to modify the request (request smuggling).
   CVE-2023-49082
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/62583/97c
   To ignore this vulnerability, use PyUp vulnerability id 62583 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in aiohttp version 3.8.5
   Vulnerability ID: 64642
   Affected spec: >1.0.5,<3.9.2
   ADVISORY: The vulnerability lies in the improper configuration of
   static resource resolution when aiohttp is used as a web server. It occurs
   when the follow_symlinks option is enabled without proper validation,
   leading to directory traversal vulnerabilities. Unauthorized access to
   arbitrary files on the system could potentially occur. The affected
   versions are >1.0.5, and the issue was patched in version 3.9.2. As a
   workaround, it is advised to disable the follow_symlinks option outside of
   a restricted local development environment, especially in a server
   accepting requests from remote users. Using a reverse proxy server to
   handle static resources is also recommended.https://github.com/aio-
   libs/aiohttp/commit/1c335944d6a8b1298baf179b7c0b3069f10c514b
   CVE-2024-23334
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/64642/97c
   To ignore this vulnerability, use PyUp vulnerability id 64642 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in aiohttp version 3.8.5
   Vulnerability ID: 62326
   Affected spec: <3.8.6
   ADVISORY: Aiohttp 3.8.6 includes a fix for CVE-2023-47627: The
   HTTP parser in AIOHTTP has numerous problems with header parsing, which
   could lead to request smuggling. This parser is only used when
   AIOHTTP_NO_EXTENSIONS is enabled (or not using a prebuilt
   wheel).https://github.com/aio-libs/aiohttp/security/advisories/GHSA-
   gfw2-4jvh-wgfg
   CVE-2023-47627
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/62326/97c
   To ignore this vulnerability, use PyUp vulnerability id 62326 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in aiohttp version 3.8.5
   Vulnerability ID: 64644
   Affected spec: <3.9.1
   ADVISORY: The aiohttp versions minor than 3.9. has a vulnerability
   that affects the Python HTTP parser used in the aiohttp library. It allows
   for minor differences in allowable character sets, which could lead to
   robust frame boundary matching of proxies to protect against the injection
   of additional requests. The vulnerability also allows  exceptions during
   validation that aren't handled consistently with other malformed inputs.
   CVE-2024-23829
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/64644/97c
   To ignore this vulnerability, use PyUp vulnerability id 64644 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


-> Vulnerability found in jinja2 version 3.1.2
   Vulnerability ID: 64227
   Affected spec: <3.1.3
   ADVISORY: Jinja2 before 3.1.3 is affected by a Cross-Site
   Scripting vulnerability. Special placeholders in the template allow
   writing code similar to Python syntax. It is possible to inject arbitrary
   HTML attributes into the rendered HTML template. The Jinja 'xmlattr'
   filter can be abused to inject arbitrary HTML attribute keys and values,
   bypassing the auto escaping mechanism and potentially leading to XSS. It
   may also be possible to bypass attribute validation checks if they are
   blacklist-based.
   CVE-2024-22195
   For more information about this vulnerability, visit
   https://data.safetycli.com/v/64227/97c
   To ignore this vulnerability, use PyUp vulnerability id 64227 in safetyโ€™s
   ignore command-line argument or add the ignore to your safety policy file.


+==============================================================================+
   REMEDIATIONS

  10 vulnerabilities were reported in 5 packages. For detailed remediation & 
  fix recommendations, upgrade to a commercial license. 

+==============================================================================+

 Scan was completed. 10 vulnerabilities were reported. 

+==============================================================================+

  Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. 
  For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io

+==============================================================================+

โœ” OK pylint in 19 minutes, 51.087 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/LCM-stage_2-merge_master/requirements-test.txt, pylint==3.1.1
pylint develop-inst: /home/jenkins/workspace/LCM-stage_2-merge_master
pylint installed: aiohttp==3.8.5,aiokafka==0.8.1,aiosignal==1.3.1,annotated-types==0.5.0,astroid==3.1.0,async-timeout==4.0.3,asynctest==0.13.0,attrs==23.1.0,bcrypt==4.0.1,boltons==23.0.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,checksumdir==1.2.0,config-man==0.0.4,coverage==7.3.1,cryptography==41.0.4,dataclasses==0.6,dill==0.3.8,dnspython==2.4.2,face==20.1.1,frozenlist==1.4.0,glom==23.3.0,google-auth==2.17.3,grpcio==1.58.0,grpcio-tools==1.48.1,grpclib==0.4.5,h2==4.1.0,hpack==4.0.0,hyperframe==6.0.1,idna==3.4,isort==5.13.2,Jinja2==3.1.2,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,kubernetes==26.1.0,macaroonbakery==1.3.1,MarkupSafe==2.1.3,mccabe==0.7.0,mock==5.1.0,motor==3.3.1,multidict==6.0.4,mypy-extensions==1.0.0,N2VC @ git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8,nose2==0.13.0,oauthlib==3.2.2,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd,-e git+https://osm.etsi.org/gerrit/osm/LCM.git@443060724b85062cbc1f79d4264db4343953d19a#egg=osm_lcm,packaging==23.1,paramiko==2.12.0,platformdirs==4.2.2,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,pydantic==2.4.2,pydantic_core==2.10.1,pylint==3.1.1,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyRFC3339==1.1,python-dateutil==2.8.2,pytz==2023.3.post1,PyYAML==6.0.1,requests==2.31.0,requests-oauthlib==1.3.1,retrying-async==2.0.0,rsa==4.9,six==1.16.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.5,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,urllib3==2.0.5,websocket-client==1.6.3,websockets==11.0.3,yarl==1.9.2
pylint run-test-pre: PYTHONHASHSEED='1753103593'
pylint run-test: commands[0] | pylint -E osm_lcm --extension-pkg-allow-list=pydantic

___________________________________ summary ____________________________________
  black: commands succeeded
ERROR:   cover: parallel child exit code 1
  flake8: commands succeeded
  pylint: commands succeeded
  safety: commands succeeded
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 a6934f0fc0f317ffa2e49f6b70970690cba12f299446a86cd1859edb6d9a7df8
$ docker rm -f a6934f0fc0f317ffa2e49f6b70970690cba12f299446a86cd1859edb6d9a7df8
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE