[MON-stage_2-merge_master] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
✔ OK flake8 in 14.576 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8
flake8 develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
flake8 installed: flake8==7.0.0,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,pycodestyle==2.11.1,pyflakes==3.2.0
flake8 run-test-pre: PYTHONHASHSEED='1507927701'
flake8 run-test: commands[0] | flake8 osm_mon/ setup.py
✔ OK black in 15.059 seconds
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.1,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='2014384846'
black run-test: commands[0] | black --check --diff osm_mon/
All done! ✨ 🍰 ✨
82 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! ✨ 🍰 ✨
1 file would be left unchanged.
✔ OK safety in 2 minutes, 1.33 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
safety installed: aiokafka==0.8.1,annotated-types==0.6.0,appdirs==1.4.4,async-timeout==4.0.3,attrs==23.1.0,Authlib==1.3.0,autopage==0.5.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,cryptography==41.0.4,cycler==0.12.0,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,dparse==0.6.4b0,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,Jinja2==3.1.3,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.5,marshmallow==3.21.2,matplotlib==3.8.0,mdurl==0.1.2,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,numpy==1.26.0,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,pbr==5.11.1,Pillow==10.0.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,pycparser==2.21,pydantic==2.7.1,pydantic_core==2.18.2,Pygments==2.16.1,pyinotify==0.9.6,pyparsing==3.1.1,pyperclip==1.8.2,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tomli==2.0.1,typer==0.12.3,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,wrapt==1.15.0,zipp==3.17.0
safety run-test-pre: PYTHONHASHSEED='3441603979'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.2.0[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/bin
-> /tmp/.tox/safety/lib/python3.10/site-packages
-> /usr/lib/python310.zip
-> /home/jenkins/workspace/MON-stage_2-merge_master
-> /usr/lib/python3.10/lib-dynload
-> /usr/lib/python3.10
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 108 packages[0m
Timestamp [1m2024-05-03 09:03:09[0m
[1m 14[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 2.0.5[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m>=2.0.0a1,<2.0.7
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mAffected versions of Pip are vulnerable to Command
Injection. When installing a package from a Mercurial VCS URL (ie "pip
install hg+...") with pip prior to v23.3, the specified Mercurial revision
could be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not affect
users who aren't installing from Mercurial.
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in fonttools version 4.42.1[0m
[1m Vulnerability ID: [0m61503
[1m Affected spec: [0m>=4.28.2,<4.43.0
[1m ADVISORY: [0mFonttools is affected by a XML External Entity Injection
(XXE) Vulnerability. As of fonttools>=4.28.2 the subsetting module has a
XML External Entity Injection (XXE) vulnerability which allows an attacker
to resolve arbitrary entities when a candidate font (OT-SVG fonts), which
contains a SVG table, is parsed. This allows attackers to include
arbitrary files from the filesystem fontTools is running on or make web
requests from the host system.
[1m CVE-2023-45139[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61503/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61503 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in fonttools version 4.42.1[0m
[1m Vulnerability ID: [0m65095
[1m Affected spec: [0m>=0,<4.43.0
[1m ADVISORY: [0mfontTools is a library for manipulating fonts, written
in Python. The subsetting module has a XML External Entity Injection (XXE)
vulnerability which allows an attacker to resolve arbitrary entities when
a candidate font (OT-SVG fonts), which contains a SVG table, is parsed.
This allows attackers to include arbitrary files from the filesystem
fontTools is running on or make web requests from the host system. This
vulnerability has been patched in version 4.43.0.
[1m CVE-2023-45139[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65095/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65095 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62556/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66704
[1m Affected spec: [0m>=38.0.0,<42.0.4
[1m ADVISORY: [0mcryptography is a package designed to expose
cryptographic primitives and recipes to Python developers. Starting in
version 38.0.0 and before version 42.0.4, if
`pkcs12.serialize_key_and_certificates` is called with both a certificate
whose public key did not match the provided private key and an
`encryption_algorithm` with `hmac_hash` set (via
`PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL
pointer dereference would occur, crashing the Python process. This has
been resolved in version 42.0.4, the first version in which a `ValueError`
is properly raised.
[1m CVE-2024-26130[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66704/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66704 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package.
This issue may allow a remote attacker to decrypt captured messages in TLS
servers that use RSA key exchanges, which may lead to exposure of
confidential or sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65278/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65278 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65647
[1m Affected spec: [0m<42.0.5
[1m ADVISORY: [0mCryptography version 42.0.5 introduces a limit on the
number of name constraint checks during X.509 path validation to prevent
denial of service attacks.https://github.com/pyca/cryptography/commit/4be5
3bf20cc90cbac01f5f94c5d1aecc5289ba1f
[1m PVE-2024-65647[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65647/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65647 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66777
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mCVE-2023-6237 addresses a vulnerability in RSA public
key verification where checking a large, incorrect RSA key with
EVP_PKEY_public_check() could take an excessive amount of time. This is
due to no size limit on the RSA public key and an unnecessarily high
number of Miller-Rabin rounds for modulus non-primality checks. The fix
sets a maximum key size of 16384 bits and reduces Miller-Rabin rounds to
5, enhancing security and performance by preventing the
RSA_R_MODULUS_TOO_LARGE error.
[1m CVE-2023-6237[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66777/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66777 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC
CPUs, which allows an attacker to disrupt the application's state. This
disruption might result in false calculations or cause a denial of
service. The vulnerability's exploitation hinges on the attacker's ability
to alter the algorithm's application and the dependency of the software on
non-volatile XMM registers.https://github.com/pyca/cryptography/commit/89d
0d56fb104ac4e0e6db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65212/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65212 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 10.0.1[0m
[1m Vulnerability ID: [0m64437
[1m Affected spec: [0m<10.2.0
[1m ADVISORY: [0mPillow is potentially vulnerable to DoS attacks through
PIL.ImageFont.ImageFont.getmask(). A decompression bomb check has also
been added to the affected
function.https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html
[1m PVE-2024-64437[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64437/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64437 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 10.0.1[0m
[1m Vulnerability ID: [0m64436
[1m Affected spec: [0m<10.2.0
[1m ADVISORY: [0mPillow is affected by an arbitrary code execution
vulnerability. If an attacker has control over the keys passed to the
environment argument of PIL.ImageMath.eval(), they may be able to execute
arbitrary
code.https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html
[1m CVE-2023-50447[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64436/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64436 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 10.0.1[0m
[1m Vulnerability ID: [0m67136
[1m Affected spec: [0m<10.3.0
[1m ADVISORY: [0mPillow 10.3.0 introduces a security update addressing
CVE-2024-28219 by replacing certain functions with strncpy to prevent
buffer overflow issues.
[1m CVE-2024-28219[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67136/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67136 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
14 vulnerabilities were reported in 6 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 14 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
✔ OK cover in 2 minutes, 26.589 seconds
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-test.txt
cover develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
cover installed: aiokafka==0.8.1,appdirs==1.4.4,async-timeout==4.0.3,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,coverage==7.3.1,cryptography==41.0.4,cycler==0.12.0,dataclasses==0.6,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dnspython==2.4.2,dogpile.cache==1.2.2,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,google-auth==2.17.3,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,kubernetes==26.1.0,lxml==4.9.3,macaroonbakery==1.3.1,matplotlib==3.8.0,mock==5.1.0,motor==3.3.1,msgpack==1.0.7,mypy-extensions==1.0.0,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8#egg=N2VC,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,numpy==1.26.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,paramiko==2.12.0,pbr==5.11.1,Pillow==10.0.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requests-mock==1.11.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,theblues==0.5.2,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,websocket-client==1.6.3,websockets==11.0.3,wrapt==1.15.0,zipp==3.17.0
cover run-test-pre: PYTHONHASHSEED='1398304065'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage osm_mon
...............ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get Metrics data from vROPS for 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Exception while parsing metrics data from vROPS Extra data: line 1 column 5 (char 4)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 170, in get_metrics
m_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.10/json/__init__.py", line 346, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.10/json/decoder.py", line 340, in decode
raise JSONDecodeError("Extra data", s, end)
json.decoder.JSONDecodeError: Extra data: line 1 column 5 (char 4)
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:get_vm_resource_id: Error in parsing Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 104, in get_vm_resource_list_from_vrops
resp_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.10/json/__init__.py", line 346, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.10/json/decoder.py", line 337, in decode
obj, end = self.raw_decode(s, idx=_w(s, 0).end())
File "/usr/lib/python3.10/json/decoder.py", line 353, in raw_decode
obj, end = self.scan_once(s, idx)
json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
..ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to find vm_moref_id from vApp UUID: 1234
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred while getting VM moref ID for VM: Testing
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vmware.py", line 114, in get_vm_moref_id
vm_details = self.get_vapp_details_rest(vapp_uuid)
File "<string>", line 3, in get_vapp_details_rest
File "/usr/lib/python3.10/unittest/mock.py", line 1114, in __call__
return self._mock_call(*args, **kwargs)
File "/usr/lib/python3.10/unittest/mock.py", line 1118, in _mock_call
return self._execute_mock_call(*args, **kwargs)
File "/usr/lib/python3.10/unittest/mock.py", line 1173, in _execute_mock_call
raise effect
Exception: Testing
...ERROR:osm_mon.collector.vnf_collectors.vmware:REST API call https://vcd/api/vApp/vapp- failed. Return status code b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred for getting vApp details: Start tag expected, '<' not found, line 1, column 1 (<string>, line 1)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vmware.py", line 177, in get_vapp_details_rest
xmlroot_respond = XmlElementTree.fromstring(response.content)
File "src/lxml/etree.pyx", line 3257, in lxml.etree.fromstring
File "src/lxml/parser.pxi", line 1916, in lxml.etree._parseMemoryDocument
File "src/lxml/parser.pxi", line 1803, in lxml.etree._parseDoc
File "src/lxml/parser.pxi", line 1144, in lxml.etree._BaseParser._parseDoc
File "src/lxml/parser.pxi", line 618, in lxml.etree._ParserContext._handleParseResultDoc
File "src/lxml/parser.pxi", line 728, in lxml.etree._handleParseResult
File "src/lxml/parser.pxi", line 657, in lxml.etree._raiseParseError
File "<string>", line 1
lxml.etree.XMLSyntaxError: Start tag expected, '<' not found, line 1, column 1
.ERROR:osm_mon.collector.vnf_collectors.vmware:Can't connect to a vCloud director as: with exception HTTPSConnectionPool(host='vcd', port=443): Max retries exceeded with url: /api/versions (Caused by NameResolutionError("<urllib3.connection.HTTPSConnection object at 0x7f0c68851840>: Failed to resolve 'vcd' ([Errno -2] Name or service not known)"))
ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to connect to vCD
................WARNING:osm_mon.evaluator.service:No metric result for alarm <Mock name='mock.uuid' id='139691269974880'>
................
----------------------------------------------------------------------
Ran 65 tests in 1.029s
OK
Name Stmts Miss Cover
----------------------------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 32 32 0%
osm_mon/cmd/mon_utils.py 46 46 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 28 28 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 134 115 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 71 56 21%
osm_mon/collector/vnf_collectors/openstack.py 214 117 45%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 97 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 18 2 89%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 99 99 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 51 21 59%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 61 61 0%
osm_mon/server/service.py 22 22 0%
osm_mon/tests/__init__.py 0 0 100%
osm_mon/tests/unit/__init__.py 0 0 100%
osm_mon/tests/unit/collector/__init__.py 0 0 100%
osm_mon/tests/unit/collector/test_collector.py 8 3 62%
osm_mon/tests/unit/collector/test_collector_service.py 51 0 100%
osm_mon/tests/unit/collector/utils/__init__.py 0 0 100%
osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100%
osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100%
osm_mon/tests/unit/core/__init__.py 0 0 100%
osm_mon/tests/unit/core/test_common_db_client.py 71 0 100%
osm_mon/tests/unit/core/test_message_bus_client.py 40 1 98%
osm_mon/tests/unit/evaluator/__init__.py 0 0 100%
osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100%
osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100%
osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100%
osm_mon/tests/unit/server/__init__.py 0 0 100%
osm_mon/tests/unit/server/test_server_service.py 10 0 100%
----------------------------------------------------------------------------------------------
TOTAL 2918 1330 54%
cover run-test: commands[3] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
----------------------------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 32 32 0%
osm_mon/cmd/mon_utils.py 46 46 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 28 28 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 134 115 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 71 56 21%
osm_mon/collector/vnf_collectors/openstack.py 214 117 45%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 97 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 18 2 89%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 99 99 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 51 21 59%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 61 61 0%
osm_mon/server/service.py 22 22 0%
osm_mon/tests/__init__.py 0 0 100%
osm_mon/tests/unit/__init__.py 0 0 100%
osm_mon/tests/unit/collector/__init__.py 0 0 100%
osm_mon/tests/unit/collector/test_collector.py 8 3 62%
osm_mon/tests/unit/collector/test_collector_service.py 51 0 100%
osm_mon/tests/unit/collector/utils/__init__.py 0 0 100%
osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100%
osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100%
osm_mon/tests/unit/core/__init__.py 0 0 100%
osm_mon/tests/unit/core/test_common_db_client.py 71 0 100%
osm_mon/tests/unit/core/test_message_bus_client.py 40 1 98%
osm_mon/tests/unit/evaluator/__init__.py 0 0 100%
osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100%
osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100%
osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100%
osm_mon/tests/unit/server/__init__.py 0 0 100%
osm_mon/tests/unit/server/test_server_service.py 10 0 100%
----------------------------------------------------------------------------------------------
TOTAL 2918 1330 54%
cover run-test: commands[4] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[5] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
✔ OK pylint in 2 minutes, 37.378 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-test.txt, pylint
pylint develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
pylint installed: aiokafka==0.8.1,appdirs==1.4.4,astroid==3.1.0,async-timeout==4.0.3,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,coverage==7.3.1,cryptography==41.0.4,cycler==0.12.0,dataclasses==0.6,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dnspython==2.4.2,dogpile.cache==1.2.2,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,google-auth==2.17.3,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,isort==5.13.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,kubernetes==26.1.0,lxml==4.9.3,macaroonbakery==1.3.1,matplotlib==3.8.0,mccabe==0.7.0,mock==5.1.0,motor==3.3.1,msgpack==1.0.7,mypy-extensions==1.0.0,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8#egg=N2VC,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,numpy==1.26.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,paramiko==2.12.0,pbr==5.11.1,Pillow==10.0.1,platformdirs==4.2.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,pylint==3.1.0,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requests-mock==1.11.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.4,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,websocket-client==1.6.3,websockets==11.0.3,wrapt==1.15.0,zipp==3.17.0
pylint run-test-pre: PYTHONHASHSEED='1744305304'
pylint run-test: commands[0] | pylint -E osm_mon
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
congratulations :)