Started by upstream project "buildall-stage_2-merge-master" build number 427 originally caused by: Started by timer > git rev-parse --is-inside-work-tree # timeout=10 Setting origin to https://osm.etsi.org/gerrit/osm/MON.git > git config remote.origin.url https://osm.etsi.org/gerrit/osm/MON.git # timeout=10 Fetching origin... Fetching upstream changes from origin > git --version # timeout=10 > git config --get remote.origin.url # timeout=10 > git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/* Seen branch in repository origin/bug1511 Seen branch in repository origin/feature5837 Seen branch in repository origin/feature7106 Seen branch in repository origin/feature7928 Seen branch in repository origin/master Seen branch in repository origin/netslice Seen branch in repository origin/ng-ro-refactor Seen branch in repository origin/paas Seen branch in repository origin/rift300 Seen branch in repository origin/sol006 Seen branch in repository origin/sol006v331 Seen branch in repository origin/v10.0 Seen branch in repository origin/v11.0 Seen branch in repository origin/v12.0 Seen branch in repository origin/v13.0 Seen branch in repository origin/v14.0 Seen branch in repository origin/v15.0 Seen branch in repository origin/v3.1 Seen branch in repository origin/v4.0 Seen branch in repository origin/v5.0 Seen branch in repository origin/v6.0 Seen branch in repository origin/v7.0 Seen branch in repository origin/v8.0 Seen branch in repository origin/v9.0 Seen 24 remote branches Obtained Jenkinsfile from 1e6e756218d1f398d4545c0d51ed78a35ac370f7 Running in Durability level: MAX_SURVIVABILITY [Pipeline] properties [Pipeline] node Running on osm-cicd-2 in /home/jenkins/workspace/MON-stage_2-merge_master [Pipeline] { [Pipeline] checkout No credentials specified > git rev-parse --is-inside-work-tree # timeout=10 Fetching changes from the remote Git repository > git config remote.origin.url https://osm.etsi.org/gerrit/osm/MON.git # timeout=10 Fetching without tags Fetching upstream changes from https://osm.etsi.org/gerrit/osm/MON.git > git --version # timeout=10 > git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/MON.git +refs/heads/*:refs/remotes/origin/* Checking out Revision 1e6e756218d1f398d4545c0d51ed78a35ac370f7 (master) > git config core.sparsecheckout # timeout=10 > git checkout -f 1e6e756218d1f398d4545c0d51ed78a35ac370f7 Commit message: "Fix improper restriction of XMl External Entity Reference, by using lxml" > git rev-list --no-walk 1e6e756218d1f398d4545c0d51ed78a35ac370f7 # timeout=10 [Pipeline] dir Running in /home/jenkins/workspace/MON-stage_2-merge_master/devops [Pipeline] { [Pipeline] git No credentials specified > git rev-parse --is-inside-work-tree # timeout=10 Fetching changes from the remote Git repository > git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10 Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops > git --version # timeout=10 > git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10 Checking out Revision 7abbfd5aed5bd744d5f49ee834f89822136ca6cc (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f 7abbfd5aed5bd744d5f49ee834f89822136ca6cc > git branch -a -v --no-abbrev # timeout=10 > git branch -D master # timeout=10 > git checkout -b master 7abbfd5aed5bd744d5f49ee834f89822136ca6cc Commit message: "Move lcm certificate to lcm folder in OSM helm chart" > git rev-list --no-walk 7abbfd5aed5bd744d5f49ee834f89822136ca6cc # timeout=10 [Pipeline] } [Pipeline] // dir [Pipeline] load [Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy) [Pipeline] } [Pipeline] // load [Pipeline] echo do_stage_3= false [Pipeline] load [Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy) [Pipeline] } [Pipeline] // load [Pipeline] stage [Pipeline] { (Prepare) [Pipeline] sh [MON-stage_2-merge_master] Running shell script + env JENKINS_HOME=/var/lib/jenkins SSH_CLIENT=212.234.161.1 22456 22 USER=jenkins RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/746/display/redirect?page=changes GERRIT_PROJECT=osm/MON XDG_SESSION_TYPE=tty SHLVL=0 NODE_LABELS=docker osm-cicd-2 osm2 pipeline stage_2 HUDSON_URL=https://osm.etsi.org/jenkins/ MOTD_SHOWN=pam OLDPWD=/home/jenkins HOME=/home/jenkins BUILD_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/746/ HUDSON_COOKIE=ef2ef596-dcec-48bb-b0ba-b6c4842d0d72 JENKINS_SERVER_COOKIE=durable-b9008e46b94dcdf0b27b851dabdd0c8e DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus GERRIT_PATCHSET_REVISION=1e6e756218d1f398d4545c0d51ed78a35ac370f7 WORKSPACE=/home/jenkins/workspace/MON-stage_2-merge_master LOGNAME=jenkins NODE_NAME=osm-cicd-2 GERRIT_BRANCH=master _=/usr/bin/java RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/746/display/redirect?page=artifacts XDG_SESSION_CLASS=user EXECUTOR_NUMBER=1 XDG_SESSION_ID=2054 RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/746/display/redirect?page=tests BUILD_DISPLAY_NAME=#746 PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit HUDSON_HOME=/var/lib/jenkins JOB_BASE_NAME=master PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin BUILD_ID=746 XDG_RUNTIME_DIR=/run/user/1001 BUILD_TAG=jenkins-MON-stage_2-merge-master-746 JENKINS_URL=https://osm.etsi.org/jenkins/ LANG=C.UTF-8 JOB_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/ BUILD_NUMBER=746 SHELL=/bin/bash RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/746/display/redirect ARTIFACTORY_SERVER=artifactory-osm GERRIT_REFSPEC=refs/changes/16/14316/1 HUDSON_SERVER_COOKIE=6d3295a483c3e6d5 JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/display/redirect JOB_NAME=MON-stage_2-merge/master TEST_INSTALL=false PWD=/home/jenkins/workspace/MON-stage_2-merge_master SSH_CONNECTION=212.234.161.1 22456 172.21.249.2 22 BRANCH_NAME=master [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Checkout) [Pipeline] sh [MON-stage_2-merge_master] Running shell script + git fetch --tags [Pipeline] sh [MON-stage_2-merge_master] Running shell script + git fetch origin refs/changes/16/14316/1 From https://osm.etsi.org/gerrit/osm/MON * branch refs/changes/16/14316/1 -> FETCH_HEAD [Pipeline] sh [MON-stage_2-merge_master] Running shell script + git checkout -f 1e6e756218d1f398d4545c0d51ed78a35ac370f7 HEAD is now at 1e6e756 Fix improper restriction of XMl External Entity Reference, by using lxml [Pipeline] sh [MON-stage_2-merge_master] Running shell script + sudo git clean -dfx Removing .cache/ Removing .coverage Removing .local/ Removing .safety/ Removing build.env Removing changelog/ Removing cover/ Removing coverage.xml Removing deb_dist/ Removing dist/ Removing nosetests.xml Removing osm_mon-11.0.0.post35+g1e6e756.tar.gz Removing osm_mon.egg-info/ Removing pool/ Removing vcd_pysdk.log [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (License Scan) [Pipeline] echo skip the scan for merge [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Release Note Check) [Pipeline] fileExists [Pipeline] echo No releasenote check present [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Docker-Build) [Pipeline] sh [MON-stage_2-merge_master] Running shell script + docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/mon-master . Sending build context to Docker daemon 156MB Step 1/6 : FROM ubuntu:22.04 ---> 52882761a72a Step 2/6 : ARG APT_PROXY ---> Using cache ---> 53bcc9757c50 Step 3/6 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi ---> Using cache ---> e2a3cb784e8a Step 4/6 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools python3-pip tox ---> Using cache ---> 6947a1439bd1 Step 5/6 : ENV LC_ALL C.UTF-8 ---> Using cache ---> 7e0a64276d37 Step 6/6 : ENV LANG C.UTF-8 ---> Using cache ---> 3eca7c44ebd0 Successfully built 3eca7c44ebd0 Successfully tagged osm/mon-master:latest [Pipeline] } [Pipeline] // stage [Pipeline] sh [MON-stage_2-merge_master] Running shell script + id -u [Pipeline] sh [MON-stage_2-merge_master] Running shell script + id -g [Pipeline] withDockerContainer osm-cicd-2 does not seem to be running inside a container $ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/MON-stage_2-merge_master -v /home/jenkins/workspace/MON-stage_2-merge_master:/home/jenkins/workspace/MON-stage_2-merge_master:rw,z -v /home/jenkins/workspace/MON-stage_2-merge_master@tmp:/home/jenkins/workspace/MON-stage_2-merge_master@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/mon-master [Pipeline] { [Pipeline] stage [Pipeline] { (Test) [Pipeline] sh [MON-stage_2-merge_master] Running shell script + groupadd -o -g 1001 -r jenkins [Pipeline] sh [MON-stage_2-merge_master] Running shell script + pwd + useradd -o -u 1001 -d /home/jenkins/workspace/MON-stage_2-merge_master -r -g jenkins jenkins [Pipeline] sh [MON-stage_2-merge_master] Running shell script + echo #! /bin/sh [Pipeline] sh [MON-stage_2-merge_master] Running shell script + chmod 755 /usr/bin/mesg [Pipeline] sh [MON-stage_2-merge_master] Running shell script + runuser jenkins -c devops-stages/stage-test.sh Launching tox ✔ OK black in 9.748 seconds black create: /tmp/.tox/black black installdeps: black==23.12.1 black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.1,tomli==2.0.1,typing_extensions==4.11.0 black run-test-pre: PYTHONHASHSEED='1877586448' black run-test: commands[0] | black --check --diff osm_mon/ All done! ✨ 🍰 ✨ 82 files would be left unchanged. black run-test: commands[1] | black --check --diff setup.py All done! ✨ 🍰 ✨ 1 file would be left unchanged. ✔ OK flake8 in 12.17 seconds flake8 create: /tmp/.tox/flake8 flake8 installdeps: flake8 flake8 develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master flake8 installed: flake8==7.0.0,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,pycodestyle==2.11.1,pyflakes==3.2.0 flake8 run-test-pre: PYTHONHASHSEED='1561746606' flake8 run-test: commands[0] | flake8 osm_mon/ setup.py ✔ OK safety in 1 minute, 22.453 seconds safety create: /tmp/.tox/safety safety installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, safety safety develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master safety installed: aiokafka==0.8.1,annotated-types==0.6.0,appdirs==1.4.4,async-timeout==4.0.3,attrs==23.1.0,Authlib==1.3.0,autopage==0.5.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,cryptography==41.0.4,cycler==0.12.0,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,dparse==0.6.4b0,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,Jinja2==3.1.4,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.5,marshmallow==3.21.2,matplotlib==3.8.0,mdurl==0.1.2,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,numpy==1.26.0,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,pbr==5.11.1,Pillow==10.0.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,pycparser==2.21,pydantic==2.7.1,pydantic_core==2.18.2,Pygments==2.16.1,pyinotify==0.9.6,pyparsing==3.1.1,pyperclip==1.8.2,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tomli==2.0.1,typer==0.12.3,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,wrapt==1.15.0,zipp==3.17.0 safety run-test-pre: PYTHONHASHSEED='1740140097' safety run-test: commands[0] | - safety check --full-report +==============================================================================+ /$$$$$$ /$$ /$$__ $$ | $$ /$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$ /$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$ | $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$ \____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$ /$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$ |_______/ \_______/|__/ \_______/ \___/ \____ $$ /$$ | $$ | $$$$$$/ by safetycli.com \______/ +==============================================================================+ REPORT  Safety is using PyUp's free open-source vulnerability database. This data is 30 days old and limited.   For real-time enhanced vulnerability data, fix recommendations, severity reporting, cybersecurity support, team and project policy management and more sign up at https://pyup.io or email sales@pyup.io Safety v3.2.0 is scanning for Vulnerabilities...  Scanning dependencies in your environment: -> /usr/lib/python3.10 -> /home/jenkins/workspace/MON-stage_2-merge_master -> /usr/lib/python310.zip -> /usr/lib/python3.10/lib-dynload -> /tmp/.tox/safety/lib/python3.10/site-packages -> /tmp/.tox/safety/bin Using open-source vulnerability database  Found and scanned 108 packages Timestamp 2024-05-13 09:02:34  15 vulnerabilities reported  0 vulnerabilities ignored +==============================================================================+ VULNERABILITIES REPORTED +==============================================================================+ -> Vulnerability found in wheel version 0.37.1  Vulnerability ID: 51499  Affected spec: <0.38.1  ADVISORY: Wheel 0.38.1 includes a fix for CVE-2022-40898: An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos- vulnerabilities-in-top-python-packages  CVE-2022-40898  For more information about this vulnerability, visit https://data.safetycli.com/v/51499/97c To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in urllib3 version 2.0.5  Vulnerability ID: 61893  Affected spec: >=2.0.0a1,<2.0.7  ADVISORY: Urllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803: Request body not stripped after redirect from 303 status changes request method to GET.https://github.com/urllib3/urllib3/security/ advisories/GHSA-g4mx-q9vg-27p4  CVE-2023-45803  For more information about this vulnerability, visit https://data.safetycli.com/v/61893/97c To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pip version 22.0.2  Vulnerability ID: 62044  Affected spec: <23.3  ADVISORY: Affected versions of Pip are vulnerable to Command Injection. When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.  CVE-2023-5752  For more information about this vulnerability, visit https://data.safetycli.com/v/62044/97c To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pip version 22.0.2  Vulnerability ID: 67599  Affected spec: >=0  ADVISORY: ** DISPUTED ** An issue was discovered in pip (all versions) because it installs the version with the highest version number, even if the user had intended to obtain a private package from a private index. This only affects use of the --extra-index-url option, and exploitation requires that the package does not already exist in the public index (and thus the attacker can put the package there with an arbitrary version number). NOTE: it has been reported that this is intended functionality and the user is responsible for using --extra- index-url securely.  CVE-2018-20225  For more information about this vulnerability, visit https://data.safetycli.com/v/67599/97c To ignore this vulnerability, use PyUp vulnerability id 67599 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in fonttools version 4.42.1  Vulnerability ID: 61503  Affected spec: >=4.28.2,<4.43.0  ADVISORY: Fonttools is affected by a XML External Entity Injection (XXE) Vulnerability. As of fonttools>=4.28.2 the subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system.  CVE-2023-45139  For more information about this vulnerability, visit https://data.safetycli.com/v/61503/97c To ignore this vulnerability, use PyUp vulnerability id 61503 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in fonttools version 4.42.1  Vulnerability ID: 65095  Affected spec: >=0,<4.43.0  ADVISORY: fontTools is a library for manipulating fonts, written in Python. The subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system. This vulnerability has been patched in version 4.43.0.  CVE-2023-45139  For more information about this vulnerability, visit https://data.safetycli.com/v/65095/97c To ignore this vulnerability, use PyUp vulnerability id 65095 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 41.0.4  Vulnerability ID: 65212  Affected spec: >=35.0.0,<42.0.2  ADVISORY: Versions of Cryptograph starting from 35.0.0 are susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC CPUs, which allows an attacker to disrupt the application's state. This disruption might result in false calculations or cause a denial of service. The vulnerability's exploitation hinges on the attacker's ability to alter the algorithm's application and the dependency of the software on non-volatile XMM registers.https://github.com/pyca/cryptography/commit/89d 0d56fb104ac4e0e6db63d78fc22b8c53d27e9  CVE-2023-6129  For more information about this vulnerability, visit https://data.safetycli.com/v/65212/97c To ignore this vulnerability, use PyUp vulnerability id 65212 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 41.0.4  Vulnerability ID: 66777  Affected spec: >=35.0.0,<42.0.2  ADVISORY: CVE-2023-6237 addresses a vulnerability in RSA public key verification where checking a large, incorrect RSA key with EVP_PKEY_public_check() could take an excessive amount of time. This is due to no size limit on the RSA public key and an unnecessarily high number of Miller-Rabin rounds for modulus non-primality checks. The fix sets a maximum key size of 16384 bits and reduces Miller-Rabin rounds to 5, enhancing security and performance by preventing the RSA_R_MODULUS_TOO_LARGE error.  CVE-2023-6237  For more information about this vulnerability, visit https://data.safetycli.com/v/66777/97c To ignore this vulnerability, use PyUp vulnerability id 66777 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 41.0.4  Vulnerability ID: 65278  Affected spec: <42.0.0  ADVISORY: A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data. See CVE-2023-50782.  CVE-2023-50782  For more information about this vulnerability, visit https://data.safetycli.com/v/65278/97c To ignore this vulnerability, use PyUp vulnerability id 65278 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 41.0.4  Vulnerability ID: 65647  Affected spec: <42.0.5  ADVISORY: Cryptography version 42.0.5 introduces a limit on the number of name constraint checks during X.509 path validation to prevent denial of service attacks.https://github.com/pyca/cryptography/commit/4be5 3bf20cc90cbac01f5f94c5d1aecc5289ba1f  PVE-2024-65647  For more information about this vulnerability, visit https://data.safetycli.com/v/65647/97c To ignore this vulnerability, use PyUp vulnerability id 65647 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 41.0.4  Vulnerability ID: 62556  Affected spec: >=3.1,<41.0.6  ADVISORY: Cryptography 41.0.6 includes a fix for CVE-2023-49083: NULL-dereference when loading PKCS7 certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97  CVE-2023-49083  For more information about this vulnerability, visit https://data.safetycli.com/v/62556/97c To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 41.0.4  Vulnerability ID: 66704  Affected spec: >=38.0.0,<42.0.4  ADVISORY: cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Starting in version 38.0.0 and before version 42.0.4, if `pkcs12.serialize_key_and_certificates` is called with both a certificate whose public key did not match the provided private key and an `encryption_algorithm` with `hmac_hash` set (via `PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL pointer dereference would occur, crashing the Python process. This has been resolved in version 42.0.4, the first version in which a `ValueError` is properly raised.  CVE-2024-26130  For more information about this vulnerability, visit https://data.safetycli.com/v/66704/97c To ignore this vulnerability, use PyUp vulnerability id 66704 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pillow version 10.0.1  Vulnerability ID: 64437  Affected spec: <10.2.0  ADVISORY: Pillow is potentially vulnerable to DoS attacks through PIL.ImageFont.ImageFont.getmask(). A decompression bomb check has also been added to the affected function.https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html  PVE-2024-64437  For more information about this vulnerability, visit https://data.safetycli.com/v/64437/97c To ignore this vulnerability, use PyUp vulnerability id 64437 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pillow version 10.0.1  Vulnerability ID: 64436  Affected spec: <10.2.0  ADVISORY: Pillow is affected by an arbitrary code execution vulnerability. If an attacker has control over the keys passed to the environment argument of PIL.ImageMath.eval(), they may be able to execute arbitrary code.https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html  CVE-2023-50447  For more information about this vulnerability, visit https://data.safetycli.com/v/64436/97c To ignore this vulnerability, use PyUp vulnerability id 64436 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pillow version 10.0.1  Vulnerability ID: 67136  Affected spec: <10.3.0  ADVISORY: Pillow 10.3.0 introduces a security update addressing CVE-2024-28219 by replacing certain functions with strncpy to prevent buffer overflow issues.  CVE-2024-28219  For more information about this vulnerability, visit https://data.safetycli.com/v/67136/97c To ignore this vulnerability, use PyUp vulnerability id 67136 in safety’s ignore command-line argument or add the ignore to your safety policy file. +==============================================================================+ REMEDIATIONS 15 vulnerabilities were reported in 6 packages. For detailed remediation & fix recommendations, upgrade to a commercial license. +==============================================================================+ Scan was completed. 15 vulnerabilities were reported. +==============================================================================+  Safety is using PyUp's free open-source vulnerability database. This data is 30 days old and limited.   For real-time enhanced vulnerability data, fix recommendations, severity reporting, cybersecurity support, team and project policy management and more sign up at https://pyup.io or email sales@pyup.io +==============================================================================+ ✔ OK cover in 1 minute, 47.048 seconds cover create: /tmp/.tox/cover cover installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-test.txt cover develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master cover installed: aiokafka==0.8.1,appdirs==1.4.4,async-timeout==4.0.3,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,coverage==7.3.1,cryptography==41.0.4,cycler==0.12.0,dataclasses==0.6,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dnspython==2.4.2,dogpile.cache==1.2.2,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,google-auth==2.17.3,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,kubernetes==26.1.0,lxml==4.9.3,macaroonbakery==1.3.1,matplotlib==3.8.0,mock==5.1.0,motor==3.3.1,msgpack==1.0.7,mypy-extensions==1.0.0,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8#egg=N2VC,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,numpy==1.26.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,paramiko==2.12.0,pbr==5.11.1,Pillow==10.0.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requests-mock==1.11.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,theblues==0.5.2,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,websocket-client==1.6.3,websockets==11.0.3,wrapt==1.15.0,zipp==3.17.0 cover run-test-pre: PYTHONHASHSEED='2219456704' cover run-test: commands[0] | sh -c 'rm -f nosetests.xml' cover run-test: commands[1] | coverage erase cover run-test: commands[2] | nose2 -C --coverage osm_mon ...............ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get Metrics data from vROPS for 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' .ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Exception while parsing metrics data from vROPS Extra data: line 1 column 5 (char 4) Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 170, in get_metrics m_data = json.loads(resp.content.decode("utf-8")) File "/usr/lib/python3.10/json/__init__.py", line 346, in loads return _default_decoder.decode(s) File "/usr/lib/python3.10/json/decoder.py", line 340, in decode raise JSONDecodeError("Extra data", s, end) json.decoder.JSONDecodeError: Extra data: line 1 column 5 (char 4) ....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:get_vm_resource_id: Error in parsing Expecting property name enclosed in double quotes: line 2 column 2 (char 3) Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 104, in get_vm_resource_list_from_vrops resp_data = json.loads(resp.content.decode("utf-8")) File "/usr/lib/python3.10/json/__init__.py", line 346, in loads return _default_decoder.decode(s) File "/usr/lib/python3.10/json/decoder.py", line 337, in decode obj, end = self.raw_decode(s, idx=_w(s, 0).end()) File "/usr/lib/python3.10/json/decoder.py", line 353, in raw_decode obj, end = self.scan_once(s, idx) json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 2 column 2 (char 3) .ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' ....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' ..ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to find vm_moref_id from vApp UUID: 1234 .WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred while getting VM moref ID for VM: Testing Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vmware.py", line 114, in get_vm_moref_id vm_details = self.get_vapp_details_rest(vapp_uuid) File "", line 3, in get_vapp_details_rest File "/usr/lib/python3.10/unittest/mock.py", line 1114, in __call__ return self._mock_call(*args, **kwargs) File "/usr/lib/python3.10/unittest/mock.py", line 1118, in _mock_call return self._execute_mock_call(*args, **kwargs) File "/usr/lib/python3.10/unittest/mock.py", line 1173, in _execute_mock_call raise effect Exception: Testing ...ERROR:osm_mon.collector.vnf_collectors.vmware:REST API call https://vcd/api/vApp/vapp- failed. Return status code b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' .WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred for getting vApp details: Start tag expected, '<' not found, line 1, column 1 (, line 1) Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vmware.py", line 177, in get_vapp_details_rest xmlroot_respond = XmlElementTree.fromstring(response.content) File "src/lxml/etree.pyx", line 3257, in lxml.etree.fromstring File "src/lxml/parser.pxi", line 1916, in lxml.etree._parseMemoryDocument File "src/lxml/parser.pxi", line 1803, in lxml.etree._parseDoc File "src/lxml/parser.pxi", line 1144, in lxml.etree._BaseParser._parseDoc File "src/lxml/parser.pxi", line 618, in lxml.etree._ParserContext._handleParseResultDoc File "src/lxml/parser.pxi", line 728, in lxml.etree._handleParseResult File "src/lxml/parser.pxi", line 657, in lxml.etree._raiseParseError File "", line 1 lxml.etree.XMLSyntaxError: Start tag expected, '<' not found, line 1, column 1 .ERROR:osm_mon.collector.vnf_collectors.vmware:Can't connect to a vCloud director as: with exception HTTPSConnectionPool(host='vcd', port=443): Max retries exceeded with url: /api/versions (Caused by NameResolutionError(": Failed to resolve 'vcd' ([Errno -2] Name or service not known)")) ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to connect to vCD ................WARNING:osm_mon.evaluator.service:No metric result for alarm ................ ---------------------------------------------------------------------- Ran 65 tests in 0.981s OK Name Stmts Miss Cover ---------------------------------------------------------------------------------------------- osm_mon/__init__.py 0 0 100% osm_mon/cmd/__init__.py 0 0 100% osm_mon/cmd/mon_collector.py 32 32 0% osm_mon/cmd/mon_dashboarder.py 35 35 0% osm_mon/cmd/mon_evaluator.py 32 32 0% osm_mon/cmd/mon_healthcheck.py 38 38 0% osm_mon/cmd/mon_server.py 32 32 0% osm_mon/cmd/mon_utils.py 46 46 0% osm_mon/collector/__init__.py 0 0 100% osm_mon/collector/backends/__init__.py 0 0 100% osm_mon/collector/backends/base.py 3 3 0% osm_mon/collector/backends/prometheus.py 36 36 0% osm_mon/collector/collector.py 28 28 0% osm_mon/collector/infra_collectors/__init__.py 0 0 100% osm_mon/collector/infra_collectors/base.py 5 1 80% osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20% osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80% osm_mon/collector/infra_collectors/base_vim.py 5 1 80% osm_mon/collector/infra_collectors/onos.py 41 27 34% osm_mon/collector/infra_collectors/openstack.py 5 1 80% osm_mon/collector/infra_collectors/vio.py 5 1 80% osm_mon/collector/infra_collectors/vmware.py 134 115 14% osm_mon/collector/metric.py 5 0 100% osm_mon/collector/service.py 140 77 45% osm_mon/collector/utils/__init__.py 0 0 100% osm_mon/collector/utils/openstack.py 48 5 90% osm_mon/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/base.py 8 1 88% osm_mon/collector/vnf_collectors/base_vim.py 5 0 100% osm_mon/collector/vnf_collectors/juju.py 71 56 21% osm_mon/collector/vnf_collectors/openstack.py 214 117 45% osm_mon/collector/vnf_collectors/vio.py 42 3 93% osm_mon/collector/vnf_collectors/vmware.py 121 11 91% osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100% osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 97 2 98% osm_mon/collector/vnf_metric.py 10 0 100% osm_mon/core/__init__.py 0 0 100% osm_mon/core/common_db.py 113 46 59% osm_mon/core/config.py 39 11 72% osm_mon/core/exceptions.py 6 0 100% osm_mon/core/keystone.py 34 34 0% osm_mon/core/message_bus_client.py 18 2 89% osm_mon/core/models.py 29 0 100% osm_mon/core/response.py 25 15 40% osm_mon/core/utils.py 12 12 0% osm_mon/dashboarder/__init__.py 0 0 100% osm_mon/dashboarder/dashboarder.py 99 99 0% osm_mon/dashboarder/service.py 190 190 0% osm_mon/evaluator/__init__.py 0 0 100% osm_mon/evaluator/backends/__init__.py 0 0 100% osm_mon/evaluator/backends/base.py 6 1 83% osm_mon/evaluator/backends/prometheus.py 51 20 61% osm_mon/evaluator/evaluator.py 51 21 59% osm_mon/evaluator/service.py 51 5 90% osm_mon/server/__init__.py 0 0 100% osm_mon/server/server.py 61 61 0% osm_mon/server/service.py 22 22 0% osm_mon/tests/__init__.py 0 0 100% osm_mon/tests/unit/__init__.py 0 0 100% osm_mon/tests/unit/collector/__init__.py 0 0 100% osm_mon/tests/unit/collector/test_collector.py 8 3 62% osm_mon/tests/unit/collector/test_collector_service.py 51 0 100% osm_mon/tests/unit/collector/utils/__init__.py 0 0 100% osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100% osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100% osm_mon/tests/unit/core/__init__.py 0 0 100% osm_mon/tests/unit/core/test_common_db_client.py 71 0 100% osm_mon/tests/unit/core/test_message_bus_client.py 40 1 98% osm_mon/tests/unit/evaluator/__init__.py 0 0 100% osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100% osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100% osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100% osm_mon/tests/unit/server/__init__.py 0 0 100% osm_mon/tests/unit/server/test_server_service.py 10 0 100% ---------------------------------------------------------------------------------------------- TOTAL 2918 1330 54% cover run-test: commands[3] | coverage report '--omit=*tests*' Name Stmts Miss Cover ---------------------------------------------------------------------------------------------- osm_mon/__init__.py 0 0 100% osm_mon/cmd/__init__.py 0 0 100% osm_mon/cmd/mon_collector.py 32 32 0% osm_mon/cmd/mon_dashboarder.py 35 35 0% osm_mon/cmd/mon_evaluator.py 32 32 0% osm_mon/cmd/mon_healthcheck.py 38 38 0% osm_mon/cmd/mon_server.py 32 32 0% osm_mon/cmd/mon_utils.py 46 46 0% osm_mon/collector/__init__.py 0 0 100% osm_mon/collector/backends/__init__.py 0 0 100% osm_mon/collector/backends/base.py 3 3 0% osm_mon/collector/backends/prometheus.py 36 36 0% osm_mon/collector/collector.py 28 28 0% osm_mon/collector/infra_collectors/__init__.py 0 0 100% osm_mon/collector/infra_collectors/base.py 5 1 80% osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20% osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80% osm_mon/collector/infra_collectors/base_vim.py 5 1 80% osm_mon/collector/infra_collectors/onos.py 41 27 34% osm_mon/collector/infra_collectors/openstack.py 5 1 80% osm_mon/collector/infra_collectors/vio.py 5 1 80% osm_mon/collector/infra_collectors/vmware.py 134 115 14% osm_mon/collector/metric.py 5 0 100% osm_mon/collector/service.py 140 77 45% osm_mon/collector/utils/__init__.py 0 0 100% osm_mon/collector/utils/openstack.py 48 5 90% osm_mon/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/base.py 8 1 88% osm_mon/collector/vnf_collectors/base_vim.py 5 0 100% osm_mon/collector/vnf_collectors/juju.py 71 56 21% osm_mon/collector/vnf_collectors/openstack.py 214 117 45% osm_mon/collector/vnf_collectors/vio.py 42 3 93% osm_mon/collector/vnf_collectors/vmware.py 121 11 91% osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100% osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 97 2 98% osm_mon/collector/vnf_metric.py 10 0 100% osm_mon/core/__init__.py 0 0 100% osm_mon/core/common_db.py 113 46 59% osm_mon/core/config.py 39 11 72% osm_mon/core/exceptions.py 6 0 100% osm_mon/core/keystone.py 34 34 0% osm_mon/core/message_bus_client.py 18 2 89% osm_mon/core/models.py 29 0 100% osm_mon/core/response.py 25 15 40% osm_mon/core/utils.py 12 12 0% osm_mon/dashboarder/__init__.py 0 0 100% osm_mon/dashboarder/dashboarder.py 99 99 0% osm_mon/dashboarder/service.py 190 190 0% osm_mon/evaluator/__init__.py 0 0 100% osm_mon/evaluator/backends/__init__.py 0 0 100% osm_mon/evaluator/backends/base.py 6 1 83% osm_mon/evaluator/backends/prometheus.py 51 20 61% osm_mon/evaluator/evaluator.py 51 21 59% osm_mon/evaluator/service.py 51 5 90% osm_mon/server/__init__.py 0 0 100% osm_mon/server/server.py 61 61 0% osm_mon/server/service.py 22 22 0% osm_mon/tests/__init__.py 0 0 100% osm_mon/tests/unit/__init__.py 0 0 100% osm_mon/tests/unit/collector/__init__.py 0 0 100% osm_mon/tests/unit/collector/test_collector.py 8 3 62% osm_mon/tests/unit/collector/test_collector_service.py 51 0 100% osm_mon/tests/unit/collector/utils/__init__.py 0 0 100% osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100% osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100% osm_mon/tests/unit/core/__init__.py 0 0 100% osm_mon/tests/unit/core/test_common_db_client.py 71 0 100% osm_mon/tests/unit/core/test_message_bus_client.py 40 1 98% osm_mon/tests/unit/evaluator/__init__.py 0 0 100% osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100% osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100% osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100% osm_mon/tests/unit/server/__init__.py 0 0 100% osm_mon/tests/unit/server/test_server_service.py 10 0 100% ---------------------------------------------------------------------------------------------- TOTAL 2918 1330 54% cover run-test: commands[4] | coverage html -d ./cover '--omit=*tests*' Wrote HTML report to ./cover/index.html cover run-test: commands[5] | coverage xml -o coverage.xml '--omit=*tests*' Wrote XML report to coverage.xml ✔ OK pylint in 1 minute, 57.908 seconds pylint create: /tmp/.tox/pylint pylint installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-test.txt, pylint pylint develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master pylint installed: aiokafka==0.8.1,appdirs==1.4.4,astroid==3.1.0,async-timeout==4.0.3,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,coverage==7.3.1,cryptography==41.0.4,cycler==0.12.0,dataclasses==0.6,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dnspython==2.4.2,dogpile.cache==1.2.2,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,google-auth==2.17.3,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,isort==5.13.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,kubernetes==26.1.0,lxml==4.9.3,macaroonbakery==1.3.1,matplotlib==3.8.0,mccabe==0.7.0,mock==5.1.0,motor==3.3.1,msgpack==1.0.7,mypy-extensions==1.0.0,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8#egg=N2VC,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,numpy==1.26.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,paramiko==2.12.0,pbr==5.11.1,Pillow==10.0.1,platformdirs==4.2.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,pylint==3.1.0,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requests-mock==1.11.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.5,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,websocket-client==1.6.3,websockets==11.0.3,wrapt==1.15.0,zipp==3.17.0 pylint run-test-pre: PYTHONHASHSEED='1300998197' pylint run-test: commands[0] | pylint -E osm_mon ___________________________________ summary ____________________________________ black: commands succeeded cover: commands succeeded flake8: commands succeeded pylint: commands succeeded safety: commands succeeded congratulations :) [Pipeline] fileExists [Pipeline] step [Cobertura] Publishing Cobertura coverage report... [Cobertura] Publishing Cobertura coverage results... [Cobertura] Cobertura coverage report found. [Pipeline] fileExists [Pipeline] junit Recording test results [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Build) [Pipeline] sh [MON-stage_2-merge_master] Running shell script + runuser jenkins -c devops-stages/stage-build.sh [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Archive) [Pipeline] sh [MON-stage_2-merge_master] Running shell script + runuser jenkins -c mkdir -p changelog [Pipeline] sh [MON-stage_2-merge_master] Running shell script + runuser jenkins -c devops/tools/generatechangelog-pipeline.sh > changelog/changelog-MON.html [Pipeline] sh [MON-stage_2-merge_master] Running shell script + runuser jenkins -c devops-stages/stage-archive.sh [Pipeline] getArtifactoryServer [Pipeline] newBuildInfo [Pipeline] artifactoryUpload [consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-MON/master/746/pool/MON/python3-osm-mon_11.0.0.post35%2Bg1e6e756-1_all.deb [consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-MON/master/746/changelog/changelog-MON.html [Pipeline] publishBuildInfo Deploying build info to: https://artifactory-osm.etsi.org/artifactory/api/build Deploying build descriptor to: https://artifactory-osm.etsi.org/artifactory/api/build Build successfully deployed. Browse it in Artifactory under https://artifactory-osm.etsi.org/artifactory/webapp/builds/MON-stage_2-merge%20::%20master/746 [Pipeline] sh [MON-stage_2-merge_master] Running shell script + env [Pipeline] step Archiving artifacts Recording fingerprints [Pipeline] } [Pipeline] // stage [Pipeline] } $ docker stop --time=1 3566f2ce96f10f7da31a64460d2696f32dd524a2e3d5e58b7c1a86a02f89fde7 $ docker rm -f 3566f2ce96f10f7da31a64460d2696f32dd524a2e3d5e58b7c1a86a02f89fde7 [Pipeline] // withDockerContainer [Pipeline] } [Pipeline] // node [Pipeline] End of Pipeline Finished: SUCCESS