FailedConsole Output

Started by upstream project "buildall-stage_2-merge-v12" build number 400
originally caused by:
 Started by timer
 > git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/RO.git
 > git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
 > git --version # timeout=10
 > git config --get remote.origin.url # timeout=10
 > git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/5962-rebase
Seen branch in repository origin/Azure
Seen branch in repository origin/GCP
Seen branch in repository origin/WIM
Seen branch in repository origin/bug1511
Seen branch in repository origin/contrail
Seen branch in repository origin/feature1429
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7148
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/fog
Seen branch in repository origin/lcm
Seen branch in repository origin/master
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/py3
Seen branch in repository origin/python3
Seen branch in repository origin/rift300
Seen branch in repository origin/snapcraft
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v1.0
Seen branch in repository origin/v1.1
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v2.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen branch in repository origin/vio
Seen branch in repository origin/vnffg
Seen 42 remote branches
Obtained Jenkinsfile from 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-2 in /home/jenkins/workspace/RO-stage_2-merge_v12.0
[Pipeline] {
[Pipeline] checkout
No credentials specified
 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/RO.git
 > git --version # timeout=10
 > git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/RO.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 4c8efb91e6fe449961d2f3a750e6cf84cb167fea (v12.0)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
Commit message: "Fix Bug 2282: Can't instantiate NS using a pre-existing volume"
 > git rev-list --no-walk 4c8efb91e6fe449961d2f3a750e6cf84cb167fea # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/RO-stage_2-merge_v12.0/devops
[Pipeline] {
[Pipeline] git
No credentials specified
 > git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
 > git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
 > git --version # timeout=10
 > git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
 > git rev-parse refs/remotes/origin/v12.0^{commit} # timeout=10
 > git rev-parse refs/remotes/origin/origin/v12.0^{commit} # timeout=10
Checking out Revision 8e91a950fbfac8777b24f8fc577f7159bce65ee4 (refs/remotes/origin/v12.0)
 > git config core.sparsecheckout # timeout=10
 > git checkout -f 8e91a950fbfac8777b24f8fc577f7159bce65ee4
 > git branch -a -v --no-abbrev # timeout=10
 > git branch -D v12.0 # timeout=10
 > git checkout -b v12.0 8e91a950fbfac8777b24f8fc577f7159bce65ee4
Commit message: "Fix Bug 2338: updated kubernetes apt repo from apt.kubernetes.io to pkgs.k8s.io"
 > git rev-list --no-walk 8e91a950fbfac8777b24f8fc577f7159bce65ee4 # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 22456 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect?page=changes
GERRIT_PROJECT=osm/RO
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=docker osm-cicd-2 osm2 pipeline stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/
HUDSON_COOKIE=5acde2cb-4179-405f-829b-5243d7658757
JENKINS_SERVER_COOKIE=durable-6da2330843f491a716aff12bd5a0b7ad
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=4c8efb91e6fe449961d2f3a750e6cf84cb167fea
WORKSPACE=/home/jenkins/workspace/RO-stage_2-merge_v12.0
LOGNAME=jenkins
NODE_NAME=osm-cicd-2
GERRIT_BRANCH=v12.0
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=0
XDG_SESSION_ID=2054
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect?page=tests
BUILD_DISPLAY_NAME=#450
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=v12.0
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=450
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-RO-stage_2-merge-v12.0-450
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/
BUILD_NUMBER=450
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/59/14259/1
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/display/redirect
JOB_NAME=RO-stage_2-merge/v12.0
TEST_INSTALL=false
PWD=/home/jenkins/workspace/RO-stage_2-merge_v12.0
SSH_CONNECTION=212.234.161.1 22456 172.21.249.2 22
BRANCH_NAME=v12.0
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git fetch --tags
[RO-stage_2-merge_v12.0] Running shell script
[Pipeline] sh
+ git fetch origin refs/changes/59/14259/1
From https://osm.etsi.org/gerrit/osm/RO
 * branch            refs/changes/59/14259/1 -> FETCH_HEAD
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git checkout -f 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
HEAD is now at 4c8efb9 Fix Bug 2282: Can't instantiate NS using a pre-existing volume
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .local/
Removing NG-RO/deb_dist/
Removing NG-RO/dist/
Removing NG-RO/osm_ng_ro-12.0.8+g8214dac.tar.gz
Removing NG-RO/osm_ng_ro.egg-info/
Removing NG-RO/osm_ng_ro/requirements.txt
Removing RO-SDN-arista_cloudvision/deb_dist/
Removing RO-SDN-arista_cloudvision/dist/
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision-12.0.8+g8214dac.tar.gz
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision.egg-info/
Removing RO-SDN-dpb/deb_dist/
Removing RO-SDN-dpb/dist/
Removing RO-SDN-dpb/osm_rosdn_dpb-12.0.8+g8214dac.tar.gz
Removing RO-SDN-dpb/osm_rosdn_dpb.egg-info/
Removing RO-SDN-dynpac/deb_dist/
Removing RO-SDN-dynpac/dist/
Removing RO-SDN-dynpac/osm_rosdn_dynpac-12.0.8+g8214dac.tar.gz
Removing RO-SDN-dynpac/osm_rosdn_dynpac.egg-info/
Removing RO-SDN-floodlight_openflow/deb_dist/
Removing RO-SDN-floodlight_openflow/dist/
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof-12.0.8+g8214dac.tar.gz
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof.egg-info/
Removing RO-SDN-ietfl2vpn/deb_dist/
Removing RO-SDN-ietfl2vpn/dist/
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn-12.0.8+g8214dac.tar.gz
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn.egg-info/
Removing RO-SDN-juniper_contrail/deb_dist/
Removing RO-SDN-juniper_contrail/dist/
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail-12.0.8+g8214dac.tar.gz
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail.egg-info/
Removing RO-SDN-odl_openflow/deb_dist/
Removing RO-SDN-odl_openflow/dist/
Removing RO-SDN-odl_openflow/osm_rosdn_odlof-12.0.8+g8214dac.tar.gz
Removing RO-SDN-odl_openflow/osm_rosdn_odlof.egg-info/
Removing RO-SDN-onos_openflow/deb_dist/
Removing RO-SDN-onos_openflow/dist/
Removing RO-SDN-onos_openflow/osm_rosdn_onosof-12.0.8+g8214dac.tar.gz
Removing RO-SDN-onos_openflow/osm_rosdn_onosof.egg-info/
Removing RO-SDN-onos_vpls/deb_dist/
Removing RO-SDN-onos_vpls/dist/
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls-12.0.8+g8214dac.tar.gz
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls.egg-info/
Removing RO-VIM-aws/deb_dist/
Removing RO-VIM-aws/dist/
Removing RO-VIM-aws/osm_rovim_aws-12.0.8+g8214dac.tar.gz
Removing RO-VIM-aws/osm_rovim_aws.egg-info/
Removing RO-VIM-azure/deb_dist/
Removing RO-VIM-azure/dist/
Removing RO-VIM-azure/osm_rovim_azure-12.0.8+g8214dac.tar.gz
Removing RO-VIM-azure/osm_rovim_azure.egg-info/
Removing RO-VIM-gcp/deb_dist/
Removing RO-VIM-gcp/dist/
Removing RO-VIM-gcp/osm_rovim_gcp-12.0.8+g8214dac.tar.gz
Removing RO-VIM-gcp/osm_rovim_gcp.egg-info/
Removing RO-VIM-openstack/deb_dist/
Removing RO-VIM-openstack/dist/
Removing RO-VIM-openstack/osm_rovim_openstack-12.0.8+g8214dac.tar.gz
Removing RO-VIM-openstack/osm_rovim_openstack.egg-info/
Removing RO-VIM-openvim/deb_dist/
Removing RO-VIM-openvim/dist/
Removing RO-VIM-openvim/osm_rovim_openvim-12.0.8+g8214dac.tar.gz
Removing RO-VIM-openvim/osm_rovim_openvim.egg-info/
Removing RO-VIM-vmware/deb_dist/
Removing RO-VIM-vmware/dist/
Removing RO-VIM-vmware/osm_rovim_vmware-12.0.8+g8214dac.tar.gz
Removing RO-VIM-vmware/osm_rovim_vmware.egg-info/
Removing RO-plugin/.eggs/
Removing RO-plugin/deb_dist/
Removing RO-plugin/dist/
Removing RO-plugin/osm_ro_plugin-12.0.8+g8214dac.tar.gz
Removing RO-plugin/osm_ro_plugin.egg-info/
Removing build.env
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing dists/
Removing nosetests.xml
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
Not checking release notes for merge job
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/ro-v12.0 .
Sending build context to Docker daemon  68.75MB

Step 1/8 : FROM ubuntu:20.04
 ---> 33985b2ba010
Step 2/8 : ARG APT_PROXY
 ---> Using cache
 ---> a5cc015a61ff
Step 3/8 : RUN if [ ! -z $APT_PROXY ] ; then     echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ;    echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ;    fi
 ---> Using cache
 ---> cf79a3d50dc4
Step 4/8 : RUN DEBIAN_FRONTEND=noninteractive apt-get update &&     DEBIAN_FRONTEND=noninteractive apt-get -y install         debhelper         dh-python         git         python3         python3-all         python3-dev         python3-setuptools
 ---> Using cache
 ---> f96f66129cb6
Step 5/8 : RUN python3 -m easy_install pip==21.3.1
 ---> Using cache
 ---> de4e2bb6c02d
Step 6/8 : RUN pip install tox==3.24.5
 ---> Using cache
 ---> 856f958c9ec4
Step 7/8 : ENV LC_ALL C.UTF-8
 ---> Running in a6f9da183ff5
Removing intermediate container a6f9da183ff5
 ---> fb38cf9c489e
Step 8/8 : ENV LANG C.UTF-8
 ---> Running in 8d34798a1fd9
Removing intermediate container 8d34798a1fd9
 ---> 2c0609232870
Successfully built 2c0609232870
Successfully tagged osm/ro-v12.0:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ id -u
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-2 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/RO-stage_2-merge_v12.0 -v /home/jenkins/workspace/RO-stage_2-merge_v12.0:/home/jenkins/workspace/RO-stage_2-merge_v12.0:rw,z -v /home/jenkins/workspace/RO-stage_2-merge_v12.0@tmp:/home/jenkins/workspace/RO-stage_2-merge_v12.0@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/ro-v12.0
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[RO-stage_2-merge_v12.0] Running shell script
[Pipeline] sh
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/RO-stage_2-merge_v12.0 -r -g jenkins jenkins
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.0,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='2802686026'
black run-test: commands[0] | black --check --diff NG-RO
All done! ✨ 🍰 ✨
14 files would be left unchanged.
black run-test: commands[1] | black --check --diff RO-plugin
All done! ✨ 🍰 ✨
9 files would be left unchanged.
black run-test: commands[2] | black --check --diff RO-SDN-arista_cloudvision
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[3] | black --check --diff RO-SDN-dpb
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[4] | black --check --diff RO-SDN-dynpac
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[5] | black --check --diff RO-SDN-floodlight_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[6] | black --check --diff RO-SDN-ietfl2vpn
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[7] | black --check --diff RO-SDN-juniper_contrail
All done! ✨ 🍰 ✨
7 files would be left unchanged.
black run-test: commands[8] | black --check --diff RO-SDN-odl_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[9] | black --check --diff RO-SDN-onos_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[10] | black --check --diff RO-SDN-onos_vpls
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[11] | black --check --diff RO-VIM-aws
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[12] | black --check --diff RO-VIM-azure
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[13] | black --check --diff RO-VIM-openstack
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[14] | black --check --diff RO-VIM-openvim
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[15] | black --check --diff RO-VIM-vmware
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[16] | black --check --diff RO-VIM-gcp
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[17] | black --check --diff integration-tests
All done! ✨ 🍰 ✨
1 file would be left unchanged.
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==6.1.0, flake8-import-order
flake8 installed: flake8==6.1.0,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.11.1,pyflakes==3.1.0
flake8 run-test-pre: PYTHONHASHSEED='2802686026'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
flake8 run-test: commands[16] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py
flake8 run-test: commands[17] | flake8 integration-tests/
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, safety
safety installed: adal==1.2.7,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,click==8.1.7,cliff==3.10.1,cmd2==2.4.1,cryptography==37.0.2,cvprac==1.2.0,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,dparse==0.6.3,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tomli==2.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0
safety run-test-pre: PYTHONHASHSEED='2802686026'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+

                               /$$$$$$            /$$
                              /$$__  $$          | $$
           /$$$$$$$  /$$$$$$ | $$  \__//$$$$$$  /$$$$$$   /$$   /$$
          /$$_____/ |____  $$| $$$$   /$$__  $$|_  $$_/  | $$  | $$
         |  $$$$$$   /$$$$$$$| $$_/  | $$$$$$$$  | $$    | $$  | $$
          \____  $$ /$$__  $$| $$    | $$_____/  | $$ /$$| $$  | $$
          /$$$$$$$/|  $$$$$$$| $$    |  $$$$$$$  |  $$$$/|  $$$$$$$
         |_______/  \_______/|__/     \_______/   \___/   \____  $$
                                                          /$$  | $$
                                                         |  $$$$$$/
  by pyup.io                                              \______/

+==============================================================================+

 REPORT 

  Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. 
  For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io

  Safety v2.3.5 is scanning for Vulnerabilities...
  Scanning dependencies in your environment:

  -> /tmp/.tox/safety/lib/python3.8/site-packages

  Using non-commercial database
  Found and scanned 129 packages
  Timestamp 2024-04-22 08:30:17
  21 vulnerabilities found
  0 vulnerabilities ignored

+==============================================================================+
 VULNERABILITIES FOUND 
+==============================================================================+

-> Vulnerability found in jinja2 version 3.1.2
   Vulnerability ID: 64227
   Affected spec: <3.1.3
   ADVISORY: Jinja2 before 3.1.3 is affected by a Cross-Site Scripting
   vulnerability. Special placeholders in the template allow writing code
   similar to Python syntax. It is possible to inject arbitrary HTML attributes
   into the rendered HTML template. The Jinja 'xmlattr' filter can be abused to
   inject arbitrary HTML attribute keys and values, bypassing the auto escaping
   mechanism and potentially leading to XSS. It may also be possible to bypass
   attribute validation checks if they are blacklist-based.
   CVE-2024-22195
   For more information, please visit
   https://data.safetycli.com/v/64227/f17


-> Vulnerability found in pygments version 2.12.0
   Vulnerability ID: 58910
   Affected spec: <2.15.0
   ADVISORY: Pygments 2.15.0 includes a fix for CVE-2022-40896: The
   regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
   properties files were discovered to be vulnerable. As a result, pygmentizing
   a maliciously-crafted file of these kinds would have resulted in high
   resources consumption or crashing of the
   application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
   top-python-packages-part-2
   CVE-2022-40896
   For more information, please visit
   https://data.safetycli.com/v/58910/f17


-> Vulnerability found in certifi version 2022.6.15
   Vulnerability ID: 52365
   Affected spec: <2022.12.07
   ADVISORY: Certifi 2022.12.07 includes a fix for CVE-2022-23491:
   Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
   store. These are in the process of being removed from Mozilla's trust store.
   TrustCor's root certificates are being removed pursuant to an investigation
   prompted by media reporting that TrustCor's ownership also operated a
   business that produced spyware. Conclusions of Mozilla's investigation can be
   found in the linked google group
   discussion.https://github.com/certifi/python-
   certifi/security/advisories/GHSA-43fp-
   rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
   policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
   CVE-2022-23491
   For more information, please visit
   https://data.safetycli.com/v/52365/f17


-> Vulnerability found in certifi version 2022.6.15
   Vulnerability ID: 59956
   Affected spec: >=2015.04.28,<2023.07.22
   ADVISORY: Certifi 2023.07.22 includes a fix for CVE-2023-37920:
   Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates.
   e-Tugra's root certificates were subject to an investigation prompted by
   reporting of security issues in their systems. Certifi 2023.07.22 removes
   root certificates from "e-Tugra" from the root
   store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
   xqr8-7jwr-rhp7
   CVE-2023-37920
   For more information, please visit
   https://data.safetycli.com/v/59956/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 65278
   Affected spec: <42.0.0
   ADVISORY: A flaw was found in the python-cryptography package. This
   issue may allow a remote attacker to decrypt captured messages in TLS servers
   that use RSA key exchanges, which may lead to exposure of confidential or
   sensitive data. See CVE-2023-50782.
   CVE-2023-50782
   For more information, please visit
   https://data.safetycli.com/v/65278/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 59473
   Affected spec: <41.0.2
   ADVISORY: The cryptography package before 41.0.2 for Python
   mishandles SSH certificates that have critical options.
   CVE-2023-38325
   For more information, please visit
   https://data.safetycli.com/v/59473/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 62556
   Affected spec: >=3.1,<41.0.6
   ADVISORY: Cryptography 41.0.6 includes a fix for CVE-2023-49083:
   NULL-dereference when loading PKCS7
   certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
   CVE-2023-49083
   For more information, please visit
   https://data.safetycli.com/v/62556/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 66777
   Affected spec: >=35.0.0,<42.0.2
   ADVISORY: CVE-2023-6237 addresses a vulnerability in RSA public key
   verification where checking a large, incorrect RSA key with
   EVP_PKEY_public_check() could take an excessive amount of time. This is due
   to no size limit on the RSA public key and an unnecessarily high number of
   Miller-Rabin rounds for modulus non-primality checks. The fix sets a maximum
   key size of 16384 bits and reduces Miller-Rabin rounds to 5, enhancing
   security and performance by preventing the RSA_R_MODULUS_TOO_LARGE error.
   CVE-2023-6237
   For more information, please visit
   https://data.safetycli.com/v/66777/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 65212
   Affected spec: >=35.0.0,<42.0.2
   ADVISORY: Versions of Cryptograph starting from 35.0.0 are
   susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC CPUs,
   which allows an attacker to disrupt the application's state. This disruption
   might result in false calculations or cause a denial of service. The
   vulnerability's exploitation hinges on the attacker's ability to alter the
   algorithm's application and the dependency of the software on non-volatile
   XMM registers.https://github.com/pyca/cryptography/commit/89d0d56fb104ac4e0e6
   db63d78fc22b8c53d27e9
   CVE-2023-6129
   For more information, please visit
   https://data.safetycli.com/v/65212/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 65647
   Affected spec: <42.0.5
   ADVISORY: Cryptography version 42.0.5 introduces a limit on the
   number of name constraint checks during X.509 path validation to prevent
   denial of service attacks.https://github.com/pyca/cryptography/commit/4be53bf
   20cc90cbac01f5f94c5d1aecc5289ba1f
   PVE-2024-65647
   For more information, please visit
   https://data.safetycli.com/v/65647/f17


-> Vulnerability found in cryptography version 37.0.2
   Vulnerability ID: 53048
   Affected spec: >=1.8,<39.0.1
   ADVISORY: Cryptography 39.0.1 includes a fix for CVE-2023-23931: In
   affected versions 'Cipher.update_into' would accept Python objects which
   implement the buffer protocol, but provide only immutable buffers. This would
   allow immutable objects (such as 'bytes') to be mutated, thus violating
   fundamental rules of Python and resulting in corrupted output. This issue has
   been present since 'update_into' was originally introduced in cryptography
   1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-
   vj6r
   CVE-2023-23931
   For more information, please visit
   https://data.safetycli.com/v/53048/f17


-> Vulnerability found in lxml version 4.9.0
   Vulnerability ID: 50748
   Affected spec: <4.9.1
   ADVISORY: Lxml 4.9.1 includes a fix for CVE-2022-2309: NULL Pointer
   Dereference allows attackers to cause a denial of service (or application
   crash). This only applies when lxml is used together with libxml2 2.9.10
   through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows
   triggering crashes through forged input data, given a vulnerable code
   sequence in the application. The vulnerability is caused by the iterwalk
   function (also used by the canonicalize function). Such code shouldn't be in
   wide-spread use, given that parsing + iterwalk would usually be replaced with
   the more efficient iterparse function. However, an XML converter that
   serialises to C14N would also be vulnerable, for example, and there are
   legitimate use cases for this code sequence. If untrusted input is received
   (also remotely) and processed via iterwalk function, a crash can be
   triggered.
   CVE-2022-2309
   For more information, please visit
   https://data.safetycli.com/v/50748/f17


-> Vulnerability found in msal version 1.18.0
   Vulnerability ID: 66065
   Affected spec: >=0,<1.24.1
   ADVISORY: The Microsoft Authentication Library (MSAL) for Python
   before 1.24.1 is susceptible to a vulnerability in certain versions due to
   inadequate input sanitization within the authcode.py file. This flaw allows
   for the improper neutralization of special elements in data query
   logic.https://github.com/AzureAD/microsoft-authentication-library-for-
   python/commit/3427c2577bb674196a59e58cbf5aa91ad92cba7d
   PVE-2024-99774
   For more information, please visit
   https://data.safetycli.com/v/66065/f17


-> Vulnerability found in oauthlib version 3.2.0
   Vulnerability ID: 50959
   Affected spec: >=3.1.1,<3.2.1
   ADVISORY: OAuthLib 3.2.1 includes a fix for CVE-2022-36087: In
   OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect
   uri can cause denial of service. An attacker can also leverage usage of
   'uri_validate' functions depending where it is used. OAuthLib applications
   using OAuth2.0 provider support or use directly 'uri_validate' are affected
   by this issue. There are no known workarounds.https://github.com/oauthlib/oau
   thlib/security/advisories/GHSA-3pgj-pg6c-r5p7
   CVE-2022-36087
   For more information, please visit
   https://data.safetycli.com/v/50959/f17


-> Vulnerability found in paramiko version 2.11.0
   Vulnerability ID: 65193
   Affected spec: <3.4.0
   ADVISORY: The SSH transport protocol with certain OpenSSH extensions,
   found in OpenSSH before 9.6 and other products, allows remote attackers to
   bypass integrity checks such that some packets are omitted (from the
   extension negotiation message), and a client and server may consequently end
   up with a connection for which some security features have been downgraded or
   disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet
   Protocol (BPP), implemented by these extensions, mishandles the handshake
   phase and mishandles use of sequence numbers. For example, there is an
   effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with
   Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if
   CBC is used) the -etm@openssh.com MAC algorithms.
   CVE-2023-48795
   For more information, please visit
   https://data.safetycli.com/v/65193/f17


-> Vulnerability found in protobuf version 4.21.1
   Vulnerability ID: 51167
   Affected spec: >=4.0.0rc0,<4.21.6
   ADVISORY: Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix
   for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the
   ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2,
   3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and
   including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-
   python can lead to out of memory failures. A specially crafted message with
   multiple key-value per elements creates parsing issues, and can lead to a
   Denial of Service against services receiving unsanitized input.https://github
   .com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
   CVE-2022-1941
   For more information, please visit
   https://data.safetycli.com/v/51167/f17


-> Vulnerability found in pyopenssl version 22.0.0
   Vulnerability ID: 65213
   Affected spec: >=22.0.0
   ADVISORY: CVE-2023-6129 affects PyOpenSSL versions starting from
   22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC CPUs.
   This issue could lead to state corruption in applications, causing inaccurate
   outcomes or service disruptions. Attackers need specific conditions to
   exploit this flaw, including the ability to manipulate the algorithm's use
   and reliance on certain system registers by the application.
   CVE-2023-6129
   For more information, please visit
   https://data.safetycli.com/v/65213/f17


-> Vulnerability found in pyvcloud version 19.1.1
   Vulnerability ID: 36809
   Affected spec: <20.0.0
   ADVISORY: Pyvcloud 20.0.0 fixes CVE-2017-18342: Replace yaml.load()
   with yaml.safe_load()
   CVE-2017-18342
   For more information, please visit
   https://data.safetycli.com/v/36809/f17


-> Vulnerability found in requests version 2.28.0
   Vulnerability ID: 58755
   Affected spec: >=2.3.0,<2.31.0
   ADVISORY: Requests 2.31.0 includes a fix for CVE-2023-32681: Since
   Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
   destination servers when redirected to an HTTPS endpoint. This is a product
   of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header
   to requests. For HTTP connections sent through the tunnel, the proxy will
   identify the header in the request itself and remove it prior to forwarding
   to the destination server. However when sent over HTTPS, the 'Proxy-
   Authorization' header must be sent in the CONNECT request as the proxy has no
   visibility into the tunneled request. This results in Requests forwarding
   proxy credentials to the destination server unintentionally, allowing a
   malicious actor to potentially exfiltrate sensitive information.
   CVE-2023-32681
   For more information, please visit
   https://data.safetycli.com/v/58755/f17


-> Vulnerability found in urllib3 version 1.26.9
   Vulnerability ID: 61893
   Affected spec: <1.26.18
   ADVISORY: Urllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803:
   Request body not stripped after redirect from 303 status changes request
   method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m
   x-q9vg-27p4
   CVE-2023-45803
   For more information, please visit
   https://data.safetycli.com/v/61893/f17


-> Vulnerability found in urllib3 version 1.26.9
   Vulnerability ID: 61601
   Affected spec: <1.26.17
   ADVISORY: Urllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804:
   Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers
   for managing cookies over HTTP, that is the responsibility of the user.
   However, it is possible for a user to specify a 'Cookie' header and
   unknowingly leak information via HTTP redirects to a different origin if that
   user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/
   security/advisories/GHSA-v845-jxx5-vc9f
   CVE-2023-43804
   For more information, please visit
   https://data.safetycli.com/v/61601/f17

 Scan was completed. 21 vulnerabilities were found. 

+==============================================================================+
   REMEDIATIONS

  21 vulnerabilities were found in 13 packages. For detailed remediation & fix 
  recommendations, upgrade to a commercial license. 

+==============================================================================+

  Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. 
  For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io

+==============================================================================+
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt
ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/cover/log/cover-1.log
================================== log start ===================================
Collecting osm-common@ git+https://osm.etsi.org/gerrit/osm/common.git@v12.0 (from -r /home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt (line 25))
  Cloning https://osm.etsi.org/gerrit/osm/common.git (to revision v12.0) to /tmp/pip-install-22m8vseb/osm-common_82e2a0e3e02941c4be9279432c8601bc
  Running command git clone --filter=blob:none --quiet https://osm.etsi.org/gerrit/osm/common.git /tmp/pip-install-22m8vseb/osm-common_82e2a0e3e02941c4be9279432c8601bc
  warning: filtering not recognized by server, ignoring
  Running command git checkout -b v12.0 --track origin/v12.0
  Switched to a new branch 'v12.0'
  Branch 'v12.0' set up to track remote branch 'v12.0' from 'origin'.
  Resolved https://osm.etsi.org/gerrit/osm/common.git to commit 6aaeaa389273ec46b469f79f3c9b47cf3249bd74
  Preparing metadata (setup.py): started
  Preparing metadata (setup.py): finished with status 'done'
Obtaining file:///home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin (from -r /home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt (line 17))
  Preparing metadata (setup.py): started
  Preparing metadata (setup.py): finished with status 'error'
  error: subprocess-exited-with-error
  
  × python setup.py egg_info did not run successfully.
  │ exit code: 1
  ╰─> [42 lines of output]
      /tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py:81: _DeprecatedInstaller: setuptools.installer and fetch_build_eggs are deprecated.
      !!
      
              ********************************************************************************
              Requirements should be satisfied by a PEP 517 installer.
              If you are using pip, you can try `pip install --use-pep517`.
              ********************************************************************************
      
      !!
        dist.fetch_build_eggs(dist.setup_requires)
      Traceback (most recent call last):
        File "<string>", line 2, in <module>
        File "<pip-setuptools-caller>", line 34, in <module>
        File "/home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin/setup.py", line 39, in <module>
          setup(
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py", line 103, in setup
          _install_setup_requires(attrs)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py", line 76, in _install_setup_requires
          _fetch_build_eggs(dist)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py", line 81, in _fetch_build_eggs
          dist.fetch_build_eggs(dist.setup_requires)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/dist.py", line 640, in fetch_build_eggs
          return _fetch_build_eggs(self, requires)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/installer.py", line 38, in _fetch_build_eggs
          resolved_dists = pkg_resources.working_set.resolve(
        File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 798, in resolve
          dist = self._resolve_dist(
        File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 834, in _resolve_dist
          dist = best[req.key] = env.best_match(
        File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 1104, in best_match
          return self.obtain(req, installer)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 1115, in obtain
          return installer(requirement) if installer else None
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/installer.py", line 106, in _fetch_build_egg_no_warn
          wheel.install_as_egg(dist_location)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/wheel.py", line 120, in install_as_egg
          self._install_as_egg(destination_eggdir, zf)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/wheel.py", line 128, in _install_as_egg
          self._convert_metadata(zf, destination_eggdir, dist_info, egg_info)
        File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/wheel.py", line 173, in _convert_metadata
          os.rename(dist_info, egg_info)
      OSError: [Errno 39] Directory not empty: '/home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin/.eggs/setuptools_version_command-99.9-py3.8.egg/setuptools_version_command-99.9.dist-info' -> '/home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin/.eggs/setuptools_version_command-99.9-py3.8.egg/EGG-INFO'
      [end of output]
  
  note: This error originates from a subprocess, and is likely not a problem with pip.
error: metadata-generation-failed

× Encountered error while generating package metadata.
╰─> See above for output.

note: This is an issue with the package mentioned above, not pip.
hint: See above for details.

=================================== log end ====================================
ERROR: could not install deps [-r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt]; v = InvocationError('/tmp/.tox/cover/bin/python -m pip install -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt', 1)
___________________________________ summary ____________________________________
  black: commands succeeded
  flake8: commands succeeded
  safety: commands succeeded
ERROR:   cover: could not install deps [-r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt]; v = InvocationError('/tmp/.tox/cover/bin/python -m pip install -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt', 1)
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 a045b789a54963db2abaecf84b2f2f7e94a034a812b499e99124dcebe487b43d
$ docker rm -f a045b789a54963db2abaecf84b2f2f7e94a034a812b499e99124dcebe487b43d
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE