[RO-stage_2-merge_v13.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==23.2,pathspec==0.12.1,platformdirs==4.2.0,tomli==2.0.1,typing_extensions==4.9.0
black run-test-pre: PYTHONHASHSEED='3020088973'
black run-test: commands[0] | black --check --diff NG-RO
All done! ✨ 🍰 ✨
14 files would be left unchanged.
black run-test: commands[1] | black --check --diff RO-plugin
All done! ✨ 🍰 ✨
9 files would be left unchanged.
black run-test: commands[2] | black --check --diff RO-SDN-arista_cloudvision
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[3] | black --check --diff RO-SDN-dpb
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[4] | black --check --diff RO-SDN-dynpac
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[5] | black --check --diff RO-SDN-floodlight_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[6] | black --check --diff RO-SDN-ietfl2vpn
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[7] | black --check --diff RO-SDN-juniper_contrail
All done! ✨ 🍰 ✨
7 files would be left unchanged.
black run-test: commands[8] | black --check --diff RO-SDN-odl_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[9] | black --check --diff RO-SDN-onos_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[10] | black --check --diff RO-SDN-onos_vpls
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[11] | black --check --diff RO-VIM-aws
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[12] | black --check --diff RO-VIM-azure
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[13] | black --check --diff RO-VIM-openstack
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[14] | black --check --diff RO-VIM-openvim
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[15] | black --check --diff RO-VIM-vmware
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[16] | black --check --diff RO-VIM-gcp
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[17] | black --check --diff integration-tests
All done! ✨ 🍰 ✨
1 file would be left unchanged.
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==5.0.4, flake8-import-order
flake8 installed: flake8==5.0.4,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.9.1,pyflakes==2.5.0
flake8 run-test-pre: PYTHONHASHSEED='3020088973'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
flake8 run-test: commands[16] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py
flake8 run-test: commands[17] | flake8 integration-tests/
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements.txt, safety
safety installed: adal==1.2.7,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,click==8.1.7,cliff==3.10.1,cmd2==2.4.1,cryptography==37.0.2,cvprac==1.2.0,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,dparse==0.6.3,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,ruamel.yaml==0.18.5,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tomli==2.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0
safety run-test-pre: PYTHONHASHSEED='3020088973'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by pyup.io \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv2.3.5[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/lib/python3.8/site-packages
Using [1mnon-commercial database[0m
[1m Found and scanned 129 packages[0m
Timestamp [1m2024-01-31 08:56:44[0m
[1m 13[0m[1m vulnerabilities found[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[31m[1mVULNERABILITIES FOUND[0m
+==============================================================================+
[31m-> Vulnerability found in pygments version 2.12.0
[0m[1m Vulnerability ID: [0m58910
[1m Affected spec: [0m<2.15.0
[1m ADVISORY: [0mPygments 2.15.0 includes a fix for CVE-2022-40896: The
regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
properties files were discovered to be vulnerable. As a result, pygmentizing
a maliciously-crafted file of these kinds would have resulted in high
resources consumption or crashing of the
application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
top-python-packages-part-2
[1m CVE-2022-40896[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58910/f17[0m
[31m-> Vulnerability found in certifi version 2022.6.15
[0m[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust store.
TrustCor's root certificates are being removed pursuant to an investigation
prompted by media reporting that TrustCor's ownership also operated a
business that produced spyware. Conclusions of Mozilla's investigation can be
found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/52365/f17[0m
[31m-> Vulnerability found in certifi version 2022.6.15
[0m[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates.
e-Tugra's root certificates were subject to an investigation prompted by
reporting of security issues in their systems. Certifi 2023.07.22 removes
root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59956/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m53048
[1m Affected spec: [0m>=1.8,<39.0.1
[1m ADVISORY: [0mCryptography 39.0.1 includes a fix for CVE-2023-23931: In
affected versions 'Cipher.update_into' would accept Python objects which
implement the buffer protocol, but provide only immutable buffers. This would
allow immutable objects (such as 'bytes') to be mutated, thus violating
fundamental rules of Python and resulting in corrupted output. This issue has
been present since 'update_into' was originally introduced in cryptography
1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-
vj6r
[1m CVE-2023-23931[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/53048/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m59473
[1m Affected spec: [0m<41.0.2
[1m ADVISORY: [0mThe cryptography package before 41.0.2 for Python
mishandles SSH certificates that have critical options.
[1m CVE-2023-38325[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59473/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62556/f17[0m
[31m-> Vulnerability found in lxml version 4.9.0
[0m[1m Vulnerability ID: [0m50748
[1m Affected spec: [0m<4.9.1
[1m ADVISORY: [0mLxml 4.9.1 includes a fix for CVE-2022-2309: NULL Pointer
Dereference allows attackers to cause a denial of service (or application
crash). This only applies when lxml is used together with libxml2 2.9.10
through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows
triggering crashes through forged input data, given a vulnerable code
sequence in the application. The vulnerability is caused by the iterwalk
function (also used by the canonicalize function). Such code shouldn't be in
wide-spread use, given that parsing + iterwalk would usually be replaced with
the more efficient iterparse function. However, an XML converter that
serialises to C14N would also be vulnerable, for example, and there are
legitimate use cases for this code sequence. If untrusted input is received
(also remotely) and processed via iterwalk function, a crash can be
triggered.
[1m CVE-2022-2309[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50748/f17[0m
[31m-> Vulnerability found in oauthlib version 3.2.0
[0m[1m Vulnerability ID: [0m50959
[1m Affected spec: [0m>=3.1.1,<3.2.1
[1m ADVISORY: [0mOAuthLib 3.2.1 includes a fix for CVE-2022-36087: In
OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect
uri can cause denial of service. An attacker can also leverage usage of
'uri_validate' functions depending where it is used. OAuthLib applications
using OAuth2.0 provider support or use directly 'uri_validate' are affected
by this issue. There are no known workarounds.https://github.com/oauthlib/oau
thlib/security/advisories/GHSA-3pgj-pg6c-r5p7
[1m CVE-2022-36087[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50959/f17[0m
[31m-> Vulnerability found in protobuf version 4.21.1
[0m[1m Vulnerability ID: [0m51167
[1m Affected spec: [0m>=4.0.0rc0,<4.21.6
[1m ADVISORY: [0mProtobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix
for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the
ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2,
3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and
including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-
python can lead to out of memory failures. A specially crafted message with
multiple key-value per elements creates parsing issues, and can lead to a
Denial of Service against services receiving unsanitized input.https://github
.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
[1m CVE-2022-1941[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/51167/f17[0m
[31m-> Vulnerability found in pyvcloud version 19.1.1
[0m[1m Vulnerability ID: [0m36809
[1m Affected spec: [0m<20.0.0
[1m ADVISORY: [0mPyvcloud 20.0.0 fixes CVE-2017-18342: Replace yaml.load()
with yaml.safe_load()
[1m CVE-2017-18342[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/36809/f17[0m
[31m-> Vulnerability found in requests version 2.28.0
[0m[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a product
of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header
to requests. For HTTP connections sent through the tunnel, the proxy will
identify the header in the request itself and remove it prior to forwarding
to the destination server. However when sent over HTTPS, the 'Proxy-
Authorization' header must be sent in the CONNECT request as the proxy has no
visibility into the tunneled request. This results in Requests forwarding
proxy credentials to the destination server unintentionally, allowing a
malicious actor to potentially exfiltrate sensitive information.
[1m CVE-2023-32681[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58755/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.9
[0m[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804:
Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers
for managing cookies over HTTP, that is the responsibility of the user.
However, it is possible for a user to specify a 'Cookie' header and
unknowingly leak information via HTTP redirects to a different origin if that
user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/
security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61601/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.9
[0m[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803:
Request body not stripped after redirect from 303 status changes request
method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m
x-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61893/f17[0m
Scan was completed. 13 vulnerabilities were found.
+==============================================================================+
[32m[1m REMEDIATIONS[0m
13 vulnerabilities were found in 9 packages. For detailed remediation & fix
recommendations, upgrade to a commercial license.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements-test.txt
cover installed: adal==1.2.7,aiokafka==0.7.2,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,cliff==3.10.1,cmd2==2.4.1,coverage==6.4.1,cryptography==37.0.2,cvprac==1.2.0,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,kafka-python==2.0.2,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,mock==4.0.3,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,nose2==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@c9512e2208ab7cc27d1cd312195f017cf834d88e,-e git+https://osm.etsi.org/gerrit/osm/RO.git@009b72a8b9b78eda3dc3775d10dd56893a949a80#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,pymongo==3.12.3,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0
cover run-test-pre: PYTHONHASHSEED='3020088973'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage NG-RO/osm_ng_ro -s NG-RO/osm_ng_ro
WARNING:root:The 'osm_ng_ro' distribution was not found and is required by the application occured while getting the ro version
............ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
......................................................................................................................................................................................................................................................................................................................................
----------------------------------------------------------------------
Ran 342 tests in 1.100s
OK
Name Stmts Miss Cover
-------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1189 672 43%
NG-RO/osm_ng_ro/ns_thread.py 1284 894 30%
NG-RO/osm_ng_ro/ro_main.py 457 457 0%
NG-RO/osm_ng_ro/tests/__init__.py 0 0 100%
NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100%
NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99%
NG-RO/osm_ng_ro/tests/test_ns.py 1777 6 99%
NG-RO/osm_ng_ro/tests/test_ns_thread.py 624 0 100%
NG-RO/osm_ng_ro/validation.py 34 13 62%
NG-RO/osm_ng_ro/vim_admin.py 224 187 17%
-------------------------------------------------------------
TOTAL 7414 2291 69%
cover run-test: commands[3] | sh -c 'mv .coverage .coverage_ng_ro'
cover run-test: commands[4] | nose2 -C --coverage RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail -s RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
....
----------------------------------------------------------------------
Ran 4 tests in 0.007s
OK
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------------------
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100%
-------------------------------------------------------------------------------------------------------------------
TOTAL 697 484 31%
cover run-test: commands[5] | sh -c 'mv .coverage .coverage_rosdn_juniper_contrail'
cover run-test: commands[6] | nose2 -C --coverage RO-VIM-openstack/osm_rovim_openstack -s RO-VIM-openstack/osm_rovim_openstack
...........................................................................................................................................................................................................................................ssssssssssssssssssssssssssssssssssss
----------------------------------------------------------------------
Ran 271 tests in 1.673s
OK (skipped=36)
Name Stmts Miss Cover
------------------------------------------------------------------------------------------
RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/test_vimconn_openstack.py 3325 184 94%
RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1843 1242 33%
------------------------------------------------------------------------------------------
TOTAL 5168 1426 72%
cover run-test: commands[7] | sh -c 'mv .coverage .coverage_rovim_openstack'
cover run-test: commands[8] | coverage combine .coverage_ng_ro .coverage_rovim_openstack .coverage_rosdn_juniper_contrail
Combined data file .coverage_ng_ro
Combined data file .coverage_rovim_openstack
Combined data file .coverage_rosdn_juniper_contrail
cover run-test: commands[9] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1189 672 43%
NG-RO/osm_ng_ro/ns_thread.py 1284 894 30%
NG-RO/osm_ng_ro/ro_main.py 457 457 0%
NG-RO/osm_ng_ro/validation.py 34 13 62%
NG-RO/osm_ng_ro/vim_admin.py 224 187 17%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19%
RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1843 1242 33%
-------------------------------------------------------------------------------------------------------
TOTAL 6057 4007 34%
cover run-test: commands[10] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[11] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
___________________________________ summary ____________________________________
black: commands succeeded
flake8: commands succeeded
safety: commands succeeded
cover: commands succeeded
congratulations :)