[RO-stage_2-merge_v14.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.0,tomli==2.0.1,typing_extensions==4.10.0
black run-test-pre: PYTHONHASHSEED='598924414'
black run-test: commands[0] | black --check --diff NG-RO
All done! ✨ 🍰 ✨
14 files would be left unchanged.
black run-test: commands[1] | black --check --diff RO-plugin
All done! ✨ 🍰 ✨
9 files would be left unchanged.
black run-test: commands[2] | black --check --diff RO-SDN-arista_cloudvision
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[3] | black --check --diff RO-SDN-dpb
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[4] | black --check --diff RO-SDN-dynpac
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[5] | black --check --diff RO-SDN-floodlight_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[6] | black --check --diff RO-SDN-ietfl2vpn
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[7] | black --check --diff RO-SDN-juniper_contrail
All done! ✨ 🍰 ✨
7 files would be left unchanged.
black run-test: commands[8] | black --check --diff RO-SDN-odl_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[9] | black --check --diff RO-SDN-onos_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[10] | black --check --diff RO-SDN-onos_vpls
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[11] | black --check --diff RO-SDN-tapi
All done! ✨ 🍰 ✨
17 files would be left unchanged.
black run-test: commands[12] | black --check --diff RO-VIM-aws
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[13] | black --check --diff RO-VIM-azure
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[14] | black --check --diff RO-VIM-openstack
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[15] | black --check --diff RO-VIM-openvim
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[16] | black --check --diff RO-VIM-vmware
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[17] | black --check --diff RO-VIM-gcp
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[18] | black --check --diff integration-tests
All done! ✨ 🍰 ✨
1 file would be left unchanged.
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements-test.txt
cover installed: adal==1.2.7,aiokafka==0.8.1,appdirs==1.4.4,async-timeout==4.0.3,atpublic==4.0,attrs==23.1.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.29.4,azure-identity==1.14.0,azure-mgmt-compute==30.3.0,azure-mgmt-core==1.4.0,azure-mgmt-network==25.1.0,azure-mgmt-resource==23.0.1,bcrypt==4.0.1,boto==2.49.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.3.0,cheroot==10.0.0,CherryPy==18.1.2,cliff==4.3.0,cmd2==2.4.3,coverage==7.3.2,cryptography==41.0.4,cvprac==1.3.1,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dnspython==2.4.2,dogpile.cache==1.2.2,flufl.enum==6.0.2,google-api-core==2.12.0,google-api-python-client==2.101.0,google-auth==2.23.2,google-auth-httplib2==0.1.1,google-cloud==0.34.0,googleapis-common-protos==1.60.0,httplib2==0.22.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,ipconflict==0.5.0,iso8601==2.1.0,isodate==0.6.1,jaraco.functools==3.9.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,kafka-python==2.0.2,keystoneauth1==5.3.0,logutils==0.3.5,lxml==4.9.3,MarkupSafe==2.1.3,mock==5.1.0,more-itertools==10.1.0,motor==3.3.1,msal==1.24.1,msal-extensions==1.0.0,msgpack==1.0.7,msrest==0.7.1,msrestazure==0.6.4,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@df511049aeda8da03035b3adc2f900b76c8255de,-e git+https://osm.etsi.org/gerrit/osm/RO.git@dc12a445cc1f5b271263e164ddab5157e94702c0#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,portalocker==2.8.2,portend==3.2.0,prettytable==3.9.0,progressbar==2.5,protobuf==4.24.3,py-radix==0.10.0,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,PyJWT==2.8.0,pymongo==4.5.0,PyNaCl==1.5.0,pyOpenSSL==23.2.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.4.0,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,pyvcloud==19.1.1,pyvmomi==8.0.2.0,PyYAML==6.0.1,referencing==0.30.2,requests==2.31.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rpds-py==0.10.3,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tempora==5.5.0,tqdm==4.66.1,typing_extensions==4.8.0,tzdata==2023.3,uritemplate==4.1.1,urllib3==2.0.6,uuid==1.30,warlock==2.0.1,wcwidth==0.2.8,wrapt==1.15.0,zc.lockfile==3.0.post1,zipp==3.17.0
cover run-test-pre: PYTHONHASHSEED='598924414'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage NG-RO/osm_ng_ro -s NG-RO/osm_ng_ro
WARNING:root:The 'osm_ng_ro' distribution was not found and is required by the application occured while getting the ro version
............ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..........................ERROR:root:ro_task=122436:1 vim=0 del-shared-volume=sample_shared_volume_id_3: Connection failed.
..ERROR:root:task=123456:1 vim=0 new-shared-volume: Connection failed.
.................................................................................................................................................................................................................................................................................................................
----------------------------------------------------------------------
Ran 349 tests in 1.131s
OK
Name Stmts Miss Cover
-------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1202 683 43%
NG-RO/osm_ng_ro/ns_thread.py 1258 822 35%
NG-RO/osm_ng_ro/ro_main.py 459 459 0%
NG-RO/osm_ng_ro/tests/__init__.py 0 0 100%
NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100%
NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99%
NG-RO/osm_ng_ro/tests/test_ns.py 1843 12 99%
NG-RO/osm_ng_ro/tests/test_ns_thread.py 692 0 100%
NG-RO/osm_ng_ro/validation.py 35 13 63%
NG-RO/osm_ng_ro/vim_admin.py 224 186 17%
-------------------------------------------------------------
TOTAL 7538 2237 70%
cover run-test: commands[3] | sh -c 'mv .coverage .coverage_ng_ro'
cover run-test: commands[4] | nose2 -C --coverage RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail -s RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
....
----------------------------------------------------------------------
Ran 4 tests in 0.007s
OK
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------------------
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 98 66 33%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 146 79 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 380 310 18%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100%
-------------------------------------------------------------------------------------------------------------------
TOTAL 659 455 31%
cover run-test: commands[5] | sh -c 'mv .coverage .coverage_rosdn_juniper_contrail'
cover run-test: commands[6] | nose2 -C --coverage RO-SDN-tapi/osm_rosdn_tapi -s RO-SDN-tapi/osm_rosdn_tapi
127.0.0.1 - - [25/Mar/2024 10:55:21] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:21] "GET /restconf/data/tapi-common:context/service-interface-point HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:21] "POST /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context HTTP/1.1" 201 -
127.0.0.1 - - [25/Mar/2024 10:55:21] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:21] "GET /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context/connectivity-service HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:21] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:21] "POST /restconf/operations/tapi-connectivity:delete-connectivity-service HTTP/1.1" 204 -
.127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context/service-interface-point HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "POST /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context HTTP/1.1" 201 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "POST /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context HTTP/1.1" 201 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context/connectivity-service HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context/connectivity-service HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "POST /restconf/operations/tapi-connectivity:delete-connectivity-service HTTP/1.1" 204 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "POST /restconf/operations/tapi-connectivity:delete-connectivity-service HTTP/1.1" 204 -
.127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [25/Mar/2024 10:55:22] "GET /restconf/data/tapi-common:context/service-interface-point HTTP/1.1" 200 -
.
----------------------------------------------------------------------
Ran 3 tests in 1.762s
OK
Name Stmts Miss Cover
---------------------------------------------------------------------------
RO-SDN-tapi/osm_rosdn_tapi/__init__.py 0 0 100%
RO-SDN-tapi/osm_rosdn_tapi/conn_info.py 19 3 84%
RO-SDN-tapi/osm_rosdn_tapi/exceptions.py 66 25 62%
RO-SDN-tapi/osm_rosdn_tapi/log_messages.py 8 0 100%
RO-SDN-tapi/osm_rosdn_tapi/message_composers.py 37 4 89%
RO-SDN-tapi/osm_rosdn_tapi/message_templates.py 6 0 100%
RO-SDN-tapi/osm_rosdn_tapi/services_composer.py 52 10 81%
RO-SDN-tapi/osm_rosdn_tapi/tapi_client.py 90 22 76%
RO-SDN-tapi/osm_rosdn_tapi/tests/__init__.py 0 0 100%
RO-SDN-tapi/osm_rosdn_tapi/tests/constants.py 6 0 100%
RO-SDN-tapi/osm_rosdn_tapi/tests/exceptions.py 10 4 60%
RO-SDN-tapi/osm_rosdn_tapi/tests/mock_osm_ro.py 33 7 79%
RO-SDN-tapi/osm_rosdn_tapi/tests/mock_tapi_handler.py 80 13 84%
RO-SDN-tapi/osm_rosdn_tapi/tests/test_wim_tapi.py 65 0 100%
RO-SDN-tapi/osm_rosdn_tapi/tests/tools.py 9 2 78%
RO-SDN-tapi/osm_rosdn_tapi/wimconn_tapi.py 93 5 95%
---------------------------------------------------------------------------
TOTAL 574 95 83%
cover run-test: commands[7] | sh -c 'mv .coverage .coverage_rosdn_tapi'
cover run-test: commands[8] | nose2 -C --coverage RO-VIM-openstack/osm_rovim_openstack -s RO-VIM-openstack/osm_rovim_openstack
................................................................................................................................................................................................................................................
----------------------------------------------------------------------
Ran 240 tests in 1.549s
OK
Name Stmts Miss Cover
------------------------------------------------------------------------------------------
RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/test_vimconn_openstack.py 3124 24 99%
RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1586 968 39%
------------------------------------------------------------------------------------------
TOTAL 4710 992 79%
cover run-test: commands[9] | sh -c 'mv .coverage .coverage_rovim_openstack'
cover run-test: commands[10] | coverage combine .coverage_ng_ro .coverage_rovim_openstack .coverage_rosdn_juniper_contrail
Combined data file .coverage_ng_ro
Combined data file .coverage_rovim_openstack
Combined data file .coverage_rosdn_juniper_contrail
cover run-test: commands[11] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1202 683 43%
NG-RO/osm_ng_ro/ns_thread.py 1258 822 35%
NG-RO/osm_ng_ro/ro_main.py 459 459 0%
NG-RO/osm_ng_ro/tests/__init__.py 0 0 100%
NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100%
NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99%
NG-RO/osm_ng_ro/tests/test_ns.py 1843 12 99%
NG-RO/osm_ng_ro/tests/test_ns_thread.py 692 0 100%
NG-RO/osm_ng_ro/validation.py 35 13 63%
NG-RO/osm_ng_ro/vim_admin.py 224 186 17%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 98 66 33%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 146 79 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 380 310 18%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100%
RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/test_vimconn_openstack.py 3124 24 99%
RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1586 968 39%
-------------------------------------------------------------------------------------------------------------------
TOTAL 12907 3684 71%
cover run-test: commands[12] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[13] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==5.0.4, flake8-import-order
flake8 installed: flake8==5.0.4,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.9.1,pyflakes==2.5.0
flake8 run-test-pre: PYTHONHASHSEED='598924414'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-SDN-tapi/osm_rosdn_tapi/ RO-SDN-tapi/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[16] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
flake8 run-test: commands[17] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py
flake8 run-test: commands[18] | flake8 integration-tests/
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements-test.txt, pylint==2.17.7
pylint installed: adal==1.2.7,aiokafka==0.8.1,appdirs==1.4.4,astroid==2.15.8,async-timeout==4.0.3,atpublic==4.0,attrs==23.1.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.29.4,azure-identity==1.14.0,azure-mgmt-compute==30.3.0,azure-mgmt-core==1.4.0,azure-mgmt-network==25.1.0,azure-mgmt-resource==23.0.1,bcrypt==4.0.1,boto==2.49.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.3.0,cheroot==10.0.0,CherryPy==18.1.2,cliff==4.3.0,cmd2==2.4.3,coverage==7.3.2,cryptography==41.0.4,cvprac==1.3.1,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dnspython==2.4.2,dogpile.cache==1.2.2,flufl.enum==6.0.2,google-api-core==2.12.0,google-api-python-client==2.101.0,google-auth==2.23.2,google-auth-httplib2==0.1.1,google-cloud==0.34.0,googleapis-common-protos==1.60.0,httplib2==0.22.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,ipconflict==0.5.0,iso8601==2.1.0,isodate==0.6.1,isort==5.13.2,jaraco.functools==3.9.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,kafka-python==2.0.2,keystoneauth1==5.3.0,lazy-object-proxy==1.10.0,logutils==0.3.5,lxml==4.9.3,MarkupSafe==2.1.3,mccabe==0.7.0,mock==5.1.0,more-itertools==10.1.0,motor==3.3.1,msal==1.24.1,msal-extensions==1.0.0,msgpack==1.0.7,msrest==0.7.1,msrestazure==0.6.4,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@df511049aeda8da03035b3adc2f900b76c8255de,-e git+https://osm.etsi.org/gerrit/osm/RO.git@dc12a445cc1f5b271263e164ddab5157e94702c0#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,platformdirs==4.2.0,portalocker==2.8.2,portend==3.2.0,prettytable==3.9.0,progressbar==2.5,protobuf==4.24.3,py-radix==0.10.0,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,PyJWT==2.8.0,pylint==2.17.7,pymongo==4.5.0,PyNaCl==1.5.0,pyOpenSSL==23.2.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.4.0,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,pyvcloud==19.1.1,pyvmomi==8.0.2.0,PyYAML==6.0.1,referencing==0.30.2,requests==2.31.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rpds-py==0.10.3,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tempora==5.5.0,tomli==2.0.1,tomlkit==0.12.4,tqdm==4.66.1,typing_extensions==4.8.0,tzdata==2023.3,uritemplate==4.1.1,urllib3==2.0.6,uuid==1.30,warlock==2.0.1,wcwidth==0.2.8,wrapt==1.15.0,zc.lockfile==3.0.post1,zipp==3.17.0
pylint run-test-pre: PYTHONHASHSEED='598924414'
pylint run-test: commands[0] | pylint -E NG-RO/osm_ng_ro --disable=E1101
pylint run-test: commands[1] | pylint -E RO-plugin/osm_ro_plugin --disable=E1101
pylint run-test: commands[2] | pylint -E RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision --disable=all
pylint run-test: commands[3] | pylint -E RO-SDN-dpb/osm_rosdn_dpb
pylint run-test: commands[4] | pylint -E RO-SDN-dynpac/osm_rosdn_dynpac --disable=E1101
pylint run-test: commands[5] | pylint -E RO-SDN-floodlight_openflow/osm_rosdn_floodlightof
pylint run-test: commands[6] | pylint -E RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn --disable=E1101
pylint run-test: commands[7] | pylint -E RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
pylint run-test: commands[8] | pylint -E RO-SDN-odl_openflow/osm_rosdn_odlof
pylint run-test: commands[9] | pylint -E RO-SDN-onos_openflow/osm_rosdn_onosof
pylint run-test: commands[10] | pylint -E RO-SDN-onos_vpls/osm_rosdn_onos_vpls --disable=E1101
pylint run-test: commands[11] | pylint -E RO-SDN-tapi/osm_rosdn_tapi
pylint run-test: commands[12] | pylint -E RO-VIM-aws/osm_rovim_aws
pylint run-test: commands[13] | pylint -E RO-VIM-azure/osm_rovim_azure --disable=all
pylint run-test: commands[14] | pylint -E RO-VIM-openstack/osm_rovim_openstack --disable=E1101
pylint run-test: commands[15] | pylint -E RO-VIM-openvim/osm_rovim_openvim --disable=all
pylint run-test: commands[16] | pylint -E RO-VIM-vmware/osm_rovim_vmware --disable=all
pylint run-test: commands[17] | pylint -E RO-VIM-gcp/osm_rovim_gcp --disable=E1101
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v14.0/requirements.txt, safety
safety installed: adal==1.2.7,appdirs==1.4.4,atpublic==4.0,attrs==23.1.0,Authlib==1.3.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.29.4,azure-identity==1.14.0,azure-mgmt-compute==30.3.0,azure-mgmt-core==1.4.0,azure-mgmt-network==25.1.0,azure-mgmt-resource==23.0.1,bcrypt==4.0.1,boto==2.49.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.3.0,cheroot==10.0.0,CherryPy==18.1.2,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,cryptography==41.0.4,cvprac==1.3.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,dparse==0.6.4b0,flufl.enum==6.0.2,google-api-core==2.12.0,google-api-python-client==2.101.0,google-auth==2.23.2,google-auth-httplib2==0.1.1,google-cloud==0.34.0,googleapis-common-protos==1.60.0,httplib2==0.22.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,ipconflict==0.5.0,iso8601==2.1.0,isodate==0.6.1,jaraco.functools==3.9.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,keystoneauth1==5.3.0,logutils==0.3.5,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.3,marshmallow==3.21.1,mdurl==0.1.2,more-itertools==10.1.0,msal==1.24.1,msal-extensions==1.0.0,msgpack==1.0.7,msrest==0.7.1,msrestazure==0.6.4,netaddr==0.9.0,netifaces==0.11.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,portalocker==2.8.2,portend==3.2.0,prettytable==3.9.0,progressbar==2.5,protobuf==4.24.3,py-radix==0.10.0,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pydantic==1.10.14,Pygments==2.16.1,pyinotify==0.9.6,PyJWT==2.8.0,PyNaCl==1.5.0,pyOpenSSL==23.2.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.4.0,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,pyvcloud==19.1.1,pyvmomi==8.0.2.0,PyYAML==6.0.1,referencing==0.30.2,requests==2.31.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.1,rpds-py==0.10.3,rsa==4.9,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.0.1,safety-schemas==0.0.2,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tempora==5.5.0,tomli==2.0.1,tqdm==4.66.1,typer==0.10.0,typing_extensions==4.8.0,tzdata==2023.3,uritemplate==4.1.1,urllib3==2.0.6,uuid==1.30,warlock==2.0.1,wcwidth==0.2.8,wrapt==1.15.0,zc.lockfile==3.0.post1,zipp==3.17.0
safety run-test-pre: PYTHONHASHSEED='598924414'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.0.1[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /usr/lib/python3.10/lib-dynload
-> /usr/lib/python3.10
-> /tmp/.tox/safety/lib/python3.10/site-packages
-> /tmp/.tox/safety/bin
-> /usr/lib/python310.zip
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 141 packages[0m
Timestamp [1m2024-03-25 10:59:43[0m
[1m 10[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 2.0.6[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m>=2.0.0a1,<2.0.7
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pyvcloud version 19.1.1[0m
[1m Vulnerability ID: [0m36809
[1m Affected spec: [0m<20.0.0
[1m ADVISORY: [0mPyvcloud 20.0.0 fixes CVE-2017-18342: Replace
yaml.load() with yaml.safe_load()
[1m CVE-2017-18342[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/36809/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 36809 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pyopenssl version 23.2.0[0m
[1m Vulnerability ID: [0m65213
[1m Affected spec: [0m>=22.0.0
[1m ADVISORY: [0mCVE-2023-6129 affects PyOpenSSL versions starting from
22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC
CPUs. This issue could lead to state corruption in applications, causing
inaccurate outcomes or service disruptions. Attackers need specific
conditions to exploit this flaw, including the ability to manipulate the
algorithm's use and reliance on certain system registers by the
application.
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65213/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65213 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mPip 23.3 includes a fix for CVE-2023-5752: When
installing a package from a Mercurial VCS URL (ie "pip install hg+...")
with pip prior to v23.3, the specified Mercurial revision could be used to
inject arbitrary configuration options to the "hg clone" call (ie "--
config"). Controlling the Mercurial configuration can modify how and which
repository is installed. This vulnerability does not affect users who
aren't installing from Mercurial.https://github.com/pypa/pip/pull/12306
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in paramiko version 3.3.1[0m
[1m Vulnerability ID: [0m65193
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mThe SSH transport protocol with certain OpenSSH
extensions, found in OpenSSH before 9.6 and other products, allows remote
attackers to bypass integrity checks such that some packets are omitted
(from the extension negotiation message), and a client and server may
consequently end up with a connection for which some security features
have been downgraded or disabled, aka a Terrapin attack. This occurs
because the SSH Binary Packet Protocol (BPP), implemented by these
extensions, mishandles the handshake phase and mishandles use of sequence
numbers. For example, there is an effective attack against SSH's use of
ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in
chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com
MAC algorithms.
[1m CVE-2023-48795[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65193/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65193 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62556/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package.
This issue may allow a remote attacker to decrypt captured messages in TLS
servers that use RSA key exchanges, which may lead to exposure of
confidential or sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65278/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65278 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC
CPUs, which allows an attacker to disrupt the application's state. This
disruption might result in false calculations or cause a denial of
service. The vulnerability's exploitation hinges on the attacker's ability
to alter the algorithm's application and the dependency of the software on
non-volatile XMM registers.https://github.com/pyca/cryptography/commit/89d
0d56fb104ac4e0e6db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65212/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65212 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in jinja2 version 3.1.2[0m
[1m Vulnerability ID: [0m64227
[1m Affected spec: [0m<3.1.3
[1m ADVISORY: [0mJinja2 before 3.1.3 is affected by a Cross-Site
Scripting vulnerability. Special placeholders in the template allow
writing code similar to Python syntax. It is possible to inject arbitrary
HTML attributes into the rendered HTML template. The Jinja 'xmlattr'
filter can be abused to inject arbitrary HTML attribute keys and values,
bypassing the auto escaping mechanism and potentially leading to XSS. It
may also be possible to bypass attribute validation checks if they are
blacklist-based.
[1m CVE-2024-22195[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64227/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64227 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
10 vulnerabilities were reported in 8 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 10 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
congratulations :)