Started by upstream project "tests-stage_1" build number 1220
originally caused by:
Triggered by Gerrit: https://osm.etsi.org/gerrit/14408
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/tests.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/tests.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --force --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/bug1511
Seen branch in repository origin/master
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen 14 remote branches
Obtained Jenkinsfile from 21e74da5550521ee2cc561210b4d36c0047a41bc
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-3 in /home/jenkins/workspace/tests-stage_2_master@2
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/tests.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/tests.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/tests.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 21e74da5550521ee2cc561210b4d36c0047a41bc (master)
> git config core.sparsecheckout # timeout=10
> git checkout -f 21e74da5550521ee2cc561210b4d36c0047a41bc
Commit message: "Fix bug 2334 in heal_03 to add loop to check presence of remote file after healing"
> git rev-list --no-walk 21e74da5550521ee2cc561210b4d36c0047a41bc # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/tests-stage_2_master@2/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/master^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 9c253bda06915c374c7e38144976923ee67787d5 (refs/remotes/origin/master)
> git config core.sparsecheckout # timeout=10
> git checkout -f 9c253bda06915c374c7e38144976923ee67787d5
> git branch -a -v --no-abbrev # timeout=10
> git branch -D master # timeout=10
> git checkout -b master 9c253bda06915c374c7e38144976923ee67787d5
Commit message: "Fix installation of Kubernetes metrics server by updating the URL"
> git rev-list --no-walk 9c253bda06915c374c7e38144976923ee67787d5 # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= true
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 18265 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/992/display/redirect?page=changes
GERRIT_PROJECT=osm/tests
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/992/
HUDSON_COOKIE=bb77f1fc-ae67-499f-a445-f0e0511889c2
JENKINS_SERVER_COOKIE=durable-642fe8756653152112f08eaf0a0e1094
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=12216a618050975ff83f82ef03d7ce4cc03af627
WORKSPACE=/home/jenkins/workspace/tests-stage_2_master@2
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=master
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/992/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=2
XDG_SESSION_ID=4194
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/992/display/redirect?page=tests
BUILD_DISPLAY_NAME=#992
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=master
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=992
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-tests-stage_2-master-992
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/
BUILD_NUMBER=992
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/992/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/08/14408/8
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/tests-stage_2/job/master/display/redirect
JOB_NAME=tests-stage_2/master
TEST_INSTALL=true
PWD=/home/jenkins/workspace/tests-stage_2_master@2
SSH_CONNECTION=212.234.161.1 18265 172.21.249.3 22
BRANCH_NAME=master
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ git fetch --tags
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ git fetch origin refs/changes/08/14408/8
From https://osm.etsi.org/gerrit/osm/tests
* branch refs/changes/08/14408/8 -> FETCH_HEAD
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ git checkout -f 12216a618050975ff83f82ef03d7ce4cc03af627
Previous HEAD position was 21e74da Fix bug 2334 in heal_03 to add loop to check presence of remote file after healing
HEAD is now at 12216a6 Feature 11016:Service KPI Metric Based Scaling of VNF using exporter endpoint in NGSA
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .eggs/
Removing .local/
Removing .safety/
Removing build.env
Removing changelog/
Removing deb_dist/
Removing debian/osm-tests.install
Removing pool/
Removing tests.egg-info/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ devops/tools/license_scan.sh
robot-systest/testsuite/basic_34_service_kpi_based_scaling.robot is text
robot-systest/testsuite/basic_34_service_kpi_based_scaling.robot Apache-2.0
robot-systest/testsuite/heal_02-scale_vdu_healing.robot is text
robot-systest/testsuite/heal_02-scale_vdu_healing.robot Apache-2.0
robot-systest/testsuite/heal_03-multiple_healing.robot is text
robot-systest/testsuite/heal_03-multiple_healing.robot Apache-2.0
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
No releasenote check present
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/tests-master .
Sending build context to Docker daemon 152.3MB
Step 1/7 : FROM ubuntu:22.04
22.04: Pulling from library/ubuntu
Digest: sha256:19478ce7fc2ffbce89df29fea5725a8d12e57de52eb9ea570890dc5852aac1ac
Status: Downloaded newer image for ubuntu:22.04
---> 67c845845b7d
Step 2/7 : ARG APT_PROXY
---> Using cache
---> 9ed390ab8cf5
Step 3/7 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> a648025efc3d
Step 4/7 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools python3-pip tox
---> Using cache
---> 0bc184d111cb
Step 5/7 : RUN DEBIAN_FRONTEND=noninteractive apt-get -y install dh-make
---> Using cache
---> 085d1bb2c7b7
Step 6/7 : ENV LC_ALL C.UTF-8
---> Using cache
---> 3dc61c71259c
Step 7/7 : ENV LANG C.UTF-8
---> Using cache
---> 5ecf32c020da
Successfully built 5ecf32c020da
Successfully tagged osm/tests-master:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ id -u
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/tests-stage_2_master@2 -v /home/jenkins/workspace/tests-stage_2_master@2:/home/jenkins/workspace/tests-stage_2_master@2:rw,z -v /home/jenkins/workspace/tests-stage_2_master@2@tmp:/home/jenkins/workspace/tests-stage_2_master@2@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/tests-master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/tests-stage_2_master@2 -r -g jenkins jenkins
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Checking syntax of Robot tests
Checking tabs in robot files. No tabs should be present
No tabs are present in robot files. Correct!
Checking param separation in robot files. Three spaces is the recommendation, instead of two
No presence of two spaces to separate params in robot files. Correct!
Checking param separation in robot files. Three spaces is the recommendation, instead of four or more
Only three spaces must be used between params in robot files. Correct!
Checking CRLF terminators in robot files. No CRLF should be found
No presence of CRLF terminators in robot files. Correct!
Checking spaces at the end of lines in robot files. No spaces at EOL should be found
No presence of spaces at EOL in robot files. Correct!
Launching tox
✔ OK black in 6.052 seconds
black create: /tmp/.tox/black
black installdeps: black
black installed: black==24.4.2,click==8.1.7,mypy-extensions==1.0.0,packaging==24.1,pathspec==0.12.1,platformdirs==4.2.2,tomli==2.0.1,typing_extensions==4.12.2
black run-test-pre: PYTHONHASHSEED='3825804820'
black run-test: commands[0] | black --check --diff robot-systest --fast
All done! ✨ 🍰 ✨
6 files would be left unchanged.
✔ OK flake8 in 8.566 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8
flake8 develop-inst: /home/jenkins/workspace/tests-stage_2_master@2
flake8 installed: flake8==7.1.0,mccabe==0.7.0,pycodestyle==2.12.0,pyflakes==3.2.0,-e git+https://osm.etsi.org/gerrit/osm/tests.git@12216a618050975ff83f82ef03d7ce4cc03af627#egg=tests
flake8 run-test-pre: PYTHONHASHSEED='1655575601'
flake8 run-test: commands[0] | flake8 robot-systest
✔ OK cover in 50.185 seconds
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/tests-stage_2_master@2/requirements.txt
cover develop-inst: /home/jenkins/workspace/tests-stage_2_master@2
cover installed: appdirs==1.4.4,argcomplete==3.1.2,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,bitarray==2.8.1,certifi==2023.7.22,cffi==1.15.1,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,cryptography==41.0.4,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,enum34==1.1.10,exceptiongroup==1.1.3,h11==0.14.0,haikunator==2.1.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,jmespath==1.0.1,jsonpatch==1.33,jsonpath-ng==1.6.0,jsonpath-rw==1.4.0,jsonpath-rw-ext==1.2.2,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,keystoneauth1==5.3.0,lxml==4.9.3,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,objectpath==0.6.1,openstacksdk==1.5.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.i18n==6.1.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,outcome==1.2.0,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,ply==3.11,prettytable==3.9.0,pyang==2.5.3,pyangbind==0.8.3.post1,pycparser==2.21,pyjsonselect==0.2.2,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==9.4.0,python-keystoneclient==5.2.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,PyYAML==6.0.1,referencing==0.30.2,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,robotframework==6.1.1,robotframework-jsonlibrary==0.5,robotframework-jsonvalidator==2.0.0,robotframework-pythonlibcore==4.2.0,robotframework-requests==0.9.5,robotframework-seleniumlibrary==6.1.2,robotframework-sshlibrary==3.8.0,robotframework-yamllibrary==0.2.8,rpds-py==0.10.3,scp==0.14.5,selenium==4.13.0,simplejson==3.19.1,six==1.16.0,sniffio==1.3.0,sortedcontainers==2.4.0,stevedore==5.1.0,-e git+https://osm.etsi.org/gerrit/osm/tests.git@12216a618050975ff83f82ef03d7ce4cc03af627#egg=tests,tomlkit==0.12.1,trio==0.22.2,trio-websocket==0.11.1,typing_extensions==4.8.0,tzdata==2023.3,urllib3==2.0.5,verboselogs==1.7,wcwidth==0.2.6,wrapt==1.15.0,wsproto==1.2.0,xmltodict==0.13.0,yq==3.2.3,zipp==3.17.0
cover run-test-pre: PYTHONHASHSEED='1789250987'
cover run-test: commands[0] | sh -c 'echo No unit tests'
No unit tests
✔ OK pylint in 57.267 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/tests-stage_2_master@2/requirements.txt, -r/home/jenkins/workspace/tests-stage_2_master@2/requirements-dev.txt, pylint
pylint develop-inst: /home/jenkins/workspace/tests-stage_2_master@2
pylint installed: appdirs==1.4.4,argcomplete==3.1.2,astroid==3.2.2,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,bitarray==2.8.1,certifi==2023.7.22,cffi==1.15.1,charset-normalizer==3.2.0,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,cryptography==41.0.4,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dogpile.cache==1.2.2,enum34==1.1.10,exceptiongroup==1.1.3,h11==0.14.0,haikunator==2.1.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,isort==5.13.2,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpath-ng==1.6.0,jsonpath-rw==1.4.0,jsonpath-rw-ext==1.2.2,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,keystoneauth1==5.3.0,lxml==4.9.3,MarkupSafe==2.1.3,mccabe==0.7.0,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,objectpath==0.6.1,openstacksdk==1.5.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.i18n==6.1.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,osmclient @ git+https://osm.etsi.org/gerrit/osm/osmclient.git@99ae2a1db48f91083dec4bef431814966a13ebbb,outcome==1.2.0,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,platformdirs==4.2.2,ply==3.11,prettytable==3.9.0,pyang==2.5.3,pyangbind==0.8.3.post1,pycparser==2.21,pyjsonselect==0.2.2,pylint==3.2.3,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==9.4.0,python-keystoneclient==5.2.0,python-magic==0.4.27,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,PyYAML==6.0.1,referencing==0.30.2,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,robotframework==6.1.1,robotframework-jsonlibrary==0.5,robotframework-jsonvalidator==2.0.0,robotframework-pythonlibcore==4.2.0,robotframework-requests==0.9.5,robotframework-seleniumlibrary==6.1.2,robotframework-sshlibrary==3.8.0,robotframework-yamllibrary==0.2.8,rpds-py==0.10.3,scp==0.14.5,selenium==4.13.0,simplejson==3.19.1,six==1.16.0,sniffio==1.3.0,sortedcontainers==2.4.0,stevedore==5.1.0,-e git+https://osm.etsi.org/gerrit/osm/tests.git@12216a618050975ff83f82ef03d7ce4cc03af627#egg=tests,tomli==2.0.1,tomlkit==0.12.1,trio==0.22.2,trio-websocket==0.11.1,typing_extensions==4.8.0,tzdata==2023.3,urllib3==2.0.5,verboselogs==1.7,wcwidth==0.2.6,wrapt==1.15.0,wsproto==1.2.0,xmltodict==0.13.0,yq==3.2.3,zipp==3.17.0
pylint run-test-pre: PYTHONHASHSEED='719724930'
pylint run-test: commands[0] | pylint -E robot-systest
✔ OK rflint in 57.511 seconds
rflint create: /tmp/.tox/rflint
rflint installdeps: -r/home/jenkins/workspace/tests-stage_2_master@2/requirements.txt, -r/home/jenkins/workspace/tests-stage_2_master@2/requirements-dev.txt, robotframework-lint, robotframework-robocop==4.2.2
rflint develop-inst: /home/jenkins/workspace/tests-stage_2_master@2
rflint installed: appdirs==1.4.4,argcomplete==3.1.2,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,bitarray==2.8.1,certifi==2023.7.22,cffi==1.15.1,charset-normalizer==3.2.0,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,cryptography==41.0.4,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,enum34==1.1.10,exceptiongroup==1.1.3,h11==0.14.0,haikunator==2.1.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpath-ng==1.6.0,jsonpath-rw==1.4.0,jsonpath-rw-ext==1.2.2,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,keystoneauth1==5.3.0,lxml==4.9.3,MarkupSafe==2.1.3,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,objectpath==0.6.1,openstacksdk==1.5.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.i18n==6.1.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,osmclient @ git+https://osm.etsi.org/gerrit/osm/osmclient.git@99ae2a1db48f91083dec4bef431814966a13ebbb,outcome==1.2.0,packaging==23.1,paramiko==3.3.1,pathspec==0.11.2,pbr==5.11.1,platformdirs==4.1.0,ply==3.11,prettytable==3.9.0,pyang==2.5.3,pyangbind==0.8.3.post1,pycparser==2.21,pyjsonselect==0.2.2,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==9.4.0,python-dateutil==2.9.0.post0,python-keystoneclient==5.2.0,python-magic==0.4.27,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,PyYAML==6.0.1,referencing==0.30.2,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,robotframework==6.1.1,robotframework-jsonlibrary==0.5,robotframework-jsonvalidator==2.0.0,robotframework-lint==1.1,robotframework-pythonlibcore==4.2.0,robotframework-requests==0.9.5,robotframework-robocop==4.2.2,robotframework-seleniumlibrary==6.1.2,robotframework-sshlibrary==3.8.0,robotframework-yamllibrary==0.2.8,rpds-py==0.10.3,scp==0.14.5,selenium==4.13.0,simplejson==3.19.1,six==1.16.0,sniffio==1.3.0,sortedcontainers==2.4.0,stevedore==5.1.0,-e git+https://osm.etsi.org/gerrit/osm/tests.git@12216a618050975ff83f82ef03d7ce4cc03af627#egg=tests,tomli==2.0.1,tomlkit==0.12.1,trio==0.22.2,trio-websocket==0.11.1,typing_extensions==4.8.0,tzdata==2023.3,urllib3==2.0.5,verboselogs==1.7,wcwidth==0.2.6,wrapt==1.15.0,wsproto==1.2.0,xmltodict==0.13.0,yq==3.2.3,zipp==3.17.0
rflint run-test-pre: PYTHONHASHSEED='2862328884'
rflint run-test: commands[0] | rflint --ignore LineTooLong --ignore TooFewTestSteps --ignore TooManyTestCases --ignore TooManyTestSteps --ignore TooFewKeywordSteps testsuite lib resources
rflint run-test: commands[1] | robocop --configure return_status:quality_gate:E=0:W=0:I=0 --exclude '050*,0701,0923' .
✔ OK safety in 1 minute, 1.824 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/tests-stage_2_master@2/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/tests-stage_2_master@2
safety installed: annotated-types==0.7.0,appdirs==1.4.4,argcomplete==3.1.2,attrs==23.1.0,Authlib==1.3.1,autopage==0.5.1,bcrypt==4.0.1,bitarray==2.8.1,certifi==2023.7.22,cffi==1.15.1,charset-normalizer==3.2.0,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,cryptography==41.0.4,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,dparse==0.6.4b0,enum34==1.1.10,exceptiongroup==1.1.3,h11==0.14.0,haikunator==2.1.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,Jinja2==3.1.4,jmespath==1.0.1,jsonpatch==1.33,jsonpath-ng==1.6.0,jsonpath-rw==1.4.0,jsonpath-rw-ext==1.2.2,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,keystoneauth1==5.3.0,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.5,marshmallow==3.21.3,mdurl==0.1.2,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,objectpath==0.6.1,openstacksdk==1.5.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.i18n==6.1.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,outcome==1.2.0,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,ply==3.11,prettytable==3.9.0,pyang==2.5.3,pyangbind==0.8.3.post1,pycparser==2.21,pydantic==2.7.4,pydantic_core==2.18.4,Pygments==2.18.0,pyjsonselect==0.2.2,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==9.4.0,python-keystoneclient==5.2.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,PyYAML==6.0.1,referencing==0.30.2,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.1,robotframework==6.1.1,robotframework-jsonlibrary==0.5,robotframework-jsonvalidator==2.0.0,robotframework-pythonlibcore==4.2.0,robotframework-requests==0.9.5,robotframework-seleniumlibrary==6.1.2,robotframework-sshlibrary==3.8.0,robotframework-yamllibrary==0.2.8,rpds-py==0.10.3,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.3,safety-schemas==0.0.2,scp==0.14.5,selenium==4.13.0,shellingham==1.5.4,simplejson==3.19.1,six==1.16.0,sniffio==1.3.0,sortedcontainers==2.4.0,stevedore==5.1.0,-e git+https://osm.etsi.org/gerrit/osm/tests.git@12216a618050975ff83f82ef03d7ce4cc03af627#egg=tests,tomli==2.0.1,tomlkit==0.12.1,trio==0.22.2,trio-websocket==0.11.1,typer==0.12.3,typing_extensions==4.8.0,tzdata==2023.3,urllib3==2.0.5,verboselogs==1.7,wcwidth==0.2.6,wrapt==1.15.0,wsproto==1.2.0,xmltodict==0.13.0,yq==3.2.3,zipp==3.17.0
safety run-test-pre: PYTHONHASHSEED='2380867571'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.2.3[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/bin
-> /usr/lib/python3.10
-> /usr/lib/python310.zip
-> /home/jenkins/workspace/tests-stage_2_master@2
-> /usr/lib/python3.10/lib-dynload
-> /tmp/.tox/safety/lib/python3.10/site-packages
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 121 packages[0m
Timestamp [1m2024-06-23 04:24:23[0m
[1m 14[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 2.0.5[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m>=2.0.0a1,<2.0.7
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in requests version 2.31.0[0m
[1m Vulnerability ID: [0m71064
[1m Affected spec: [0m<2.32.2
[1m ADVISORY: [0mAffected versions of Requests, when making requests
through a Requests `Session`, if the first request is made with
`verify=False` to disable cert verification, all subsequent requests to
the same host will continue to ignore cert verification regardless of
changes to the value of `verify`. This behavior will continue for the
lifecycle of the connection in the connection pool. Requests 2.32.0 fixes
the issue, but versions 2.32.0 and 2.32.1 were yanked due to conflicts
with CVE-2024-35195 mitigation.
[1m CVE-2024-35195[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/71064/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 71064 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mAffected versions of Pip are vulnerable to Command
Injection. When installing a package from a Mercurial VCS URL (ie "pip
install hg+...") with pip prior to v23.3, the specified Mercurial revision
could be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not affect
users who aren't installing from Mercurial.
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in paramiko version 3.3.1[0m
[1m Vulnerability ID: [0m65193
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mParamiko's core implementation of the SSH transport
protocol, including certain OpenSSH extensions used before OpenSSH 9.6, is
vulnerable to a "Terrapin attack." This vulnerability allows remote
attackers to manipulate packet integrity during the handshake phase,
potentially leading to security downgrades or disabled features in SSH
connections. Specific attacks target the use of ChaCha20-Poly1305 and CBC
with Encrypt-then-MAC, where sequence numbers and integrity checks are
improperly managed. This issue particularly affects the
chacha20-poly1305@openssh.com and -etm@openssh.com MAC algorithms.
[1m CVE-2023-48795[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65193/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65193 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in paramiko version 3.3.1[0m
[1m Vulnerability ID: [0m63227
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mParamiko 3.4.0 has been released to fix vulnerabilities
affecting encrypt-then-MAC digest algorithms in tandem with CBC ciphers,
and ChaCha20-poly1305. The fix requires cooperation from both ends of the
connection, making it effective when the remote end is OpenSSH >= 9.6 and
configured to use the new “strict kex” mode. For further details, refer to
the official Paramiko documentation or GitHub
repository.https://github.com/advisories/GHSA-45x7-px36-x8w8
[1m CVE-2023-48795[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/63227/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 63227 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in jinja2 version 3.1.4[0m
[1m Vulnerability ID: [0m70612
[1m Affected spec: [0m>=0
[1m ADVISORY: [0mIn Jinja2, the from_string function is prone to Server
Side Template Injection (SSTI) where it takes the "source" parameter as a
template object, renders it, and then returns it. The attacker can exploit
it with {{INJECTION COMMANDS}} in a URI. NOTE: The maintainer and multiple
third parties believe that this vulnerability isn't valid because users
shouldn't use untrusted templates without sandboxing.
[1m CVE-2019-8341[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/70612/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 70612 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in idna version 3.4[0m
[1m Vulnerability ID: [0m67895
[1m Affected spec: [0m<3.7
[1m ADVISORY: [0mCVE-2024-3651 impacts the idna.encode() function, where
a specially crafted argument could lead to significant resource
consumption, causing a denial-of-service. In version 3.7, this function
has been updated to reject such inputs efficiently, minimizing resource
use. A practical workaround involves enforcing a maximum domain name
length of 253 characters before encoding, as the vulnerability is
triggered by unusually large inputs that normal operations wouldn't
encounter.
[1m CVE-2024-3651[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67895/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67895 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65647
[1m Affected spec: [0m<42.0.5
[1m ADVISORY: [0mCryptography version 42.0.5 introduces a limit on the
number of name constraint checks during X.509 path validation to prevent
denial of service attacks.https://github.com/pyca/cryptography/commit/4be5
3bf20cc90cbac01f5f94c5d1aecc5289ba1f
[1m PVE-2024-65647[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65647/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65647 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62556/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66777
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mCVE-2023-6237 addresses a vulnerability in RSA public
key verification where checking a large, incorrect RSA key with
EVP_PKEY_public_check() could take an excessive amount of time. This is
due to no size limit on the RSA public key and an unnecessarily high
number of Miller-Rabin rounds for modulus non-primality checks. The fix
sets a maximum key size of 16384 bits and reduces Miller-Rabin rounds to
5, enhancing security and performance by preventing the
RSA_R_MODULUS_TOO_LARGE error.
[1m CVE-2023-6237[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66777/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66777 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC
CPUs, which allows an attacker to disrupt the application's state. This
disruption might result in false calculations or cause a denial of
service. The vulnerability's exploitation hinges on the attacker's ability
to alter the algorithm's application and the dependency of the software on
non-volatile XMM registers.https://github.com/pyca/cryptography/commit/89d
0d56fb104ac4e0e6db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65212/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65212 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66704
[1m Affected spec: [0m>=38.0.0,<42.0.4
[1m ADVISORY: [0mcryptography is a package designed to expose
cryptographic primitives and recipes to Python developers. Starting in
version 38.0.0 and before version 42.0.4, if
`pkcs12.serialize_key_and_certificates` is called with both a certificate
whose public key did not match the provided private key and an
`encryption_algorithm` with `hmac_hash` set (via
`PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL
pointer dereference would occur, crashing the Python process. This has
been resolved in version 42.0.4, the first version in which a `ValueError`
is properly raised.
[1m CVE-2024-26130[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66704/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66704 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package.
This issue may allow a remote attacker to decrypt captured messages in TLS
servers that use RSA key exchanges, which may lead to exposure of
confidential or sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65278/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65278 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
14 vulnerabilities were reported in 8 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 14 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
pylint: commands succeeded
rflint: commands succeeded
safety: commands succeeded
congratulations :)
[Pipeline] fileExists
[Pipeline] fileExists
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Build)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ runuser jenkins -c devops-stages/stage-build.sh
dpkg-source --before-build .
fakeroot debian/rules clean
dpkg-source -b .
debian/rules build
fakeroot debian/rules binary
dpkg-genbuildinfo -O../osm-tests_9.0.0rc1.post210+g12216a6-1_amd64.buildinfo
dpkg-genchanges -O../osm-tests_9.0.0rc1.post210+g12216a6-1_amd64.changes
fakeroot debian/rules clean
dpkg-source --after-build .
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Archive)
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ runuser jenkins -c mkdir -p changelog
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ runuser jenkins -c devops/tools/generatechangelog-pipeline.sh > changelog/changelog-tests.html
[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ runuser jenkins -c devops-stages/stage-archive.sh
[Pipeline] getArtifactoryServer
[Pipeline] newBuildInfo
[Pipeline] artifactoryUpload
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-tests/master-staging/992/pool/tests/osm-tests_9.0.0rc1.post210%2Bg12216a6-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-tests/master-staging/992/changelog/changelog-tests.html[Pipeline] publishBuildInfo
Deploying build info to: https://artifactory-osm.etsi.org/artifactory/api/build
Deploying build descriptor to: https://artifactory-osm.etsi.org/artifactory/api/build
Build successfully deployed. Browse it in Artifactory under https://artifactory-osm.etsi.org/artifactory/webapp/builds/tests-stage_2%20::%20master/992[Pipeline] sh
[tests-stage_2_master@2] Running shell script
+ env
[Pipeline] step
Archiving artifacts
Recording fingerprints
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 8230c783451828b4322696d5c9518d7e0cd1de0e69e7b124fe65e37c4e30fc9e
$ docker rm -f 8230c783451828b4322696d5c9518d7e0cd1de0e69e7b124fe65e37c4e30fc9e
[Pipeline] // withDockerContainer
[Pipeline] stage
[Pipeline] { (Build System)
[Pipeline] build (Building osm-stage_3 » master)
Scheduling project: osm-stage_3 » master
Starting building: osm-stage_3 » master #12671[Pipeline] }
[Pipeline] // stage
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: osm-stage_3 » master #12671 completed with status UNSTABLE (propagate: false to ignore)
Finished: FAILURE