Started by upstream project "buildall-stage_2-merge-master" build number 435
originally caused by:
Started by timer
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/MON.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/MON.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --force --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/bug1511
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7928
Seen branch in repository origin/master
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/rift300
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen 24 remote branches
Obtained Jenkinsfile from 1e6e756218d1f398d4545c0d51ed78a35ac370f7
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Still waiting to schedule task
Waiting for next available executor on ‘stage_2’
Running on osm-cicd-3 in /home/jenkins/workspace/MON-stage_2-merge_master
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/MON.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/MON.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/MON.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 1e6e756218d1f398d4545c0d51ed78a35ac370f7 (master)
> git config core.sparsecheckout # timeout=10
> git checkout -f 1e6e756218d1f398d4545c0d51ed78a35ac370f7
Commit message: "Fix improper restriction of XMl External Entity Reference, by using lxml"
> git rev-list --no-walk 1e6e756218d1f398d4545c0d51ed78a35ac370f7 # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/MON-stage_2-merge_master/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/master^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision abf6770c2ec33d6ae0b1fb93be1093081abb5a9f (refs/remotes/origin/master)
> git config core.sparsecheckout # timeout=10
> git checkout -f abf6770c2ec33d6ae0b1fb93be1093081abb5a9f
> git branch -a -v --no-abbrev # timeout=10
> git branch -D master # timeout=10
> git checkout -b master abf6770c2ec33d6ae0b1fb93be1093081abb5a9f
Commit message: "Feature 11010: Use of upstream helm charts for Prometheus and Grafana in OSM installation."
> git rev-list --no-walk 7abbfd5aed5bd744d5f49ee834f89822136ca6cc # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 24503 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/754/display/redirect?page=changes
GERRIT_PROJECT=osm/MON
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/754/
HUDSON_COOKIE=719ee2fb-0d76-4293-b288-90b05eebde64
JENKINS_SERVER_COOKIE=durable-b9008e46b94dcdf0b27b851dabdd0c8e
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=1e6e756218d1f398d4545c0d51ed78a35ac370f7
WORKSPACE=/home/jenkins/workspace/MON-stage_2-merge_master
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=master
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/754/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=3
XDG_SESSION_ID=3541
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/754/display/redirect?page=tests
BUILD_DISPLAY_NAME=#754
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=master
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=754
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-MON-stage_2-merge-master-754
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/
BUILD_NUMBER=754
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/754/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/16/14316/1
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/master/display/redirect
JOB_NAME=MON-stage_2-merge/master
TEST_INSTALL=false
PWD=/home/jenkins/workspace/MON-stage_2-merge_master
SSH_CONNECTION=212.234.161.1 24503 172.21.249.3 22
BRANCH_NAME=master
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ git fetch --tags
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ git fetch origin refs/changes/16/14316/1
From https://osm.etsi.org/gerrit/osm/MON
* branch refs/changes/16/14316/1 -> FETCH_HEAD
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ git checkout -f 1e6e756218d1f398d4545c0d51ed78a35ac370f7
HEAD is now at 1e6e756 Fix improper restriction of XMl External Entity Reference, by using lxml
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .eggs/
Removing .local/
Removing .safety/
Removing cover/
Removing coverage.xml
Removing nosetests.xml
Removing osm_mon.egg-info/
Removing vcd_pysdk.log
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
No releasenote check present
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/mon-master .
Sending build context to Docker daemon 155.9MB
Step 1/6 : FROM ubuntu:22.04
---> 52882761a72a
Step 2/6 : ARG APT_PROXY
---> Using cache
---> d8be122d3e42
Step 3/6 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> 80bcbdac0f70
Step 4/6 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools python3-pip tox
---> Using cache
---> 48099a4425a1
Step 5/6 : ENV LC_ALL C.UTF-8
---> Using cache
---> 45d36c1e4798
Step 6/6 : ENV LANG C.UTF-8
---> Using cache
---> a582202f7242
Successfully built a582202f7242
Successfully tagged osm/mon-master:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ id -u
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/MON-stage_2-merge_master -v /home/jenkins/workspace/MON-stage_2-merge_master:/home/jenkins/workspace/MON-stage_2-merge_master:rw,z -v /home/jenkins/workspace/MON-stage_2-merge_master@tmp:/home/jenkins/workspace/MON-stage_2-merge_master@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/mon-master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/MON-stage_2-merge_master -r -g jenkins jenkins
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[MON-stage_2-merge_master] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
✔ OK black in 6.904 seconds
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.2,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='413439795'
black run-test: commands[0] | black --check --diff osm_mon/
All done! ✨ 🍰 ✨
82 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! ✨ 🍰 ✨
1 file would be left unchanged.
✔ OK flake8 in 9.381 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8
flake8 develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
flake8 installed: flake8==7.0.0,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,pycodestyle==2.11.1,pyflakes==3.2.0
flake8 run-test-pre: PYTHONHASHSEED='647434770'
flake8 run-test: commands[0] | flake8 osm_mon/ setup.py
✔ OK safety in 1 minute, 32.322 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
safety installed: aiokafka==0.8.1,annotated-types==0.7.0,appdirs==1.4.4,async-timeout==4.0.3,attrs==23.1.0,Authlib==1.3.0,autopage==0.5.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,cryptography==41.0.4,cycler==0.12.0,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,dparse==0.6.4b0,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,Jinja2==3.1.4,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.5,marshmallow==3.21.2,matplotlib==3.8.0,mdurl==0.1.2,msgpack==1.0.7,netaddr==0.9.0,netifaces==0.11.0,numpy==1.26.0,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,pbr==5.11.1,Pillow==10.0.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,pycparser==2.21,pydantic==2.7.1,pydantic_core==2.18.2,Pygments==2.16.1,pyinotify==0.9.6,pyparsing==3.1.1,pyperclip==1.8.2,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tomli==2.0.1,typer==0.12.3,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,wrapt==1.15.0,zipp==3.17.0
safety run-test-pre: PYTHONHASHSEED='3290732670'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.2.0[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /usr/lib/python3.10
-> /usr/lib/python3.10/lib-dynload
-> /home/jenkins/workspace/MON-stage_2-merge_master
-> /tmp/.tox/safety/lib/python3.10/site-packages
-> /usr/lib/python310.zip
-> /tmp/.tox/safety/bin
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 108 packages[0m
Timestamp [1m2024-05-21 09:04:23[0m
[1m 16[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 2.0.5[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m>=2.0.0a1,<2.0.7
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mAffected versions of Pip are vulnerable to Command
Injection. When installing a package from a Mercurial VCS URL (ie "pip
install hg+...") with pip prior to v23.3, the specified Mercurial revision
could be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not affect
users who aren't installing from Mercurial.
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m67599
[1m Affected spec: [0m>=0
[1m ADVISORY: [0m** DISPUTED ** An issue was discovered in pip (all
versions) because it installs the version with the highest version number,
even if the user had intended to obtain a private package from a private
index. This only affects use of the --extra-index-url option, and
exploitation requires that the package does not already exist in the
public index (and thus the attacker can put the package there with an
arbitrary version number). NOTE: it has been reported that this is
intended functionality and the user is responsible for using --extra-
index-url securely.
[1m CVE-2018-20225[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67599/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67599 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in idna version 3.4[0m
[1m Vulnerability ID: [0m67895
[1m Affected spec: [0m<3.7
[1m ADVISORY: [0mCVE-2024-3651 impacts the idna.encode() function, where
a specially crafted argument could lead to significant resource
consumption, causing a denial-of-service. In version 3.7, this function
has been updated to reject such inputs efficiently, minimizing resource
use. A practical workaround involves enforcing a maximum domain name
length of 253 characters before encoding, as the vulnerability is
triggered by unusually large inputs that normal operations wouldn't
encounter.
[1m CVE-2024-3651[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67895/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67895 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in fonttools version 4.42.1[0m
[1m Vulnerability ID: [0m65095
[1m Affected spec: [0m>=0,<4.43.0
[1m ADVISORY: [0mfontTools is a library for manipulating fonts, written
in Python. The subsetting module has a XML External Entity Injection (XXE)
vulnerability which allows an attacker to resolve arbitrary entities when
a candidate font (OT-SVG fonts), which contains a SVG table, is parsed.
This allows attackers to include arbitrary files from the filesystem
fontTools is running on or make web requests from the host system. This
vulnerability has been patched in version 4.43.0.
[1m CVE-2023-45139[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65095/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65095 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in fonttools version 4.42.1[0m
[1m Vulnerability ID: [0m61503
[1m Affected spec: [0m>=4.28.2,<4.43.0
[1m ADVISORY: [0mFonttools is affected by a XML External Entity Injection
(XXE) Vulnerability. As of fonttools>=4.28.2 the subsetting module has a
XML External Entity Injection (XXE) vulnerability which allows an attacker
to resolve arbitrary entities when a candidate font (OT-SVG fonts), which
contains a SVG table, is parsed. This allows attackers to include
arbitrary files from the filesystem fontTools is running on or make web
requests from the host system.
[1m CVE-2023-45139[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61503/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61503 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62556/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC
CPUs, which allows an attacker to disrupt the application's state. This
disruption might result in false calculations or cause a denial of
service. The vulnerability's exploitation hinges on the attacker's ability
to alter the algorithm's application and the dependency of the software on
non-volatile XMM registers.https://github.com/pyca/cryptography/commit/89d
0d56fb104ac4e0e6db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65212/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65212 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66777
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mCVE-2023-6237 addresses a vulnerability in RSA public
key verification where checking a large, incorrect RSA key with
EVP_PKEY_public_check() could take an excessive amount of time. This is
due to no size limit on the RSA public key and an unnecessarily high
number of Miller-Rabin rounds for modulus non-primality checks. The fix
sets a maximum key size of 16384 bits and reduces Miller-Rabin rounds to
5, enhancing security and performance by preventing the
RSA_R_MODULUS_TOO_LARGE error.
[1m CVE-2023-6237[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66777/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66777 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65647
[1m Affected spec: [0m<42.0.5
[1m ADVISORY: [0mCryptography version 42.0.5 introduces a limit on the
number of name constraint checks during X.509 path validation to prevent
denial of service attacks.https://github.com/pyca/cryptography/commit/4be5
3bf20cc90cbac01f5f94c5d1aecc5289ba1f
[1m PVE-2024-65647[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65647/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65647 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66704
[1m Affected spec: [0m>=38.0.0,<42.0.4
[1m ADVISORY: [0mcryptography is a package designed to expose
cryptographic primitives and recipes to Python developers. Starting in
version 38.0.0 and before version 42.0.4, if
`pkcs12.serialize_key_and_certificates` is called with both a certificate
whose public key did not match the provided private key and an
`encryption_algorithm` with `hmac_hash` set (via
`PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL
pointer dereference would occur, crashing the Python process. This has
been resolved in version 42.0.4, the first version in which a `ValueError`
is properly raised.
[1m CVE-2024-26130[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66704/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66704 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package.
This issue may allow a remote attacker to decrypt captured messages in TLS
servers that use RSA key exchanges, which may lead to exposure of
confidential or sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65278/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65278 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 10.0.1[0m
[1m Vulnerability ID: [0m64437
[1m Affected spec: [0m<10.2.0
[1m ADVISORY: [0mPillow is potentially vulnerable to DoS attacks through
PIL.ImageFont.ImageFont.getmask(). A decompression bomb check has also
been added to the affected
function.https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html
[1m PVE-2024-64437[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64437/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64437 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 10.0.1[0m
[1m Vulnerability ID: [0m64436
[1m Affected spec: [0m<10.2.0
[1m ADVISORY: [0mPillow is affected by an arbitrary code execution
vulnerability. If an attacker has control over the keys passed to the
environment argument of PIL.ImageMath.eval(), they may be able to execute
arbitrary
code.https://pillow.readthedocs.io/en/stable/releasenotes/10.2.0.html
[1m CVE-2023-50447[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64436/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64436 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 10.0.1[0m
[1m Vulnerability ID: [0m67136
[1m Affected spec: [0m<10.3.0
[1m ADVISORY: [0mPillow 10.3.0 introduces a security update addressing
CVE-2024-28219 by replacing certain functions with strncpy to prevent
buffer overflow issues.
[1m CVE-2024-28219[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67136/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67136 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
16 vulnerabilities were reported in 7 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 16 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
✔ OK cover in 2 minutes, 10.852 seconds
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-test.txt
cover develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
cover installed: aiokafka==0.8.1,appdirs==1.4.4,async-timeout==4.0.3,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,coverage==7.3.1,cryptography==41.0.4,cycler==0.12.0,dataclasses==0.6,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dnspython==2.4.2,dogpile.cache==1.2.2,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,google-auth==2.17.3,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,kubernetes==26.1.0,lxml==4.9.3,macaroonbakery==1.3.1,matplotlib==3.8.0,mock==5.1.0,motor==3.3.1,msgpack==1.0.7,mypy-extensions==1.0.0,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8#egg=N2VC,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,numpy==1.26.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,paramiko==2.12.0,pbr==5.11.1,Pillow==10.0.1,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requests-mock==1.11.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,theblues==0.5.2,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,websocket-client==1.6.3,websockets==11.0.3,wrapt==1.15.0,zipp==3.17.0
cover run-test-pre: PYTHONHASHSEED='381217901'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage osm_mon
...............ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get Metrics data from vROPS for 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Exception while parsing metrics data from vROPS Extra data: line 1 column 5 (char 4)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 170, in get_metrics
m_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.10/json/__init__.py", line 346, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.10/json/decoder.py", line 340, in decode
raise JSONDecodeError("Extra data", s, end)
json.decoder.JSONDecodeError: Extra data: line 1 column 5 (char 4)
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:get_vm_resource_id: Error in parsing Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 104, in get_vm_resource_list_from_vrops
resp_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.10/json/__init__.py", line 346, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.10/json/decoder.py", line 337, in decode
obj, end = self.raw_decode(s, idx=_w(s, 0).end())
File "/usr/lib/python3.10/json/decoder.py", line 353, in raw_decode
obj, end = self.scan_once(s, idx)
json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
..ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to find vm_moref_id from vApp UUID: 1234
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred while getting VM moref ID for VM: Testing
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vmware.py", line 114, in get_vm_moref_id
vm_details = self.get_vapp_details_rest(vapp_uuid)
File "<string>", line 3, in get_vapp_details_rest
File "/usr/lib/python3.10/unittest/mock.py", line 1114, in __call__
return self._mock_call(*args, **kwargs)
File "/usr/lib/python3.10/unittest/mock.py", line 1118, in _mock_call
return self._execute_mock_call(*args, **kwargs)
File "/usr/lib/python3.10/unittest/mock.py", line 1173, in _execute_mock_call
raise effect
Exception: Testing
...ERROR:osm_mon.collector.vnf_collectors.vmware:REST API call https://vcd/api/vApp/vapp- failed. Return status code b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred for getting vApp details: Start tag expected, '<' not found, line 1, column 1 (<string>, line 1)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_master/osm_mon/collector/vnf_collectors/vmware.py", line 177, in get_vapp_details_rest
xmlroot_respond = XmlElementTree.fromstring(response.content)
File "src/lxml/etree.pyx", line 3257, in lxml.etree.fromstring
File "src/lxml/parser.pxi", line 1916, in lxml.etree._parseMemoryDocument
File "src/lxml/parser.pxi", line 1803, in lxml.etree._parseDoc
File "src/lxml/parser.pxi", line 1144, in lxml.etree._BaseParser._parseDoc
File "src/lxml/parser.pxi", line 618, in lxml.etree._ParserContext._handleParseResultDoc
File "src/lxml/parser.pxi", line 728, in lxml.etree._handleParseResult
File "src/lxml/parser.pxi", line 657, in lxml.etree._raiseParseError
File "<string>", line 1
lxml.etree.XMLSyntaxError: Start tag expected, '<' not found, line 1, column 1
.ERROR:osm_mon.collector.vnf_collectors.vmware:Can't connect to a vCloud director as: with exception HTTPSConnectionPool(host='vcd', port=443): Max retries exceeded with url: /api/versions (Caused by NameResolutionError("<urllib3.connection.HTTPSConnection object at 0x7f5a4de51b70>: Failed to resolve 'vcd' ([Errno -2] Name or service not known)"))
ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to connect to vCD
................WARNING:osm_mon.evaluator.service:No metric result for alarm <Mock name='mock.uuid' id='140025830730256'>
................
----------------------------------------------------------------------
Ran 65 tests in 1.055s
OK
Name Stmts Miss Cover
----------------------------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 32 32 0%
osm_mon/cmd/mon_utils.py 46 46 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 28 28 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 134 115 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 71 56 21%
osm_mon/collector/vnf_collectors/openstack.py 214 117 45%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 97 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 18 2 89%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 99 99 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 51 21 59%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 61 61 0%
osm_mon/server/service.py 22 22 0%
osm_mon/tests/__init__.py 0 0 100%
osm_mon/tests/unit/__init__.py 0 0 100%
osm_mon/tests/unit/collector/__init__.py 0 0 100%
osm_mon/tests/unit/collector/test_collector.py 8 3 62%
osm_mon/tests/unit/collector/test_collector_service.py 51 0 100%
osm_mon/tests/unit/collector/utils/__init__.py 0 0 100%
osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100%
osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100%
osm_mon/tests/unit/core/__init__.py 0 0 100%
osm_mon/tests/unit/core/test_common_db_client.py 71 0 100%
osm_mon/tests/unit/core/test_message_bus_client.py 40 1 98%
osm_mon/tests/unit/evaluator/__init__.py 0 0 100%
osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100%
osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100%
osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100%
osm_mon/tests/unit/server/__init__.py 0 0 100%
osm_mon/tests/unit/server/test_server_service.py 10 0 100%
----------------------------------------------------------------------------------------------
TOTAL 2918 1330 54%
cover run-test: commands[3] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
----------------------------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 32 32 0%
osm_mon/cmd/mon_utils.py 46 46 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 28 28 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 134 115 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 71 56 21%
osm_mon/collector/vnf_collectors/openstack.py 214 117 45%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 97 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 18 2 89%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 99 99 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 51 21 59%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 61 61 0%
osm_mon/server/service.py 22 22 0%
osm_mon/tests/__init__.py 0 0 100%
osm_mon/tests/unit/__init__.py 0 0 100%
osm_mon/tests/unit/collector/__init__.py 0 0 100%
osm_mon/tests/unit/collector/test_collector.py 8 3 62%
osm_mon/tests/unit/collector/test_collector_service.py 51 0 100%
osm_mon/tests/unit/collector/utils/__init__.py 0 0 100%
osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100%
osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100%
osm_mon/tests/unit/core/__init__.py 0 0 100%
osm_mon/tests/unit/core/test_common_db_client.py 71 0 100%
osm_mon/tests/unit/core/test_message_bus_client.py 40 1 98%
osm_mon/tests/unit/evaluator/__init__.py 0 0 100%
osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100%
osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100%
osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100%
osm_mon/tests/unit/server/__init__.py 0 0 100%
osm_mon/tests/unit/server/test_server_service.py 10 0 100%
----------------------------------------------------------------------------------------------
TOTAL 2918 1330 54%
cover run-test: commands[4] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[5] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/pylint/log/pylint-0.log
================================== log start ===================================
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_master/requirements-test.txt, pylint
pylint develop-inst: /home/jenkins/workspace/MON-stage_2-merge_master
pylint installed: aiokafka==0.8.1,appdirs==1.4.4,astroid==3.2.2,async-timeout==4.0.3,attrs==23.1.0,autopage==0.5.1,bcrypt==4.0.1,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cliff==4.3.0,cmd2==2.4.3,contourpy==1.1.1,coverage==7.3.1,cryptography==41.0.4,cycler==0.12.0,dataclasses==0.6,dateparser==1.1.8,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dnspython==2.4.2,dogpile.cache==1.2.2,fonttools==4.42.1,futurist==2.4.1,gnocchiclient==7.0.8,google-auth==2.17.3,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,iso8601==2.0.0,isort==5.13.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,juju==2.9.44.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.3.0,kiwisolver==1.4.5,kubernetes==26.1.0,lxml==4.9.3,macaroonbakery==1.3.1,matplotlib==3.8.0,mccabe==0.7.0,mock==5.1.0,motor==3.3.1,msgpack==1.0.7,mypy-extensions==1.0.0,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@f5b7f4147a9d0ebff0a35de08ae9a9c22ee87de8#egg=N2VC,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,numpy==1.26.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@1e6e756218d1f398d4545c0d51ed78a35ac370f7#egg=osm_mon,packaging==23.1,pandas==2.1.1,paramiko==2.12.0,pbr==5.11.1,Pillow==10.0.1,platformdirs==4.2.2,prettytable==0.7.2,prometheus-api-client==0.5.4,prometheus-client==0.17.1,protobuf==3.20.3,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,pylint==3.2.2,pymacaroons==0.13.0,pymongo==4.5.0,PyNaCl==1.5.0,pyparsing==3.1.1,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,pytz==2023.3.post1,pyvcloud==23.0.4,PyYAML==6.0.1,regex==2023.8.8,requests==2.31.0,requests-mock==1.11.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.5,toposort==1.10,typing-inspect==0.9.0,typing_extensions==4.8.0,tzdata==2023.3,tzlocal==5.0.1,ujson==5.8.0,unittest-xml-reporting==3.2.0,urllib3==2.0.5,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.7,websocket-client==1.6.3,websockets==11.0.3,wrapt==1.15.0,zipp==3.17.0
pylint run-test-pre: PYTHONHASHSEED='389248510'
pylint run-test: commands[0] | pylint -E osm_mon
************* Module osm_mon.collector.infra_collectors.vmware
osm_mon/collector/infra_collectors/vmware.py:124:63: E0606: Possibly using variable 'org_uuid' before assignment (possibly-used-before-assignment)
ERROR: InvocationError for command /tmp/.tox/pylint/bin/pylint -E osm_mon (exited with code 2)
=================================== log end ====================================
✖ FAIL pylint in 2 minutes, 21.373 seconds
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
ERROR: pylint: parallel child exit code 1
safety: commands succeeded
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 b491522a3dd4fb9801bf239138f8666e81cf09eaba757a351ac033364b64cbaa
$ docker rm -f b491522a3dd4fb9801bf239138f8666e81cf09eaba757a351ac033364b64cbaa
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE