Started by upstream project "buildall-stage_2-merge-v10" build number 307
originally caused by:
Started by user garciadeblas
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/RO.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/5962-rebase
Seen branch in repository origin/Azure
Seen branch in repository origin/GCP
Seen branch in repository origin/WIM
Seen branch in repository origin/bug1511
Seen branch in repository origin/contrail
Seen branch in repository origin/feature1429
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7148
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/fog
Seen branch in repository origin/lcm
Seen branch in repository origin/master
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/py3
Seen branch in repository origin/python3
Seen branch in repository origin/rift300
Seen branch in repository origin/snapcraft
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v1.0
Seen branch in repository origin/v1.1
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v2.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen branch in repository origin/vio
Seen branch in repository origin/vnffg
Seen 42 remote branches
Obtained Jenkinsfile from 33b7503d75a1f44f782224be5cadcbed9bd3d03c
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-3 in /home/jenkins/workspace/RO-stage_2-merge_v10.0
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/RO.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/RO.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 33b7503d75a1f44f782224be5cadcbed9bd3d03c (v10.0)
> git config core.sparsecheckout # timeout=10
> git checkout -f 33b7503d75a1f44f782224be5cadcbed9bd3d03c
Commit message: "Pin flake8 version in tox.ini to 6.1.0"
> git rev-list --no-walk 33b7503d75a1f44f782224be5cadcbed9bd3d03c # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/RO-stage_2-merge_v10.0/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/v10.0^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/v10.0^{commit} # timeout=10
Checking out Revision f92f3137aeecbc88d221f44b7e992af1f5e116aa (refs/remotes/origin/v10.0)
> git config core.sparsecheckout # timeout=10
> git checkout -f f92f3137aeecbc88d221f44b7e992af1f5e116aa
> git branch -a -v --no-abbrev # timeout=10
> git branch -D v10.0 # timeout=10
> git checkout -b v10.0 f92f3137aeecbc88d221f44b7e992af1f5e116aa
Commit message: "Changing charmed installer to use 10.0/stable Fixing black error in keystone charm"
> git rev-list --no-walk f92f3137aeecbc88d221f44b7e992af1f5e116aa # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 13726 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/413/display/redirect?page=changes
GERRIT_PROJECT=osm/RO
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/413/
HUDSON_COOKIE=120893ea-9db1-4403-a774-f7483abad0a2
JENKINS_SERVER_COOKIE=durable-53c39a41410c50ef4db1d02f0124a0d9
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=33b7503d75a1f44f782224be5cadcbed9bd3d03c
WORKSPACE=/home/jenkins/workspace/RO-stage_2-merge_v10.0
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=v10.0
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/413/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=3
XDG_SESSION_ID=144
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/413/display/redirect?page=tests
BUILD_DISPLAY_NAME=#413
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=v10.0
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=413
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-RO-stage_2-merge-v10.0-413
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/
BUILD_NUMBER=413
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/413/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/68/14168/1
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v10.0/display/redirect
JOB_NAME=RO-stage_2-merge/v10.0
TEST_INSTALL=false
PWD=/home/jenkins/workspace/RO-stage_2-merge_v10.0
SSH_CONNECTION=212.234.161.1 13726 172.21.249.3 22
BRANCH_NAME=v10.0
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ git fetch --tags
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ git fetch origin refs/changes/68/14168/1
From https://osm.etsi.org/gerrit/osm/RO
* branch refs/changes/68/14168/1 -> FETCH_HEAD
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ git checkout -f 33b7503d75a1f44f782224be5cadcbed9bd3d03c
HEAD is now at 33b7503 Pin flake8 version in tox.ini to 6.1.0
[RO-stage_2-merge_v10.0] Running shell script
[Pipeline] sh
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .local/
Removing NG-RO/deb_dist/
Removing NG-RO/dist/
Removing NG-RO/osm_ng_ro-10.1.5.post6+g33b7503.tar.gz
Removing NG-RO/osm_ng_ro.egg-info/
Removing NG-RO/osm_ng_ro/requirements.txt
Removing RO-SDN-arista_cloudvision/deb_dist/
Removing RO-SDN-arista_cloudvision/dist/
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision.egg-info/
Removing RO-SDN-dpb/deb_dist/
Removing RO-SDN-dpb/dist/
Removing RO-SDN-dpb/osm_rosdn_dpb-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-dpb/osm_rosdn_dpb.egg-info/
Removing RO-SDN-dynpac/deb_dist/
Removing RO-SDN-dynpac/dist/
Removing RO-SDN-dynpac/osm_rosdn_dynpac-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-dynpac/osm_rosdn_dynpac.egg-info/
Removing RO-SDN-floodlight_openflow/deb_dist/
Removing RO-SDN-floodlight_openflow/dist/
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof.egg-info/
Removing RO-SDN-ietfl2vpn/deb_dist/
Removing RO-SDN-ietfl2vpn/dist/
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn.egg-info/
Removing RO-SDN-juniper_contrail/deb_dist/
Removing RO-SDN-juniper_contrail/dist/
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail.egg-info/
Removing RO-SDN-odl_openflow/deb_dist/
Removing RO-SDN-odl_openflow/dist/
Removing RO-SDN-odl_openflow/osm_rosdn_odlof-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-odl_openflow/osm_rosdn_odlof.egg-info/
Removing RO-SDN-onos_openflow/deb_dist/
Removing RO-SDN-onos_openflow/dist/
Removing RO-SDN-onos_openflow/osm_rosdn_onosof-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-onos_openflow/osm_rosdn_onosof.egg-info/
Removing RO-SDN-onos_vpls/deb_dist/
Removing RO-SDN-onos_vpls/dist/
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls-10.1.5.post6+g33b7503.tar.gz
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls.egg-info/
Removing RO-VIM-aws/deb_dist/
Removing RO-VIM-aws/dist/
Removing RO-VIM-aws/osm_rovim_aws-10.1.5.post6+g33b7503.tar.gz
Removing RO-VIM-aws/osm_rovim_aws.egg-info/
Removing RO-VIM-azure/deb_dist/
Removing RO-VIM-azure/dist/
Removing RO-VIM-azure/osm_rovim_azure-10.1.5.post6+g33b7503.tar.gz
Removing RO-VIM-azure/osm_rovim_azure.egg-info/
Removing RO-VIM-openstack/deb_dist/
Removing RO-VIM-openstack/dist/
Removing RO-VIM-openstack/osm_rovim_openstack-10.1.5.post6+g33b7503.tar.gz
Removing RO-VIM-openstack/osm_rovim_openstack.egg-info/
Removing RO-VIM-openvim/deb_dist/
Removing RO-VIM-openvim/dist/
Removing RO-VIM-openvim/osm_rovim_openvim-10.1.5.post6+g33b7503.tar.gz
Removing RO-VIM-openvim/osm_rovim_openvim.egg-info/
Removing RO-VIM-vmware/deb_dist/
Removing RO-VIM-vmware/dist/
Removing RO-VIM-vmware/osm_rovim_vmware-10.1.5.post6+g33b7503.tar.gz
Removing RO-VIM-vmware/osm_rovim_vmware.egg-info/
Removing RO-plugin/.eggs/
Removing RO-plugin/deb_dist/
Removing RO-plugin/dist/
Removing RO-plugin/osm_ro_plugin-10.1.5.post6+g33b7503.tar.gz
Removing RO-plugin/osm_ro_plugin.egg-info/
Removing build.env
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing dists/
Removing nosetests.xml
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
Not checking release notes for merge job
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ docker build -t osm/ro-v10.0 .
Sending build context to Docker daemon 64.13MB
Step 1/8 : FROM ubuntu:20.04
---> f78909c2b360
Step 2/8 : ARG APT_PROXY
---> Using cache
---> 8e46f58b9aac
Step 3/8 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> 35cfd9080839
Step 4/8 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools
---> Using cache
---> b0d8f6388d7c
Step 5/8 : RUN python3 -m easy_install pip==21.3.1
---> Using cache
---> 4559f6d4b8c1
Step 6/8 : RUN pip install tox==3.24.5
---> Using cache
---> 912496675db6
Step 7/8 : ENV LC_ALL C.UTF-8
---> Using cache
---> ef35bc28e4d8
Step 8/8 : ENV LANG C.UTF-8
---> Using cache
---> 29d5fada0533
Successfully built 29d5fada0533
Successfully tagged osm/ro-v10.0:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ id -u
[RO-stage_2-merge_v10.0] Running shell script
[Pipeline] sh
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/RO-stage_2-merge_v10.0 -v /home/jenkins/workspace/RO-stage_2-merge_v10.0:/home/jenkins/workspace/RO-stage_2-merge_v10.0:rw,z -v /home/jenkins/workspace/RO-stage_2-merge_v10.0@tmp:/home/jenkins/workspace/RO-stage_2-merge_v10.0@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/ro-v10.0
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/RO-stage_2-merge_v10.0 -r -g jenkins jenkins
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[RO-stage_2-merge_v10.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black
black installed: black==24.1.0,click==8.1.7,mypy-extensions==1.0.0,packaging==23.2,pathspec==0.12.1,platformdirs==4.1.0,tomli==2.0.1,typing_extensions==4.9.0
black run-test-pre: PYTHONHASHSEED='1242601937'
black run-test: commands[0] | black --check --diff NG-RO
--- /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/monitor.py 2024-01-26 08:37:03.650306+00:00
+++ /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/monitor.py 2024-01-26 08:37:36.027722+00:00
@@ -524,25 +524,25 @@
vdur_update (dict): Dictionary which keeps the differences of vdur
server (server): VM info
vdur_path (str): Path of VDUR in DB
"""
if server.status in openStackvmStatusOk:
- vdur_vim_info_update["vim_status"] = vdur_update[
- vdur_path + ".status"
- ] = server.status
+ vdur_vim_info_update["vim_status"] = vdur_update[vdur_path + ".status"] = (
+ server.status
+ )
else:
- vdur_vim_info_update["vim_status"] = vdur_update[
- vdur_path + ".status"
- ] = server.status
+ vdur_vim_info_update["vim_status"] = vdur_update[vdur_path + ".status"] = (
+ server.status
+ )
vdur_vim_info_update["vim_message"] = "VIM status reported " + server.status
vdur_vim_info_update["vim_details"] = self._get_server_info(server)
vdur_vim_info_update["vim_id"] = server.id
- vdur_vim_info_update["vim_name"] = vdur_update[
- vdur_path + ".name"
- ] = server.name
+ vdur_vim_info_update["vim_name"] = vdur_update[vdur_path + ".name"] = (
+ server.name
+ )
@staticmethod
def get_interface_info(
ports: dict, interface: dict, server: object
) -> Optional[dict]:
@@ -608,23 +608,23 @@
vnfr_update (dict): VDUR record path in DB
vnfr_id (str): VNFR ID
"""
current_ip_address = MonitorVms._get_current_ip_address(interface_info)
if current_ip_address:
- vdur_update[
- vdur_path + ".interfaces." + str(index) + ".ip-address"
- ] = current_ip_address
+ vdur_update[vdur_path + ".interfaces." + str(index) + ".ip-address"] = (
+ current_ip_address
+ )
if old_interface.get("mgmt_vdu_interface"):
vdur_update[vdur_path + ".ip-address"] = current_ip_address
if old_interface.get("mgmt_vnf_interface"):
vnfr_update[vnfr_id + ".ip-address"] = current_ip_address
- vdur_update[
- vdur_path + ".interfaces." + str(index) + ".mac-address"
- ] = interface_info.get("mac_address")
+ vdur_update[vdur_path + ".interfaces." + str(index) + ".mac-address"] = (
+ interface_info.get("mac_address")
+ )
@staticmethod
def _get_current_ip_address(interface_info: dict) -> Optional[str]:
if interface_info.get("fixed_ips") and interface_info["fixed_ips"][0]:
return interface_info["fixed_ips"][0].get("ip_address")
@@ -665,18 +665,22 @@
raise MonitorVmsException("Existing interfaces info could not found.")
vdur_vim_info_update["interfaces"][index].update(
{
"mac_address": interface_info["mac_address"],
- "ip_address": interface_info["fixed_ips"][0].get("ip_address")
- if interface_info.get("fixed_ips")
- else None,
+ "ip_address": (
+ interface_info["fixed_ips"][0].get("ip_address")
+ if interface_info.get("fixed_ips")
+ else None
+ ),
"vim_net_id": interface_info["network_id"],
"vim_info": self.serialize(interface_info),
- "compute_node": server.to_dict()["OS-EXT-SRV-ATTR:host"]
- if server.to_dict().get("OS-EXT-SRV-ATTR:host")
- else None,
+ "compute_node": (
+ server.to_dict()["OS-EXT-SRV-ATTR:host"]
+ if server.to_dict().get("OS-EXT-SRV-ATTR:host")
+ else None
+ ),
}
)
def prepare_interface_updates(
self,
@@ -742,13 +746,13 @@
vnfr_id (str): VNFR ID
"""
for index, old_interface in enumerate(existing_vim_info["interfaces"]):
interface_info = self.get_interface_info(ports, old_interface, server)
if not interface_info:
- vdur_vim_info_update[
- "vim_message"
- ] = f"Interface {old_interface['vim_interface_id']} deleted externally."
+ vdur_vim_info_update["vim_message"] = (
+ f"Interface {old_interface['vim_interface_id']} deleted externally."
+ )
else:
if interface_info.get("status") in openStacknetStatusOk:
self.prepare_interface_updates(
vdur_vim_info_update,
would reformat /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/monitor.py
--- /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ro_main.py 2024-01-26 08:37:03.658307+00:00
+++ /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ro_main.py 2024-01-26 08:37:36.272549+00:00
@@ -189,13 +189,13 @@
)
indata = filecontent.file # .read()
if filecontent.content_type.value:
- cherrypy.request.headers[
- "Content-Type"
- ] = filecontent.content_type.value
+ cherrypy.request.headers["Content-Type"] = (
+ filecontent.content_type.value
+ )
else:
# raise cherrypy.HTTPError(HTTPStatus.Not_Acceptable,
# "Only 'Content-Type' of type 'application/json' or
# 'application/yaml' for input format are available")
error_text = "Invalid yaml format "
@@ -291,13 +291,13 @@
# TODO check that cherrypy close file. If not implement pending things to close per thread next
return data
if accept:
if "application/json" in accept:
- cherrypy.response.headers[
- "Content-Type"
- ] = "application/json; charset=utf-8"
+ cherrypy.response.headers["Content-Type"] = (
+ "application/json; charset=utf-8"
+ )
a = json.dumps(data, indent=4) + "\n"
return a.encode("utf8")
elif "text/html" in accept:
return html.format(
@@ -474,19 +474,19 @@
self.ns.fs.file_delete(folder)
return ",".join(folders) + " folders deleted\n"
elif args and args[0] == "login":
if not cherrypy.request.headers.get("Authorization"):
- cherrypy.response.headers[
- "WWW-Authenticate"
- ] = 'Basic realm="Access to OSM site", charset="UTF-8"'
+ cherrypy.response.headers["WWW-Authenticate"] = (
+ 'Basic realm="Access to OSM site", charset="UTF-8"'
+ )
cherrypy.response.status = HTTPStatus.UNAUTHORIZED.value
elif args and args[0] == "login2":
if not cherrypy.request.headers.get("Authorization"):
- cherrypy.response.headers[
- "WWW-Authenticate"
- ] = 'Bearer realm="Access to OSM site"'
+ cherrypy.response.headers["WWW-Authenticate"] = (
+ 'Bearer realm="Access to OSM site"'
+ )
cherrypy.response.status = HTTPStatus.UNAUTHORIZED.value
elif args and args[0] == "sleep":
sleep_time = 5
try:
@@ -678,13 +678,15 @@
self._set_location_header(main_topic, version, topic, _id)
cherrypy.response.status = (
HTTPStatus.ACCEPTED.value
if not done
- else HTTPStatus.OK.value
- if outdata is not None
- else HTTPStatus.NO_CONTENT.value
+ else (
+ HTTPStatus.OK.value
+ if outdata is not None
+ else HTTPStatus.NO_CONTENT.value
+ )
)
return self._format_out(outdata, token_info, _format)
except Exception as e:
if isinstance(
@@ -701,13 +703,13 @@
):
http_code_value = cherrypy.response.status = e.http_code.value
http_code_name = e.http_code.name
cherrypy.log("Exception {}".format(e))
else:
- http_code_value = (
- cherrypy.response.status
- ) = HTTPStatus.BAD_REQUEST.value # INTERNAL_SERVER_ERROR
+ http_code_value = cherrypy.response.status = (
+ HTTPStatus.BAD_REQUEST.value
+ ) # INTERNAL_SERVER_ERROR
cherrypy.log("CRITICAL: Exception {}".format(e), traceback=True)
http_code_name = HTTPStatus.BAD_REQUEST.name
if hasattr(outdata, "close"): # is an open file
outdata.close()
would reformat /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ro_main.py
--- /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ns.py 2024-01-26 08:37:03.654306+00:00
+++ /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ns.py 2024-01-26 08:37:36.862103+00:00
@@ -707,13 +707,13 @@
"type": target_affinity_group["type"],
"scope": target_affinity_group["scope"],
}
if target_affinity_group.get("vim-affinity-group-id"):
- affinity_group_data[
- "vim-affinity-group-id"
- ] = target_affinity_group["vim-affinity-group-id"]
+ affinity_group_data["vim-affinity-group-id"] = (
+ target_affinity_group["vim-affinity-group-id"]
+ )
extra_dict["params"] = {
"affinity_group_data": affinity_group_data,
}
@@ -722,13 +722,15 @@
def _ip_profile_2_ro(ip_profile):
if not ip_profile:
return None
ro_ip_profile = {
- "ip_version": "IPv4"
- if "v4" in ip_profile.get("ip-version", "ipv4")
- else "IPv6",
+ "ip_version": (
+ "IPv4"
+ if "v4" in ip_profile.get("ip-version", "ipv4")
+ else "IPv6"
+ ),
"subnet_address": ip_profile.get("subnet-address"),
"gateway_address": ip_profile.get("gateway-address"),
"dhcp_enabled": ip_profile.get("dhcp-params", {}).get(
"enabled", False
),
@@ -1426,13 +1428,13 @@
else:
done += 1
return_data = {
"status": global_status,
- "details": ". ".join(details)
- if details
- else "progress {}/{}".format(done, total),
+ "details": (
+ ". ".join(details) if details else "progress {}/{}".format(done, total)
+ ),
"nsr_id": nsr_id,
"action_id": action_id,
"tasks": task_list,
}
would reformat /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ns.py
--- /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ns_thread.py 2024-01-26 08:37:03.654306+00:00
+++ /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ns_thread.py 2024-01-26 08:37:37.605215+00:00
@@ -282,13 +282,15 @@
"ro_task={} {} get-net={}: status={} {}".format(
ro_task_id,
ro_task["target_id"],
vim_id,
ro_vim_item_update.get("vim_status"),
- ro_vim_item_update.get("vim_details")
- if ro_vim_item_update.get("vim_status") != "ACTIVE"
- else "",
+ (
+ ro_vim_item_update.get("vim_details")
+ if ro_vim_item_update.get("vim_status") != "ACTIVE"
+ else ""
+ ),
)
)
return task_status, ro_vim_item_update
@@ -561,13 +563,15 @@
"ro_task={} {} get-vm={}: status={} {}".format(
ro_task_id,
ro_task["target_id"],
vim_id,
ro_vim_item_update.get("vim_status"),
- ro_vim_item_update.get("vim_details")
- if ro_vim_item_update.get("vim_status") != "ACTIVE"
- else "",
+ (
+ ro_vim_item_update.get("vim_details")
+ if ro_vim_item_update.get("vim_status") != "ACTIVE"
+ else ""
+ ),
)
)
return task_status, ro_vim_item_update
@@ -1067,13 +1071,13 @@
service_endpoint_id = "{}:{}".format(port["compute_node"], port["pci"])
new_port = {
"service_endpoint_id": pmap.get("service_endpoint_id")
or service_endpoint_id,
- "service_endpoint_encapsulation_type": "dot1q"
- if port["type"] == "SR-IOV"
- else None,
+ "service_endpoint_encapsulation_type": (
+ "dot1q" if port["type"] == "SR-IOV" else None
+ ),
"service_endpoint_encapsulation_info": {
"vlan": port.get("vlan"),
"mac": port.get("mac-address"),
"device_id": pmap.get("device_id") or port["compute_node"],
"device_interface_id": pmap.get("device_interface_id")
@@ -1460,13 +1464,11 @@
step = ""
loaded = target_id in self.vim_targets
target_database = (
"vim_accounts"
if target == "vim"
- else "wim_accounts"
- if target == "wim"
- else "sdns"
+ else "wim_accounts" if target == "wim" else "sdns"
)
try:
step = "Getting {} from db".format(target_id)
db_vim = self.db.get_one(target_database, {"_id": _id})
@@ -1567,13 +1569,11 @@
"""
target, _, _id = target_id.partition(":")
target_database = (
"vim_accounts"
if target == "vim"
- else "wim_accounts"
- if target == "wim"
- else "sdns"
+ else "wim_accounts" if target == "wim" else "sdns"
)
plugin_name = ""
vim = None
try:
@@ -1871,13 +1871,13 @@
if (
my_task["target_record"] == task["target_record"]
and task["action"] == "CREATE"
):
# set to finished
- db_update["tasks.{}.status".format(index)] = task[
- "status"
- ] = "FINISHED"
+ db_update["tasks.{}.status".format(index)] = task["status"] = (
+ "FINISHED"
+ )
elif task["action"] == "CREATE" and task["status"] not in (
"FINISHED",
"SUPERSEDED",
):
needed_delete = False
@@ -2177,13 +2177,13 @@
raise NsWorkerException(error_text)
task_depends[dependency_task_id] = dependency_ro_task[
"vim_info"
]["vim_id"]
- task_depends[
- "TASK-{}".format(dependency_task_id)
- ] = dependency_ro_task["vim_info"]["vim_id"]
+ task_depends["TASK-{}".format(dependency_task_id)] = (
+ dependency_ro_task["vim_info"]["vim_id"]
+ )
if dependency_not_completed:
# TODO set at vim_info.vim_details that it is waiting
continue
would reformat /home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/ns_thread.py
Oh no! ๐ฅ ๐ ๐ฅ
4 files would be reformatted, 10 files would be left unchanged.
ERROR: InvocationError for command /tmp/.tox/black/bin/black --check --diff NG-RO (exited with code 1)
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==6.1.0, flake8-import-order
flake8 installed: flake8==6.1.0,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.11.1,pyflakes==3.1.0
flake8 run-test-pre: PYTHONHASHSEED='1242601937'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v10.0/requirements.txt, safety
safety installed: adal==1.2.7,appdirs==1.4.4,attrs==21.4.0,autopage==0.4.0,azure-common==1.1.27,azure-core==1.21.1,azure-identity==1.7.1,azure-mgmt-compute==24.0.0,azure-mgmt-core==1.3.0,azure-mgmt-network==19.3.0,azure-mgmt-resource==20.0.0,bcrypt==3.2.0,boto==2.49.0,cachetools==4.2.4,certifi==2021.10.8,cffi==1.15.0,charset-normalizer==2.0.10,cheroot==8.6.0,CherryPy==18.1.2,click==8.1.7,cliff==3.10.0,cmd2==2.3.3,cryptography==36.0.1,cvprac==1.0.7,debtcollector==2.3.0,decorator==5.1.1,dogpile.cache==1.1.4,dparse==0.6.3,flufl.enum==4.1.1,google-api-core==2.3.2,google-api-python-client==2.34.0,google-auth==2.3.3,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.54.0,httplib2==0.20.2,humanfriendly==10.0,idna==3.3,importlib-metadata==4.10.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.0.3,jmespath==0.10.0,jsonpatch==1.32,jsonpointer==2.2,jsonschema==3.2.0,keystoneauth1==4.4.0,logutils==0.3.5,lxml==4.7.1,MarkupSafe==2.0.1,more-itertools==8.12.0,msal==1.16.0,msal-extensions==0.3.1,msgpack==1.0.3,msrest==0.6.21,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,oauthlib==3.1.1,openstacksdk==0.61.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.4.2,oslo.config==8.7.1,oslo.context==3.4.0,oslo.i18n==5.1.0,oslo.log==4.6.1,oslo.serialization==4.2.0,oslo.utils==4.12.0,packaging==21.3,paramiko==2.9.2,pbr==5.8.0,portalocker==2.3.2,portend==3.1.0,prettytable==3.0.0,progressbar==2.5,protobuf==3.19.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,Pygments==2.11.2,pyinotify==0.9.6,PyJWT==2.3.0,PyNaCl==1.5.0,pyOpenSSL==21.0.0,pyparsing==3.0.6,pyperclip==1.8.2,pyrsistent==0.18.0,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==3.5.0,python-keystoneclient==4.4.0,python-neutronclient==7.7.0,python-novaclient==17.6.0,python-openstackclient==5.7.0,pytz==2021.3,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.27.1,requests-oauthlib==1.3.0,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,ruamel.yaml==0.18.5,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.0,tomli==2.0.1,uritemplate==4.1.1,urllib3==1.26.8,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.13.3,zc.lockfile==2.0,zipp==3.7.0
safety run-test-pre: PYTHONHASHSEED='1242601937'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by pyup.io \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv2.3.5[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/lib/python3.8/site-packages
Using [1mnon-commercial database[0m
[1m Found and scanned 125 packages[0m
Timestamp [1m2024-01-26 08:39:31[0m
[1m 16[0m[1m vulnerabilities found[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[31m[1mVULNERABILITIES FOUND[0m
+==============================================================================+
[31m-> Vulnerability found in pyjwt version 2.3.0
[0m[1m Vulnerability ID: [0m48542
[1m Affected spec: [0m>=1.5.0,<2.4.0
[1m ADVISORY: [0mPyJWT 2.4.0 includes a fix for CVE-2022-29217: An attacker
submitting the JWT token can choose the used signing algorithm. The PyJWT
library requires that the application chooses what algorithms are supported.
The application can specify 'jwt.algorithms.get_default_algorithms()' to get
support for all algorithms, or specify a single algorithm. The issue is not
that big as 'algorithms=jwt.algorithms.get_default_algorithms()' has to be
used. As a workaround, always be explicit with the algorithms that are
accepted and expected when decoding.
[1m CVE-2022-29217[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/48542/f17[0m
[31m-> Vulnerability found in pygments version 2.11.2
[0m[1m Vulnerability ID: [0m58910
[1m Affected spec: [0m<2.15.0
[1m ADVISORY: [0mPygments 2.15.0 includes a fix for CVE-2022-40896: The
regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
properties files were discovered to be vulnerable. As a result, pygmentizing
a maliciously-crafted file of these kinds would have resulted in high
resources consumption or crashing of the
application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
top-python-packages-part-2
[1m CVE-2022-40896[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58910/f17[0m
[31m-> Vulnerability found in certifi version 2021.10.8
[0m[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates.
e-Tugra's root certificates were subject to an investigation prompted by
reporting of security issues in their systems. Certifi 2023.07.22 removes
root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59956/f17[0m
[31m-> Vulnerability found in certifi version 2021.10.8
[0m[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust store.
TrustCor's root certificates are being removed pursuant to an investigation
prompted by media reporting that TrustCor's ownership also operated a
business that produced spyware. Conclusions of Mozilla's investigation can be
found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/52365/f17[0m
[31m-> Vulnerability found in cryptography version 36.0.1
[0m[1m Vulnerability ID: [0m53048
[1m Affected spec: [0m>=1.8,<39.0.1
[1m ADVISORY: [0mCryptography 39.0.1 includes a fix for CVE-2023-23931: In
affected versions 'Cipher.update_into' would accept Python objects which
implement the buffer protocol, but provide only immutable buffers. This would
allow immutable objects (such as 'bytes') to be mutated, thus violating
fundamental rules of Python and resulting in corrupted output. This issue has
been present since 'update_into' was originally introduced in cryptography
1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-
vj6r
[1m CVE-2023-23931[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/53048/f17[0m
[31m-> Vulnerability found in cryptography version 36.0.1
[0m[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62556/f17[0m
[31m-> Vulnerability found in cryptography version 36.0.1
[0m[1m Vulnerability ID: [0m59473
[1m Affected spec: [0m<41.0.2
[1m ADVISORY: [0mThe cryptography package before 41.0.2 for Python
mishandles SSH certificates that have critical options.
[1m CVE-2023-38325[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59473/f17[0m
[31m-> Vulnerability found in lxml version 4.7.1
[0m[1m Vulnerability ID: [0m50748
[1m Affected spec: [0m<4.9.1
[1m ADVISORY: [0mLxml 4.9.1 includes a fix for CVE-2022-2309: NULL Pointer
Dereference allows attackers to cause a denial of service (or application
crash). This only applies when lxml is used together with libxml2 2.9.10
through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows
triggering crashes through forged input data, given a vulnerable code
sequence in the application. The vulnerability is caused by the iterwalk
function (also used by the canonicalize function). Such code shouldn't be in
wide-spread use, given that parsing + iterwalk would usually be replaced with
the more efficient iterparse function. However, an XML converter that
serialises to C14N would also be vulnerable, for example, and there are
legitimate use cases for this code sequence. If untrusted input is received
(also remotely) and processed via iterwalk function, a crash can be
triggered.
[1m CVE-2022-2309[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50748/f17[0m
[31m-> Vulnerability found in oauthlib version 3.1.1
[0m[1m Vulnerability ID: [0m50959
[1m Affected spec: [0m>=3.1.1,<3.2.1
[1m ADVISORY: [0mOAuthLib 3.2.1 includes a fix for CVE-2022-36087: In
OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect
uri can cause denial of service. An attacker can also leverage usage of
'uri_validate' functions depending where it is used. OAuthLib applications
using OAuth2.0 provider support or use directly 'uri_validate' are affected
by this issue. There are no known workarounds.https://github.com/oauthlib/oau
thlib/security/advisories/GHSA-3pgj-pg6c-r5p7
[1m CVE-2022-36087[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50959/f17[0m
[31m-> Vulnerability found in oslo-utils version 4.12.0
[0m[1m Vulnerability ID: [0m50849
[1m Affected spec: [0m<4.12.1
[1m ADVISORY: [0mOslo-utils 4.12.1 includes a fix for CVE-2022-0718: Due to
improper parsing, passwords with a double quote ( " ) in them cause incorrect
masking in debug logs, causing any part of the password after the double
quote to be plaintext.
[1m CVE-2022-0718[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50849/f17[0m
[31m-> Vulnerability found in paramiko version 2.9.2
[0m[1m Vulnerability ID: [0m54709
[1m Affected spec: [0m>=0,<2.9.3
[1m ADVISORY: [0mIn Paramiko before 2.10.1, a race condition (between
creation and chmod) in the write_private_key_file function could allow
unauthorized information disclosure.
[1m CVE-2022-24302[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/54709/f17[0m
[31m-> Vulnerability found in protobuf version 3.19.3
[0m[1m Vulnerability ID: [0m51167
[1m Affected spec: [0m>=3.19.0rc0,<3.19.5
[1m ADVISORY: [0mProtobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix
for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the
ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2,
3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and
including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-
python can lead to out of memory failures. A specially crafted message with
multiple key-value per elements creates parsing issues, and can lead to a
Denial of Service against services receiving unsanitized input.https://github
.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
[1m CVE-2022-1941[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/51167/f17[0m
[31m-> Vulnerability found in pyvcloud version 19.1.1
[0m[1m Vulnerability ID: [0m36809
[1m Affected spec: [0m<20.0.0
[1m ADVISORY: [0mPyvcloud 20.0.0 fixes CVE-2017-18342: Replace yaml.load()
with yaml.safe_load()
[1m CVE-2017-18342[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/36809/f17[0m
[31m-> Vulnerability found in requests version 2.27.1
[0m[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a product
of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header
to requests. For HTTP connections sent through the tunnel, the proxy will
identify the header in the request itself and remove it prior to forwarding
to the destination server. However when sent over HTTPS, the 'Proxy-
Authorization' header must be sent in the CONNECT request as the proxy has no
visibility into the tunneled request. This results in Requests forwarding
proxy credentials to the destination server unintentionally, allowing a
malicious actor to potentially exfiltrate sensitive information.
[1m CVE-2023-32681[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58755/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.8
[0m[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804:
Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers
for managing cookies over HTTP, that is the responsibility of the user.
However, it is possible for a user to specify a 'Cookie' header and
unknowingly leak information via HTTP redirects to a different origin if that
user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/
security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61601/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.8
[0m[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803:
Request body not stripped after redirect from 303 status changes request
method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m
x-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61893/f17[0m
Scan was completed. 16 vulnerabilities were found.
+==============================================================================+
[32m[1m REMEDIATIONS[0m
16 vulnerabilities were found in 12 packages. For detailed remediation & fix
recommendations, upgrade to a commercial license.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v10.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v10.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v10.0/requirements-test.txt
cover installed: adal==1.2.7,aiokafka==0.7.2,appdirs==1.4.4,attrs==21.4.0,autopage==0.4.0,azure-common==1.1.27,azure-core==1.21.1,azure-identity==1.7.1,azure-mgmt-compute==24.0.0,azure-mgmt-core==1.3.0,azure-mgmt-network==19.3.0,azure-mgmt-resource==20.0.0,bcrypt==3.2.0,boto==2.49.0,cachetools==4.2.4,certifi==2021.10.8,cffi==1.15.0,charset-normalizer==2.0.10,cheroot==8.6.0,CherryPy==18.1.2,cliff==3.10.0,cmd2==2.3.3,coverage==6.2,cryptography==36.0.1,cvprac==1.0.7,dataclasses==0.6,debtcollector==2.3.0,decorator==5.1.1,dogpile.cache==1.1.4,flufl.enum==4.1.1,google-api-core==2.3.2,google-api-python-client==2.34.0,google-auth==2.3.3,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.54.0,httplib2==0.20.2,humanfriendly==10.0,idna==3.3,importlib-metadata==4.10.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.0.3,jmespath==0.10.0,jsonpatch==1.32,jsonpointer==2.2,jsonschema==3.2.0,kafka-python==2.0.2,keystoneauth1==4.4.0,logutils==0.3.5,lxml==4.7.1,MarkupSafe==2.0.1,mock==4.0.3,more-itertools==8.12.0,msal==1.16.0,msal-extensions==0.3.1,msgpack==1.0.3,msrest==0.6.21,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,nose2==0.10.0,oauthlib==3.1.1,openstacksdk==0.61.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.4.2,oslo.config==8.7.1,oslo.context==3.4.0,oslo.i18n==5.1.0,oslo.log==4.6.1,oslo.serialization==4.2.0,oslo.utils==4.12.0,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@7ddcf697a6a19d03211cf78bc653cc3974594b1e,-e git+https://osm.etsi.org/gerrit/osm/RO.git@33b7503d75a1f44f782224be5cadcbed9bd3d03c#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==21.3,paramiko==2.9.2,pbr==5.8.0,portalocker==2.3.2,portend==3.1.0,prettytable==3.0.0,progressbar==2.5,protobuf==3.19.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.11.2,pyinotify==0.9.6,PyJWT==2.3.0,pymongo==3.12.3,PyNaCl==1.5.0,pyOpenSSL==21.0.0,pyparsing==3.0.6,pyperclip==1.8.2,pyrsistent==0.18.0,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==3.5.0,python-keystoneclient==4.4.0,python-neutronclient==7.7.0,python-novaclient==17.6.0,python-openstackclient==5.7.0,pytz==2021.3,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.27.1,requests-oauthlib==1.3.0,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.0,uritemplate==4.1.1,urllib3==1.26.8,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.13.3,zc.lockfile==2.0,zipp==3.7.0
cover run-test-pre: PYTHONHASHSEED='1242601937'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage NG-RO/osm_ng_ro -s NG-RO/osm_ng_ro
ERROR:root:The 'osm_ng_ro' distribution was not found and is required by the application occured while getting the ro version
Traceback (most recent call last):
File "/home/jenkins/workspace/RO-stage_2-merge_v10.0/NG-RO/osm_ng_ro/__init__.py", line 26, in <module>
version = get_distribution("osm_ng_ro").version
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 528, in get_distribution
dist = get_provider(dist)
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 400, in get_provider
return working_set.find(moduleOrReq) or require(str(moduleOrReq))[0]
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 968, in require
needed = self.resolve(parse_requirements(requirements))
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 829, in resolve
dist = self._resolve_dist(
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 870, in _resolve_dist
raise DistributionNotFound(req, requirers)
pkg_resources.DistributionNotFound: The 'osm_ng_ro' distribution was not found and is required by the application
....ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.................................................................................................................................................
----------------------------------------------------------------------
Ran 153 tests in 0.846s
OK
Name Stmts Miss Cover
-------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 624 557 11%
NG-RO/osm_ng_ro/ns_thread.py 1176 941 20%
NG-RO/osm_ng_ro/ro_main.py 457 457 0%
NG-RO/osm_ng_ro/tests/__init__.py 0 0 100%
NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100%
NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99%
NG-RO/osm_ng_ro/tests/test_ns.py 54 0 100%
NG-RO/osm_ng_ro/tests/test_ns_thread.py 202 0 100%
NG-RO/osm_ng_ro/validation.py 33 13 61%
NG-RO/osm_ng_ro/vim_admin.py 224 187 17%
-------------------------------------------------------------
TOTAL 4595 2217 52%
cover run-test: commands[3] | sh -c 'mv .coverage .coverage_ng_ro'
cover run-test: commands[4] | nose2 -C --coverage RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail -s RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
....
----------------------------------------------------------------------
Ran 4 tests in 0.007s
OK
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------------------
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100%
-------------------------------------------------------------------------------------------------------------------
TOTAL 697 484 31%
cover run-test: commands[5] | sh -c 'mv .coverage .coverage_rosdn_juniper_contrail'
cover run-test: commands[6] | coverage combine .coverage_ng_ro .coverage_rosdn_juniper_contrail
Combined data file .coverage_ng_ro
Combined data file .coverage_rosdn_juniper_contrail
cover run-test: commands[7] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 624 557 11%
NG-RO/osm_ng_ro/ns_thread.py 1176 941 20%
NG-RO/osm_ng_ro/ro_main.py 457 457 0%
NG-RO/osm_ng_ro/validation.py 33 13 61%
NG-RO/osm_ng_ro/vim_admin.py 224 187 17%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19%
-------------------------------------------------------------------------------------------------------
TOTAL 3540 2697 24%
cover run-test: commands[8] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[9] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
___________________________________ summary ____________________________________
ERROR: black: commands failed
flake8: commands succeeded
safety: commands succeeded
cover: commands succeeded
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 055f8d531540057e9a020ad1e2d94979571796e528e05c3024235713af3fedf8
$ docker rm -f 055f8d531540057e9a020ad1e2d94979571796e528e05c3024235713af3fedf8
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE