[MON-stage_2-merge_v13.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
✔ OK black in 9.179 seconds
black create: /tmp/.tox/black
black installdeps: black
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==23.2,pathspec==0.12.1,platformdirs==4.1.0,tomli==2.0.1,typing_extensions==4.9.0
black run-test-pre: PYTHONHASHSEED='2323132586'
black run-test: commands[0] | black --check --diff osm_mon/
All done! ✨ 🍰 ✨
82 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! ✨ 🍰 ✨
1 file would be left unchanged.
✔ OK flake8 in 11.585 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==5.0.4
flake8 develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
flake8 installed: flake8==5.0.4,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,pycodestyle==2.9.1,pyflakes==2.5.0
flake8 run-test-pre: PYTHONHASHSEED='322534111'
flake8 run-test: commands[0] | flake8 osm_mon/ setup.py
✔ OK safety in 1 minute, 30.491 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
safety installed: aiokafka==0.7.2,appdirs==1.4.4,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,click==8.1.7,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,cryptography==38.0.1,cycler==0.11.0,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.8,dparse==0.6.3,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,lxml==4.9.1,matplotlib==3.6.1,monotonic==1.6,msgpack==1.0.4,munch==2.5.0,netaddr==0.8.0,netifaces==0.11.0,numpy==1.23.3,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,packaging==21.3,pandas==1.5.0,pbr==5.10.0,Pillow==9.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,pycparser==2.21,Pygments==2.13.0,pyinotify==0.9.6,pyparsing==3.0.9,pyperclip==1.8.2,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requestsexceptions==1.4.0,rfc3986==2.0.0,ruamel.yaml==0.18.5,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,tomli==2.0.1,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,wrapt==1.14.1,zipp==3.9.0
safety run-test-pre: PYTHONHASHSEED='2333220101'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by pyup.io \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv2.3.5[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /home/jenkins/workspace/MON-stage_2-merge_v13.0
-> /tmp/.tox/safety/lib/python3.8/site-packages
Using [1mnon-commercial database[0m
[1m Found and scanned 97 packages[0m
Timestamp [1m2024-01-16 09:52:25[0m
[1m 14[0m[1m vulnerabilities found[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[31m[1mVULNERABILITIES FOUND[0m
+==============================================================================+
[31m-> Vulnerability found in pillow version 9.2.0
[0m[1m Vulnerability ID: [0m55182
[1m Affected spec: [0m>=9.1.0,<9.3.0
[1m ADVISORY: [0mPillow 9.3.0 includes a security fix: Pillow will now
decode the data in its natural CMYK mode, then convert it to RGB and
rearrange the channels afterwards. Trying to load the data in an incorrect
mode could result in a segmentation
fault.https://pillow.readthedocs.io/en/stable/releasenotes/9.3.0.html#decode-
jpeg-compressed-blp1-data-in-original-mode
[1m PVE-2023-55182[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/55182/f17[0m
[31m-> Vulnerability found in pillow version 9.2.0
[0m[1m Vulnerability ID: [0m62156
[1m Affected spec: [0m<10.0.0
[1m ADVISORY: [0mPillow 10.0.0 includes a fix for CVE-2023-44271: It is a
Denial of Service that uncontrollably allocates memory to process a given
task, potentially causing a service to crash by having it run out of memory.
This occurs for truetype in ImageFont when textlength in an ImageDraw
instance operates on a long text argument.https://github.com/python-
pillow/Pillow/pull/7244
[1m CVE-2023-44271[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62156/f17[0m
[31m-> Vulnerability found in pillow version 9.2.0
[0m[1m Vulnerability ID: [0m51886
[1m Affected spec: [0m>=9.2.0,<9.3.0
[1m ADVISORY: [0mPillow before 9.3.0 allows denial of service via SAMPLESPER
PIXEL.https://pillow.readthedocs.io/en/stable/releasenotes/9.3.0.html#limit-
samplesperpixel-to-avoid-runtime-dos
[1m CVE-2022-45199[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/51886/f17[0m
[31m-> Vulnerability found in pygments version 2.13.0
[0m[1m Vulnerability ID: [0m58910
[1m Affected spec: [0m<2.15.0
[1m ADVISORY: [0mPygments 2.15.0 includes a fix for CVE-2022-40896: The
regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
properties files were discovered to be vulnerable. As a result, pygmentizing
a maliciously-crafted file of these kinds would have resulted in high
resources consumption or crashing of the
application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
top-python-packages-part-2
[1m CVE-2022-40896[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58910/f17[0m
[31m-> Vulnerability found in certifi version 2022.9.24
[0m[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust store.
TrustCor's root certificates are being removed pursuant to an investigation
prompted by media reporting that TrustCor's ownership also operated a
business that produced spyware. Conclusions of Mozilla's investigation can be
found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/52365/f17[0m
[31m-> Vulnerability found in certifi version 2022.9.24
[0m[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates.
e-Tugra's root certificates were subject to an investigation prompted by
reporting of security issues in their systems. Certifi 2023.07.22 removes
root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59956/f17[0m
[31m-> Vulnerability found in cryptography version 38.0.1
[0m[1m Vulnerability ID: [0m53048
[1m Affected spec: [0m>=1.8,<39.0.1
[1m ADVISORY: [0mCryptography 39.0.1 includes a fix for CVE-2023-23931: In
affected versions 'Cipher.update_into' would accept Python objects which
implement the buffer protocol, but provide only immutable buffers. This would
allow immutable objects (such as 'bytes') to be mutated, thus violating
fundamental rules of Python and resulting in corrupted output. This issue has
been present since 'update_into' was originally introduced in cryptography
1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-
vj6r
[1m CVE-2023-23931[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/53048/f17[0m
[31m-> Vulnerability found in cryptography version 38.0.1
[0m[1m Vulnerability ID: [0m59473
[1m Affected spec: [0m<41.0.2
[1m ADVISORY: [0mThe cryptography package before 41.0.2 for Python
mishandles SSH certificates that have critical options.
[1m CVE-2023-38325[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59473/f17[0m
[31m-> Vulnerability found in cryptography version 38.0.1
[0m[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62556/f17[0m
[31m-> Vulnerability found in dateparser version 1.1.1
[0m[1m Vulnerability ID: [0m62361
[1m Affected spec: [0m<1.1.6
[1m ADVISORY: [0mDateparser 1.1.6 includes a fix for a ReDoS vulnerability
in Spanish sentence splitting
regex.https://github.com/scrapinghub/dateparser/pull/1084
[1m PVE-2023-62361[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62361/f17[0m
[31m-> Vulnerability found in fonttools version 4.37.4
[0m[1m Vulnerability ID: [0m61503
[1m Affected spec: [0m<4.43.0
[1m ADVISORY: [0mFonttools 4.43.0 includes a fix for a XXE vulnerability.htt
ps://github.com/fonttools/fonttools/commit/9f61271dc1ca82ed91f529b130fe5dc5c9
bf1f4c
[1m PVE-2023-61503[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61503/f17[0m
[31m-> Vulnerability found in requests version 2.28.1
[0m[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a product
of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header
to requests. For HTTP connections sent through the tunnel, the proxy will
identify the header in the request itself and remove it prior to forwarding
to the destination server. However when sent over HTTPS, the 'Proxy-
Authorization' header must be sent in the CONNECT request as the proxy has no
visibility into the tunneled request. This results in Requests forwarding
proxy credentials to the destination server unintentionally, allowing a
malicious actor to potentially exfiltrate sensitive information.
[1m CVE-2023-32681[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58755/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.12
[0m[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804:
Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers
for managing cookies over HTTP, that is the responsibility of the user.
However, it is possible for a user to specify a 'Cookie' header and
unknowingly leak information via HTTP redirects to a different origin if that
user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/
security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61601/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.12
[0m[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803:
Request body not stripped after redirect from 303 status changes request
method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m
x-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61893/f17[0m
Scan was completed. 14 vulnerabilities were found.
+==============================================================================+
[32m[1m REMEDIATIONS[0m
14 vulnerabilities were found in 8 packages. For detailed remediation & fix
recommendations, upgrade to a commercial license.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
✔ OK cover in 2 minutes, 16.892 seconds
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-test.txt
cover develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
cover installed: aiokafka==0.7.2,appdirs==1.4.4,async-timeout==3.0.1,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,bcrypt==4.0.1,cachetools==5.2.0,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,coverage==6.5.0,cryptography==38.0.1,cycler==0.11.0,dataclasses==0.6,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.8,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,google-auth==2.12.0,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,juju==3.0.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,kubernetes==24.2.0,lxml==4.9.1,macaroonbakery==1.3.1,matplotlib==3.6.1,mock==4.0.3,monotonic==1.6,motor==1.3.1,msgpack==1.0.4,munch==2.5.0,mypy-extensions==0.4.3,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@6eac0f117eca51b7970926f92f0b5a8abdd9ba4a#egg=N2VC,netaddr==0.8.0,netifaces==0.11.0,nose2==0.12.0,numpy==1.23.3,oauthlib==3.2.1,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@303ffe4f33c7a0fcc6b5c267d402c0e7d44e5a57#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,packaging==21.3,pandas==1.5.0,paramiko==2.11.0,pbr==5.10.0,Pillow==9.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,protobuf==3.20.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.13.0,pyinotify==0.9.6,pymacaroons==0.13.0,pymongo==3.12.3,PyNaCl==1.5.0,pyparsing==3.0.9,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requests-mock==1.10.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,theblues==0.5.2,toposort==1.7,typing-inspect==0.8.0,typing_extensions==4.4.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,websocket-client==1.4.1,websockets==7.0,wrapt==1.14.1,zipp==3.9.0
cover run-test-pre: PYTHONHASHSEED='2601994571'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage osm_mon
...............ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get Metrics data from vROPS for 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Exception while parsing metrics data from vROPS Extra data: line 1 column 5 (char 4)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 158, in get_metrics
m_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.8/json/__init__.py", line 357, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.8/json/decoder.py", line 340, in decode
raise JSONDecodeError("Extra data", s, end)
json.decoder.JSONDecodeError: Extra data: line 1 column 5 (char 4)
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:get_vm_resource_id: Error in parsing Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 92, in get_vm_resource_list_from_vrops
resp_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.8/json/__init__.py", line 357, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.8/json/decoder.py", line 337, in decode
obj, end = self.raw_decode(s, idx=_w(s, 0).end())
File "/usr/lib/python3.8/json/decoder.py", line 353, in raw_decode
obj, end = self.scan_once(s, idx)
json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
..ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to find vm_moref_id from vApp UUID: 1234
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred while getting VM moref ID for VM: Testing
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vmware.py", line 114, in get_vm_moref_id
vm_details = self.get_vapp_details_rest(vapp_uuid)
File "<string>", line 3, in get_vapp_details_rest
File "/usr/lib/python3.8/unittest/mock.py", line 1081, in __call__
return self._mock_call(*args, **kwargs)
File "/usr/lib/python3.8/unittest/mock.py", line 1085, in _mock_call
return self._execute_mock_call(*args, **kwargs)
File "/usr/lib/python3.8/unittest/mock.py", line 1140, in _execute_mock_call
raise effect
Exception: Testing
...ERROR:osm_mon.collector.vnf_collectors.vmware:REST API call https://vcd/api/vApp/vapp- failed. Return status code b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred for getting vApp details: syntax error: line 1, column 0
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vmware.py", line 177, in get_vapp_details_rest
xmlroot_respond = XmlElementTree.fromstring(response.content)
File "/usr/lib/python3.8/xml/etree/ElementTree.py", line 1320, in XML
parser.feed(text)
xml.etree.ElementTree.ParseError: syntax error: line 1, column 0
.ERROR:osm_mon.collector.vnf_collectors.vmware:Can't connect to a vCloud director as: with exception HTTPSConnectionPool(host='vcd', port=443): Max retries exceeded with url: /api/versions (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f21bc4a0a90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to connect to vCD
................WARNING:osm_mon.evaluator.service:No metric result for alarm <Mock name='mock.uuid' id='139782869367248'>
................
----------------------------------------------------------------------
Ran 65 tests in 0.841s
OK
Name Stmts Miss Cover
----------------------------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 34 34 0%
osm_mon/cmd/mon_utils.py 44 44 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 27 27 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 133 114 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 72 57 21%
osm_mon/collector/vnf_collectors/openstack.py 211 114 46%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 96 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 22 3 86%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 100 100 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 53 20 62%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 63 63 0%
osm_mon/server/service.py 22 22 0%
osm_mon/tests/__init__.py 0 0 100%
osm_mon/tests/unit/__init__.py 0 0 100%
osm_mon/tests/unit/collector/__init__.py 0 0 100%
osm_mon/tests/unit/collector/test_collector.py 8 3 62%
osm_mon/tests/unit/collector/test_collector_service.py 51 0 100%
osm_mon/tests/unit/collector/utils/__init__.py 0 0 100%
osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100%
osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100%
osm_mon/tests/unit/core/__init__.py 0 0 100%
osm_mon/tests/unit/core/test_common_db_client.py 71 0 100%
osm_mon/tests/unit/core/test_message_bus_client.py 41 1 98%
osm_mon/tests/unit/evaluator/__init__.py 0 0 100%
osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100%
osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100%
osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100%
osm_mon/tests/unit/server/__init__.py 0 0 100%
osm_mon/tests/unit/server/test_server_service.py 10 0 100%
----------------------------------------------------------------------------------------------
TOTAL 2923 1329 55%
cover run-test: commands[3] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
----------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 34 34 0%
osm_mon/cmd/mon_utils.py 44 44 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 27 27 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 133 114 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 72 57 21%
osm_mon/collector/vnf_collectors/openstack.py 211 114 46%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 96 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 22 3 86%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 100 100 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 53 20 62%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 63 63 0%
osm_mon/server/service.py 22 22 0%
----------------------------------------------------------------------------
TOTAL 2161 1324 39%
cover run-test: commands[4] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[5] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
✔ OK pylint in 2 minutes, 26.896 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-test.txt, pylint
pylint develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
pylint installed: aiokafka==0.7.2,appdirs==1.4.4,astroid==3.0.2,async-timeout==3.0.1,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,bcrypt==4.0.1,cachetools==5.2.0,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,coverage==6.5.0,cryptography==38.0.1,cycler==0.11.0,dataclasses==0.6,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.7,dogpile.cache==1.1.8,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,google-auth==2.12.0,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,isort==5.13.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,juju==3.0.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,kubernetes==24.2.0,lxml==4.9.1,macaroonbakery==1.3.1,matplotlib==3.6.1,mccabe==0.7.0,mock==4.0.3,monotonic==1.6,motor==1.3.1,msgpack==1.0.4,munch==2.5.0,mypy-extensions==0.4.3,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@6eac0f117eca51b7970926f92f0b5a8abdd9ba4a#egg=N2VC,netaddr==0.8.0,netifaces==0.11.0,nose2==0.12.0,numpy==1.23.3,oauthlib==3.2.1,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@303ffe4f33c7a0fcc6b5c267d402c0e7d44e5a57#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,packaging==21.3,pandas==1.5.0,paramiko==2.11.0,pbr==5.10.0,Pillow==9.2.0,platformdirs==4.1.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,protobuf==3.20.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.13.0,pyinotify==0.9.6,pylint==3.0.3,pymacaroons==0.13.0,pymongo==3.12.3,PyNaCl==1.5.0,pyparsing==3.0.9,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requests-mock==1.10.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.3,toposort==1.7,typing-inspect==0.8.0,typing_extensions==4.4.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,websocket-client==1.4.1,websockets==7.0,wrapt==1.14.1,zipp==3.9.0
pylint run-test-pre: PYTHONHASHSEED='1423125492'
pylint run-test: commands[0] | pylint -E osm_mon
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
congratulations :)