Started by upstream project "buildall-stage_2-merge-v13" build number 316 originally caused by: Started by timer > git rev-parse --is-inside-work-tree # timeout=10 Setting origin to https://osm.etsi.org/gerrit/osm/MON.git > git config remote.origin.url https://osm.etsi.org/gerrit/osm/MON.git # timeout=10 Fetching origin... Fetching upstream changes from origin > git --version # timeout=10 > git config --get remote.origin.url # timeout=10 > git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/* Seen branch in repository origin/bug1511 Seen branch in repository origin/feature5837 Seen branch in repository origin/feature7106 Seen branch in repository origin/feature7928 Seen branch in repository origin/master Seen branch in repository origin/netslice Seen branch in repository origin/ng-ro-refactor Seen branch in repository origin/paas Seen branch in repository origin/rift300 Seen branch in repository origin/sol006 Seen branch in repository origin/sol006v331 Seen branch in repository origin/v10.0 Seen branch in repository origin/v11.0 Seen branch in repository origin/v12.0 Seen branch in repository origin/v13.0 Seen branch in repository origin/v14.0 Seen branch in repository origin/v15.0 Seen branch in repository origin/v3.1 Seen branch in repository origin/v4.0 Seen branch in repository origin/v5.0 Seen branch in repository origin/v6.0 Seen branch in repository origin/v7.0 Seen branch in repository origin/v8.0 Seen branch in repository origin/v9.0 Seen 24 remote branches Obtained Jenkinsfile from 02814d96d20cf07d89c123b9f8eb10064f4b5d09 Running in Durability level: MAX_SURVIVABILITY [Pipeline] properties [Pipeline] node Still waiting to schedule task Waiting for next available executor on ‘stage_2’ Running on osm-cicd-2 in /home/jenkins/workspace/MON-stage_2-merge_v13.0 [Pipeline] { [Pipeline] checkout No credentials specified > git rev-parse --is-inside-work-tree # timeout=10 Fetching changes from the remote Git repository > git config remote.origin.url https://osm.etsi.org/gerrit/osm/MON.git # timeout=10 Fetching without tags Fetching upstream changes from https://osm.etsi.org/gerrit/osm/MON.git > git --version # timeout=10 > git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/MON.git +refs/heads/*:refs/remotes/origin/* Checking out Revision 02814d96d20cf07d89c123b9f8eb10064f4b5d09 (v13.0) > git config core.sparsecheckout # timeout=10 > git checkout -f 02814d96d20cf07d89c123b9f8eb10064f4b5d09 Commit message: "Fix black and cover errors" > git rev-list --no-walk 02814d96d20cf07d89c123b9f8eb10064f4b5d09 # timeout=10 [Pipeline] dir Running in /home/jenkins/workspace/MON-stage_2-merge_v13.0/devops [Pipeline] { [Pipeline] git No credentials specified > git rev-parse --is-inside-work-tree # timeout=10 Fetching changes from the remote Git repository > git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10 Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops > git --version # timeout=10 > git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/v13.0^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/v13.0^{commit} # timeout=10 Checking out Revision df75b7aed0e184455b9de743f82003a1a2513956 (refs/remotes/origin/v13.0) > git config core.sparsecheckout # timeout=10 > git checkout -f df75b7aed0e184455b9de743f82003a1a2513956 > git branch -a -v --no-abbrev # timeout=10 > git branch -D v13.0 # timeout=10 > git checkout -b v13.0 df75b7aed0e184455b9de743f82003a1a2513956 Commit message: "Update gen-repo.sh to fix download from artifactory" > git rev-list --no-walk df75b7aed0e184455b9de743f82003a1a2513956 # timeout=10 [Pipeline] } [Pipeline] // dir [Pipeline] load [Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy) [Pipeline] } [Pipeline] // load [Pipeline] echo do_stage_3= false [Pipeline] load [Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy) [Pipeline] } [Pipeline] // load [Pipeline] stage [Pipeline] { (Prepare) [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + env JENKINS_HOME=/var/lib/jenkins SSH_CLIENT=212.234.161.1 51943 22 USER=jenkins RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/329/display/redirect?page=changes GERRIT_PROJECT=osm/MON XDG_SESSION_TYPE=tty SHLVL=0 NODE_LABELS=docker osm-cicd-2 osm2 pipeline stage_2 HUDSON_URL=https://osm.etsi.org/jenkins/ MOTD_SHOWN=pam OLDPWD=/home/jenkins HOME=/home/jenkins BUILD_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/329/ HUDSON_COOKIE=caeba268-6d6f-4744-aacc-6b38d2dc767e JENKINS_SERVER_COOKIE=durable-c1469d490e8058017d700c63052f58e8 DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus GERRIT_PATCHSET_REVISION=02814d96d20cf07d89c123b9f8eb10064f4b5d09 WORKSPACE=/home/jenkins/workspace/MON-stage_2-merge_v13.0 LOGNAME=jenkins NODE_NAME=osm-cicd-2 GERRIT_BRANCH=v13.0 _=/usr/bin/java RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/329/display/redirect?page=artifacts XDG_SESSION_CLASS=user EXECUTOR_NUMBER=2 XDG_SESSION_ID=144 RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/329/display/redirect?page=tests BUILD_DISPLAY_NAME=#329 PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit HUDSON_HOME=/var/lib/jenkins JOB_BASE_NAME=v13.0 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin BUILD_ID=329 XDG_RUNTIME_DIR=/run/user/1001 BUILD_TAG=jenkins-MON-stage_2-merge-v13.0-329 JENKINS_URL=https://osm.etsi.org/jenkins/ LANG=C.UTF-8 JOB_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/ BUILD_NUMBER=329 SHELL=/bin/bash RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/329/display/redirect ARTIFACTORY_SERVER=artifactory-osm GERRIT_REFSPEC=refs/changes/09/13109/2 HUDSON_SERVER_COOKIE=6d3295a483c3e6d5 JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/MON-stage_2-merge/job/v13.0/display/redirect JOB_NAME=MON-stage_2-merge/v13.0 TEST_INSTALL=false PWD=/home/jenkins/workspace/MON-stage_2-merge_v13.0 SSH_CONNECTION=212.234.161.1 51943 172.21.249.2 22 BRANCH_NAME=v13.0 [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Checkout) [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + git fetch --tags [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + git fetch origin refs/changes/09/13109/2 From https://osm.etsi.org/gerrit/osm/MON * branch refs/changes/09/13109/2 -> FETCH_HEAD [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + git checkout -f 02814d96d20cf07d89c123b9f8eb10064f4b5d09 HEAD is now at 02814d9 Fix black and cover errors [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + sudo git clean -dfx Removing .cache/ Removing .config/ Removing .coverage Removing .local/ Removing .safety/ Removing build.env Removing changelog/ Removing cover/ Removing coverage.xml Removing deb_dist/ Removing dist/ Removing dists/ Removing nosetests.xml Removing osm_mon-13.0.2+g02814d9.tar.gz Removing osm_mon.egg-info/ Removing pool/ Removing vcd_pysdk.log [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (License Scan) [Pipeline] echo skip the scan for merge [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Release Note Check) [Pipeline] fileExists [Pipeline] echo No releasenote check present [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Docker-Build) [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/mon-v13.0 . Sending build context to Docker daemon 155.8MB Step 1/6 : FROM ubuntu:20.04 ---> f78909c2b360 Step 2/6 : ARG APT_PROXY ---> Using cache ---> ad00a18b3e37 Step 3/6 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi ---> Using cache ---> 504bf7dcee9b Step 4/6 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools ---> Using cache ---> bd0167711318 Step 5/6 : RUN python3 -m easy_install pip==21.3.1 ---> Using cache ---> 4c505a4aa232 Step 6/6 : RUN pip install tox==3.24.5 ---> Using cache ---> c07eaa52df05 Successfully built c07eaa52df05 Successfully tagged osm/mon-v13.0:latest [Pipeline] } [Pipeline] // stage [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + id -u [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + id -g [Pipeline] withDockerContainer osm-cicd-2 does not seem to be running inside a container $ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/MON-stage_2-merge_v13.0 -v /home/jenkins/workspace/MON-stage_2-merge_v13.0:/home/jenkins/workspace/MON-stage_2-merge_v13.0:rw,z -v /home/jenkins/workspace/MON-stage_2-merge_v13.0@tmp:/home/jenkins/workspace/MON-stage_2-merge_v13.0@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/mon-v13.0 [Pipeline] { [Pipeline] stage [Pipeline] { (Test) [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + groupadd -o -g 1001 -r jenkins [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + pwd + useradd -o -u 1001 -d /home/jenkins/workspace/MON-stage_2-merge_v13.0 -r -g jenkins jenkins [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + echo #! /bin/sh [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + chmod 755 /usr/bin/mesg [Pipeline] sh [MON-stage_2-merge_v13.0] Running shell script + runuser jenkins -c devops-stages/stage-test.sh Launching tox ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/black/log/black-0.log ================================== log start =================================== black create: /tmp/.tox/black black installdeps: black black installed: black==24.1.0,click==8.1.7,mypy-extensions==1.0.0,packaging==23.2,pathspec==0.12.1,platformdirs==4.1.0,tomli==2.0.1,typing_extensions==4.9.0 black run-test-pre: PYTHONHASHSEED='754907701' black run-test: commands[0] | black --check --diff osm_mon/ --- /home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/infra_collectors/vmware.py 2024-01-26 09:51:32.216337+00:00 +++ /home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/infra_collectors/vmware.py 2024-01-26 09:51:58.183630+00:00 @@ -142,13 +142,13 @@ if "type" in child.attrib: if ( child.attrib["type"] == "application/vnd.vmware.vcloud.vdc+xml" ): - vdc_list[ - child.attrib["href"].split("/")[-1:][0] - ] = child.attrib["name"] + vdc_list[child.attrib["href"].split("/")[-1:][0]] = ( + child.attrib["name"] + ) if vdc_list: return True else: return False would reformat /home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/infra_collectors/vmware.py Oh no! 💥 💔 💥 1 file would be reformatted, 81 files would be left unchanged. ERROR: InvocationError for command /tmp/.tox/black/bin/black --check --diff osm_mon/ (exited with code 1) =================================== log end ==================================== ✖ FAIL black in 8.456 seconds ✔ OK flake8 in 11.511 seconds flake8 create: /tmp/.tox/flake8 flake8 installdeps: flake8==5.0.4 flake8 develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0 flake8 installed: flake8==5.0.4,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,pycodestyle==2.9.1,pyflakes==2.5.0 flake8 run-test-pre: PYTHONHASHSEED='21207865' flake8 run-test: commands[0] | flake8 osm_mon/ setup.py ✔ OK safety in 1 minute, 12.637 seconds safety create: /tmp/.tox/safety safety installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, safety safety develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0 safety installed: aiokafka==0.7.2,appdirs==1.4.4,attrs==22.1.0,Authlib==1.3.0,autopage==0.5.1,backports.zoneinfo==0.2.1,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,click==8.1.7,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,cryptography==38.0.1,cycler==0.11.0,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.8,dparse==0.6.4b0,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,Jinja2==3.1.3,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,lxml==4.9.1,markdown-it-py==3.0.0,MarkupSafe==2.1.4,marshmallow==3.20.2,matplotlib==3.6.1,mdurl==0.1.2,monotonic==1.6,msgpack==1.0.4,munch==2.5.0,netaddr==0.8.0,netifaces==0.11.0,numpy==1.23.3,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,packaging==21.3,pandas==1.5.0,pbr==5.10.0,Pillow==9.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,pycparser==2.21,pydantic==1.10.14,Pygments==2.13.0,pyinotify==0.9.6,pyparsing==3.0.9,pyperclip==1.8.2,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.0,ruamel.yaml==0.18.5,ruamel.yaml.clib==0.2.8,safety==3.0.1,safety-schemas==0.0.1,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,tomli==2.0.1,typer==0.9.0,typing_extensions==4.9.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,wrapt==1.14.1,zipp==3.9.0 safety run-test-pre: PYTHONHASHSEED='1504219783' safety run-test: commands[0] | - safety check --full-report +==============================================================================+ /$$$$$$ /$$ /$$__ $$ | $$ /$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$ /$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$ | $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$ \____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$ /$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$ |_______/ \_______/|__/ \_______/ \___/ \____ $$ /$$ | $$ | $$$$$$/ by safetycli.com \______/ +==============================================================================+ REPORT  Safety is using PyUp's free open-source vulnerability database. This data is 30 days old and limited.   For real-time enhanced vulnerability data, fix recommendations, severity reporting, cybersecurity support, team and project policy management and more sign up at https://pyup.io or email sales@pyup.io Safety v3.0.1 is scanning for Vulnerabilities...  Scanning dependencies in your environment: -> /tmp/.tox/safety/lib/python3.8/site-packages -> /usr/lib/python3.8 -> /home/jenkins/workspace/MON-stage_2-merge_v13.0 -> /usr/lib/python38.zip -> /usr/lib/python3.8/lib-dynload -> /tmp/.tox/safety/bin Using open-source vulnerability database  Found and scanned 108 packages Timestamp 2024-01-26 09:53:02  14 vulnerabilities reported  0 vulnerabilities ignored +==============================================================================+ VULNERABILITIES REPORTED +==============================================================================+ -> Vulnerability found in urllib3 version 1.26.12  Vulnerability ID: 61601  Affected spec: <1.26.17  ADVISORY: Urllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804: Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a 'Cookie' header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.https:/ /github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f  CVE-2023-43804  For more information about this vulnerability, visit https://data.safetycli.com/v/61601/97c To ignore this vulnerability, use PyUp vulnerability id 61601 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in urllib3 version 1.26.12  Vulnerability ID: 61893  Affected spec: <1.26.18  ADVISORY: Urllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803: Request body not stripped after redirect from 303 status changes request method to GET.https://github.com/urllib3/urllib3/security/ advisories/GHSA-g4mx-q9vg-27p4  CVE-2023-45803  For more information about this vulnerability, visit https://data.safetycli.com/v/61893/97c To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in requests version 2.28.1  Vulnerability ID: 58755  Affected spec: >=2.3.0,<2.31.0  ADVISORY: Requests 2.31.0 includes a fix for CVE-2023-32681: Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use 'rebuild_proxies' to reattach the 'Proxy- Authorization' header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the 'Proxy-Authorization' header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information.  CVE-2023-32681  For more information about this vulnerability, visit https://data.safetycli.com/v/58755/97c To ignore this vulnerability, use PyUp vulnerability id 58755 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in fonttools version 4.37.4  Vulnerability ID: 61503  Affected spec: >=4.28.2,<4.43.0  ADVISORY: Fonttools is affected by a XML External Entity Injection (XXE) Vulnerability. As of fonttools>=4.28.2 the subsetting module has a XML External Entity Injection (XXE) vulnerability which allows an attacker to resolve arbitrary entities when a candidate font (OT-SVG fonts), which contains a SVG table, is parsed. This allows attackers to include arbitrary files from the filesystem fontTools is running on or make web requests from the host system.  CVE-2023-45139  For more information about this vulnerability, visit https://data.safetycli.com/v/61503/97c To ignore this vulnerability, use PyUp vulnerability id 61503 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in dateparser version 1.1.1  Vulnerability ID: 62361  Affected spec: <1.1.6  ADVISORY: Dateparser 1.1.6 includes a fix for a ReDoS vulnerability in Spanish sentence splitting regex.https://github.com/scrapinghub/dateparser/pull/1084  PVE-2023-62361  For more information about this vulnerability, visit https://data.safetycli.com/v/62361/97c To ignore this vulnerability, use PyUp vulnerability id 62361 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 38.0.1  Vulnerability ID: 53048  Affected spec: >=1.8,<39.0.1  ADVISORY: Cryptography 39.0.1 includes a fix for CVE-2023-23931: In affected versions 'Cipher.update_into' would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as 'bytes') to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This issue has been present since 'update_into' was originally introduced in cryptography 1.8.https://github.com/pyca/cryptography/security/advisori es/GHSA-w7pp-m8wf-vj6r  CVE-2023-23931  For more information about this vulnerability, visit https://data.safetycli.com/v/53048/97c To ignore this vulnerability, use PyUp vulnerability id 53048 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 38.0.1  Vulnerability ID: 62556  Affected spec: >=3.1,<41.0.6  ADVISORY: Cryptography 41.0.6 includes a fix for CVE-2023-49083: NULL-dereference when loading PKCS7 certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97  CVE-2023-49083  For more information about this vulnerability, visit https://data.safetycli.com/v/62556/97c To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in cryptography version 38.0.1  Vulnerability ID: 59473  Affected spec: <41.0.2  ADVISORY: The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.  CVE-2023-38325  For more information about this vulnerability, visit https://data.safetycli.com/v/59473/97c To ignore this vulnerability, use PyUp vulnerability id 59473 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in certifi version 2022.9.24  Vulnerability ID: 59956  Affected spec: >=2015.04.28,<2023.07.22  ADVISORY: Certifi 2023.07.22 includes a fix for CVE-2023-37920: Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.https://github.com/certifi/python-certifi/security/advisories/GHSA- xqr8-7jwr-rhp7  CVE-2023-37920  For more information about this vulnerability, visit https://data.safetycli.com/v/59956/97c To ignore this vulnerability, use PyUp vulnerability id 59956 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in certifi version 2022.9.24  Vulnerability ID: 52365  Affected spec: <2022.12.07  ADVISORY: Certifi 2022.12.07 includes a fix for CVE-2022-23491: Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.https://github.com/certifi/python- certifi/security/advisories/GHSA-43fp- rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security- policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ  CVE-2022-23491  For more information about this vulnerability, visit https://data.safetycli.com/v/52365/97c To ignore this vulnerability, use PyUp vulnerability id 52365 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pygments version 2.13.0  Vulnerability ID: 58910  Affected spec: <2.15.0  ADVISORY: Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in- top-python-packages-part-2  CVE-2022-40896  For more information about this vulnerability, visit https://data.safetycli.com/v/58910/97c To ignore this vulnerability, use PyUp vulnerability id 58910 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pillow version 9.2.0  Vulnerability ID: 55182  Affected spec: >=9.1.0,<9.3.0  ADVISORY: Pillow 9.3.0 includes a security fix: Pillow will now decode the data in its natural CMYK mode, then convert it to RGB and rearrange the channels afterwards. Trying to load the data in an incorrect mode could result in a segmentation fault.https://pillow.readthedocs.io/en /stable/releasenotes/9.3.0.html#decode-jpeg-compressed-blp1-data-in- original-mode  PVE-2023-55182  For more information about this vulnerability, visit https://data.safetycli.com/v/55182/97c To ignore this vulnerability, use PyUp vulnerability id 55182 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pillow version 9.2.0  Vulnerability ID: 62156  Affected spec: <10.0.0  ADVISORY: Pillow 10.0.0 includes a fix for CVE-2023-44271: Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.https://github.com/python- pillow/Pillow/pull/7244  CVE-2023-44271  For more information about this vulnerability, visit https://data.safetycli.com/v/62156/97c To ignore this vulnerability, use PyUp vulnerability id 62156 in safety’s ignore command-line argument or add the ignore to your safety policy file. -> Vulnerability found in pillow version 9.2.0  Vulnerability ID: 51886  Affected spec: >=9.2.0,<9.3.0  ADVISORY: Pillow before 9.3.0 allows denial of service via SAMPLES PERPIXEL.https://pillow.readthedocs.io/en/stable/releasenotes/9.3.0.html#l imit-samplesperpixel-to-avoid-runtime-dos  CVE-2022-45199  For more information about this vulnerability, visit https://data.safetycli.com/v/51886/97c To ignore this vulnerability, use PyUp vulnerability id 51886 in safety’s ignore command-line argument or add the ignore to your safety policy file. +==============================================================================+ REMEDIATIONS 14 vulnerabilities were reported in 8 packages. For detailed remediation & fix recommendations, upgrade to a commercial license. +==============================================================================+ Scan was completed. 14 vulnerabilities were reported. +==============================================================================+  Safety is using PyUp's free open-source vulnerability database. This data is 30 days old and limited.   For real-time enhanced vulnerability data, fix recommendations, severity reporting, cybersecurity support, team and project policy management and more sign up at https://pyup.io or email sales@pyup.io +==============================================================================+ ✔ OK cover in 1 minute, 46.96 seconds cover create: /tmp/.tox/cover cover installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-test.txt cover develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0 cover installed: aiokafka==0.7.2,appdirs==1.4.4,async-timeout==3.0.1,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,bcrypt==4.0.1,cachetools==5.2.0,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,coverage==6.5.0,cryptography==38.0.1,cycler==0.11.0,dataclasses==0.6,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.8,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,google-auth==2.12.0,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,juju==3.0.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,kubernetes==24.2.0,lxml==4.9.1,macaroonbakery==1.3.1,matplotlib==3.6.1,mock==4.0.3,monotonic==1.6,motor==1.3.1,msgpack==1.0.4,munch==2.5.0,mypy-extensions==0.4.3,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@6eac0f117eca51b7970926f92f0b5a8abdd9ba4a#egg=N2VC,netaddr==0.8.0,netifaces==0.11.0,nose2==0.12.0,numpy==1.23.3,oauthlib==3.2.1,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@303ffe4f33c7a0fcc6b5c267d402c0e7d44e5a57#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,packaging==21.3,pandas==1.5.0,paramiko==2.11.0,pbr==5.10.0,Pillow==9.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,protobuf==3.20.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.13.0,pyinotify==0.9.6,pymacaroons==0.13.0,pymongo==3.12.3,PyNaCl==1.5.0,pyparsing==3.0.9,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requests-mock==1.10.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,theblues==0.5.2,toposort==1.7,typing-inspect==0.8.0,typing_extensions==4.4.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,websocket-client==1.4.1,websockets==7.0,wrapt==1.14.1,zipp==3.9.0 cover run-test-pre: PYTHONHASHSEED='1385387968' cover run-test: commands[0] | sh -c 'rm -f nosetests.xml' cover run-test: commands[1] | coverage erase cover run-test: commands[2] | nose2 -C --coverage osm_mon ...............ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get Metrics data from vROPS for 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' .ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Exception while parsing metrics data from vROPS Extra data: line 1 column 5 (char 4) Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 158, in get_metrics m_data = json.loads(resp.content.decode("utf-8")) File "/usr/lib/python3.8/json/__init__.py", line 357, in loads return _default_decoder.decode(s) File "/usr/lib/python3.8/json/decoder.py", line 340, in decode raise JSONDecodeError("Extra data", s, end) json.decoder.JSONDecodeError: Extra data: line 1 column 5 (char 4) ....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:get_vm_resource_id: Error in parsing Expecting property name enclosed in double quotes: line 2 column 2 (char 3) Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 92, in get_vm_resource_list_from_vrops resp_data = json.loads(resp.content.decode("utf-8")) File "/usr/lib/python3.8/json/__init__.py", line 357, in loads return _default_decoder.decode(s) File "/usr/lib/python3.8/json/decoder.py", line 337, in decode obj, end = self.raw_decode(s, idx=_w(s, 0).end()) File "/usr/lib/python3.8/json/decoder.py", line 353, in raw_decode obj, end = self.scan_once(s, idx) json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 2 column 2 (char 3) .ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' ....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' ..ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to find vm_moref_id from vApp UUID: 1234 .WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred while getting VM moref ID for VM: Testing Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vmware.py", line 114, in get_vm_moref_id vm_details = self.get_vapp_details_rest(vapp_uuid) File "", line 3, in get_vapp_details_rest File "/usr/lib/python3.8/unittest/mock.py", line 1081, in __call__ return self._mock_call(*args, **kwargs) File "/usr/lib/python3.8/unittest/mock.py", line 1085, in _mock_call return self._execute_mock_call(*args, **kwargs) File "/usr/lib/python3.8/unittest/mock.py", line 1140, in _execute_mock_call raise effect Exception: Testing ...ERROR:osm_mon.collector.vnf_collectors.vmware:REST API call https://vcd/api/vApp/vapp- failed. Return status code b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n' .WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred for getting vApp details: syntax error: line 1, column 0 Traceback (most recent call last): File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vmware.py", line 177, in get_vapp_details_rest xmlroot_respond = XmlElementTree.fromstring(response.content) File "/usr/lib/python3.8/xml/etree/ElementTree.py", line 1320, in XML parser.feed(text) xml.etree.ElementTree.ParseError: syntax error: line 1, column 0 .ERROR:osm_mon.collector.vnf_collectors.vmware:Can't connect to a vCloud director as: with exception HTTPSConnectionPool(host='vcd', port=443): Max retries exceeded with url: /api/versions (Caused by NewConnectionError(': Failed to establish a new connection: [Errno -2] Name or service not known')) ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to connect to vCD ................WARNING:osm_mon.evaluator.service:No metric result for alarm ................ ---------------------------------------------------------------------- Ran 65 tests in 0.824s OK Name Stmts Miss Cover ---------------------------------------------------------------------------------------------- osm_mon/__init__.py 0 0 100% osm_mon/cmd/__init__.py 0 0 100% osm_mon/cmd/mon_collector.py 32 32 0% osm_mon/cmd/mon_dashboarder.py 35 35 0% osm_mon/cmd/mon_evaluator.py 32 32 0% osm_mon/cmd/mon_healthcheck.py 38 38 0% osm_mon/cmd/mon_server.py 34 34 0% osm_mon/cmd/mon_utils.py 44 44 0% osm_mon/collector/__init__.py 0 0 100% osm_mon/collector/backends/__init__.py 0 0 100% osm_mon/collector/backends/base.py 3 3 0% osm_mon/collector/backends/prometheus.py 36 36 0% osm_mon/collector/collector.py 27 27 0% osm_mon/collector/infra_collectors/__init__.py 0 0 100% osm_mon/collector/infra_collectors/base.py 5 1 80% osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20% osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80% osm_mon/collector/infra_collectors/base_vim.py 5 1 80% osm_mon/collector/infra_collectors/onos.py 41 27 34% osm_mon/collector/infra_collectors/openstack.py 5 1 80% osm_mon/collector/infra_collectors/vio.py 5 1 80% osm_mon/collector/infra_collectors/vmware.py 133 114 14% osm_mon/collector/metric.py 5 0 100% osm_mon/collector/service.py 140 77 45% osm_mon/collector/utils/__init__.py 0 0 100% osm_mon/collector/utils/openstack.py 48 5 90% osm_mon/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/base.py 8 1 88% osm_mon/collector/vnf_collectors/base_vim.py 5 0 100% osm_mon/collector/vnf_collectors/juju.py 72 57 21% osm_mon/collector/vnf_collectors/openstack.py 211 114 46% osm_mon/collector/vnf_collectors/vio.py 42 3 93% osm_mon/collector/vnf_collectors/vmware.py 121 11 91% osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100% osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 96 2 98% osm_mon/collector/vnf_metric.py 10 0 100% osm_mon/core/__init__.py 0 0 100% osm_mon/core/common_db.py 113 46 59% osm_mon/core/config.py 39 11 72% osm_mon/core/exceptions.py 6 0 100% osm_mon/core/keystone.py 34 34 0% osm_mon/core/message_bus_client.py 22 3 86% osm_mon/core/models.py 29 0 100% osm_mon/core/response.py 25 15 40% osm_mon/core/utils.py 12 12 0% osm_mon/dashboarder/__init__.py 0 0 100% osm_mon/dashboarder/dashboarder.py 100 100 0% osm_mon/dashboarder/service.py 190 190 0% osm_mon/evaluator/__init__.py 0 0 100% osm_mon/evaluator/backends/__init__.py 0 0 100% osm_mon/evaluator/backends/base.py 6 1 83% osm_mon/evaluator/backends/prometheus.py 51 20 61% osm_mon/evaluator/evaluator.py 53 20 62% osm_mon/evaluator/service.py 51 5 90% osm_mon/server/__init__.py 0 0 100% osm_mon/server/server.py 63 63 0% osm_mon/server/service.py 22 22 0% osm_mon/tests/__init__.py 0 0 100% osm_mon/tests/unit/__init__.py 0 0 100% osm_mon/tests/unit/collector/__init__.py 0 0 100% osm_mon/tests/unit/collector/test_collector.py 8 3 62% osm_mon/tests/unit/collector/test_collector_service.py 51 0 100% osm_mon/tests/unit/collector/utils/__init__.py 0 0 100% osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100% osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100% osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100% osm_mon/tests/unit/core/__init__.py 0 0 100% osm_mon/tests/unit/core/test_common_db_client.py 71 0 100% osm_mon/tests/unit/core/test_message_bus_client.py 41 1 98% osm_mon/tests/unit/evaluator/__init__.py 0 0 100% osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100% osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100% osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100% osm_mon/tests/unit/server/__init__.py 0 0 100% osm_mon/tests/unit/server/test_server_service.py 10 0 100% ---------------------------------------------------------------------------------------------- TOTAL 2923 1329 55% cover run-test: commands[3] | coverage report '--omit=*tests*' Name Stmts Miss Cover ---------------------------------------------------------------------------- osm_mon/__init__.py 0 0 100% osm_mon/cmd/__init__.py 0 0 100% osm_mon/cmd/mon_collector.py 32 32 0% osm_mon/cmd/mon_dashboarder.py 35 35 0% osm_mon/cmd/mon_evaluator.py 32 32 0% osm_mon/cmd/mon_healthcheck.py 38 38 0% osm_mon/cmd/mon_server.py 34 34 0% osm_mon/cmd/mon_utils.py 44 44 0% osm_mon/collector/__init__.py 0 0 100% osm_mon/collector/backends/__init__.py 0 0 100% osm_mon/collector/backends/base.py 3 3 0% osm_mon/collector/backends/prometheus.py 36 36 0% osm_mon/collector/collector.py 27 27 0% osm_mon/collector/infra_collectors/__init__.py 0 0 100% osm_mon/collector/infra_collectors/base.py 5 1 80% osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20% osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80% osm_mon/collector/infra_collectors/base_vim.py 5 1 80% osm_mon/collector/infra_collectors/onos.py 41 27 34% osm_mon/collector/infra_collectors/openstack.py 5 1 80% osm_mon/collector/infra_collectors/vio.py 5 1 80% osm_mon/collector/infra_collectors/vmware.py 133 114 14% osm_mon/collector/metric.py 5 0 100% osm_mon/collector/service.py 140 77 45% osm_mon/collector/utils/__init__.py 0 0 100% osm_mon/collector/utils/openstack.py 48 5 90% osm_mon/collector/vnf_collectors/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/base.py 8 1 88% osm_mon/collector/vnf_collectors/base_vim.py 5 0 100% osm_mon/collector/vnf_collectors/juju.py 72 57 21% osm_mon/collector/vnf_collectors/openstack.py 211 114 46% osm_mon/collector/vnf_collectors/vio.py 42 3 93% osm_mon/collector/vnf_collectors/vmware.py 121 11 91% osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100% osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100% osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 96 2 98% osm_mon/collector/vnf_metric.py 10 0 100% osm_mon/core/__init__.py 0 0 100% osm_mon/core/common_db.py 113 46 59% osm_mon/core/config.py 39 11 72% osm_mon/core/exceptions.py 6 0 100% osm_mon/core/keystone.py 34 34 0% osm_mon/core/message_bus_client.py 22 3 86% osm_mon/core/models.py 29 0 100% osm_mon/core/response.py 25 15 40% osm_mon/core/utils.py 12 12 0% osm_mon/dashboarder/__init__.py 0 0 100% osm_mon/dashboarder/dashboarder.py 100 100 0% osm_mon/dashboarder/service.py 190 190 0% osm_mon/evaluator/__init__.py 0 0 100% osm_mon/evaluator/backends/__init__.py 0 0 100% osm_mon/evaluator/backends/base.py 6 1 83% osm_mon/evaluator/backends/prometheus.py 51 20 61% osm_mon/evaluator/evaluator.py 53 20 62% osm_mon/evaluator/service.py 51 5 90% osm_mon/server/__init__.py 0 0 100% osm_mon/server/server.py 63 63 0% osm_mon/server/service.py 22 22 0% ---------------------------------------------------------------------------- TOTAL 2161 1324 39% cover run-test: commands[4] | coverage html -d ./cover '--omit=*tests*' Wrote HTML report to ./cover/index.html cover run-test: commands[5] | coverage xml -o coverage.xml '--omit=*tests*' Wrote XML report to coverage.xml ✔ OK pylint in 1 minute, 58.893 seconds pylint create: /tmp/.tox/pylint pylint installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-test.txt, pylint pylint develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0 pylint installed: aiokafka==0.7.2,appdirs==1.4.4,astroid==3.0.2,async-timeout==3.0.1,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,bcrypt==4.0.1,cachetools==5.2.0,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,coverage==6.5.0,cryptography==38.0.1,cycler==0.11.0,dataclasses==0.6,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.7,dogpile.cache==1.1.8,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,google-auth==2.12.0,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,isort==5.13.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,juju==3.0.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,kubernetes==24.2.0,lxml==4.9.1,macaroonbakery==1.3.1,matplotlib==3.6.1,mccabe==0.7.0,mock==4.0.3,monotonic==1.6,motor==1.3.1,msgpack==1.0.4,munch==2.5.0,mypy-extensions==0.4.3,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@6eac0f117eca51b7970926f92f0b5a8abdd9ba4a#egg=N2VC,netaddr==0.8.0,netifaces==0.11.0,nose2==0.12.0,numpy==1.23.3,oauthlib==3.2.1,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@303ffe4f33c7a0fcc6b5c267d402c0e7d44e5a57#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@02814d96d20cf07d89c123b9f8eb10064f4b5d09#egg=osm_mon,packaging==21.3,pandas==1.5.0,paramiko==2.11.0,pbr==5.10.0,Pillow==9.2.0,platformdirs==4.1.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,protobuf==3.20.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.13.0,pyinotify==0.9.6,pylint==3.0.3,pymacaroons==0.13.0,pymongo==3.12.3,PyNaCl==1.5.0,pyparsing==3.0.9,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requests-mock==1.10.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.3,toposort==1.7,typing-inspect==0.8.0,typing_extensions==4.4.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,websocket-client==1.4.1,websockets==7.0,wrapt==1.14.1,zipp==3.9.0 pylint run-test-pre: PYTHONHASHSEED='2276228417' pylint run-test: commands[0] | pylint -E osm_mon ___________________________________ summary ____________________________________ ERROR: black: parallel child exit code 1 cover: commands succeeded flake8: commands succeeded pylint: commands succeeded safety: commands succeeded [Pipeline] } [Pipeline] // stage [Pipeline] } $ docker stop --time=1 a73f58ad4d601825f8d5521af5fd85cfc5c6333d6aa03a5b00fdd3cd3c614c64 $ docker rm -f a73f58ad4d601825f8d5521af5fd85cfc5c6333d6aa03a5b00fdd3cd3c614c64 [Pipeline] // withDockerContainer [Pipeline] } [Pipeline] // node [Pipeline] End of Pipeline ERROR: script returned exit code 1 Finished: FAILURE