[MON-stage_2-merge_v13.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
✔ OK black in 14.348 seconds
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==23.2,pathspec==0.12.1,platformdirs==4.2.0,tomli==2.0.1,typing_extensions==4.9.0
black run-test-pre: PYTHONHASHSEED='1519727403'
black run-test: commands[0] | black --check --diff osm_mon/
All done! ✨ 🍰 ✨
82 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! ✨ 🍰 ✨
1 file would be left unchanged.
✔ OK flake8 in 17.224 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==5.0.4
flake8 develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
flake8 installed: flake8==5.0.4,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/MON.git@d9a11ddf8c375672e1e31800830776a2299488d2#egg=osm_mon,pycodestyle==2.9.1,pyflakes==2.5.0
flake8 run-test-pre: PYTHONHASHSEED='4246040459'
flake8 run-test: commands[0] | flake8 osm_mon/ setup.py
✔ OK safety in 1 minute, 37.764 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
safety installed: aiokafka==0.7.2,appdirs==1.4.4,attrs==22.1.0,Authlib==1.3.0,autopage==0.5.1,backports.zoneinfo==0.2.1,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,click==8.1.7,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,cryptography==38.0.1,cycler==0.11.0,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.8,dparse==0.6.4b0,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,Jinja2==3.1.3,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,lxml==4.9.1,markdown-it-py==3.0.0,MarkupSafe==2.1.4,marshmallow==3.20.2,matplotlib==3.6.1,mdurl==0.1.2,monotonic==1.6,msgpack==1.0.4,munch==2.5.0,netaddr==0.8.0,netifaces==0.11.0,numpy==1.23.3,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/MON.git@d9a11ddf8c375672e1e31800830776a2299488d2#egg=osm_mon,packaging==21.3,pandas==1.5.0,pbr==5.10.0,Pillow==9.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,pycparser==2.21,pydantic==1.10.14,Pygments==2.13.0,pyinotify==0.9.6,pyparsing==3.0.9,pyperclip==1.8.2,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.0,ruamel.yaml==0.18.5,ruamel.yaml.clib==0.2.8,safety==3.0.1,safety-schemas==0.0.1,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,tomli==2.0.1,typer==0.9.0,typing_extensions==4.9.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,wrapt==1.14.1,zipp==3.9.0
safety run-test-pre: PYTHONHASHSEED='1922765739'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.0.1[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/bin
-> /home/jenkins/workspace/MON-stage_2-merge_v13.0
-> /usr/lib/python3.8/lib-dynload
-> /usr/lib/python3.8
-> /tmp/.tox/safety/lib/python3.8/site-packages
-> /usr/lib/python38.zip
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 108 packages[0m
Timestamp [1m2024-02-01 09:52:32[0m
[1m 14[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in urllib3 version 1.26.12[0m
[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for
CVE-2023-43804: Urllib3 doesn't treat the 'Cookie' HTTP header special or
provide any helpers for managing cookies over HTTP, that is the
responsibility of the user. However, it is possible for a user to specify
a 'Cookie' header and unknowingly leak information via HTTP redirects to a
different origin if that user doesn't disable redirects explicitly.https:/
/github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61601/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61601 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 1.26.12[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in requests version 2.28.1[0m
[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a
product of how we use 'rebuild_proxies' to reattach the 'Proxy-
Authorization' header to requests. For HTTP connections sent through the
tunnel, the proxy will identify the header in the request itself and
remove it prior to forwarding to the destination server. However when sent
over HTTPS, the 'Proxy-Authorization' header must be sent in the CONNECT
request as the proxy has no visibility into the tunneled request. This
results in Requests forwarding proxy credentials to the destination server
unintentionally, allowing a malicious actor to potentially exfiltrate
sensitive information.
[1m CVE-2023-32681[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/58755/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 58755 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in fonttools version 4.37.4[0m
[1m Vulnerability ID: [0m61503
[1m Affected spec: [0m>=4.28.2,<4.43.0
[1m ADVISORY: [0mFonttools is affected by a XML External Entity Injection
(XXE) Vulnerability. As of fonttools>=4.28.2 the subsetting module has a
XML External Entity Injection (XXE) vulnerability which allows an attacker
to resolve arbitrary entities when a candidate font (OT-SVG fonts), which
contains a SVG table, is parsed. This allows attackers to include
arbitrary files from the filesystem fontTools is running on or make web
requests from the host system.
[1m CVE-2023-45139[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61503/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61503 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in dateparser version 1.1.1[0m
[1m Vulnerability ID: [0m62361
[1m Affected spec: [0m<1.1.6
[1m ADVISORY: [0mDateparser 1.1.6 includes a fix for a ReDoS
vulnerability in Spanish sentence splitting
regex.https://github.com/scrapinghub/dateparser/pull/1084
[1m PVE-2023-62361[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62361/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62361 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 38.0.1[0m
[1m Vulnerability ID: [0m53048
[1m Affected spec: [0m>=1.8,<39.0.1
[1m ADVISORY: [0mCryptography 39.0.1 includes a fix for CVE-2023-23931:
In affected versions 'Cipher.update_into' would accept Python objects
which implement the buffer protocol, but provide only immutable buffers.
This would allow immutable objects (such as 'bytes') to be mutated, thus
violating fundamental rules of Python and resulting in corrupted output.
This issue has been present since 'update_into' was originally introduced
in cryptography 1.8.https://github.com/pyca/cryptography/security/advisori
es/GHSA-w7pp-m8wf-vj6r
[1m CVE-2023-23931[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/53048/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 53048 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 38.0.1[0m
[1m Vulnerability ID: [0m59473
[1m Affected spec: [0m<41.0.2
[1m ADVISORY: [0mThe cryptography package before 41.0.2 for Python
mishandles SSH certificates that have critical options.
[1m CVE-2023-38325[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/59473/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 59473 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 38.0.1[0m
[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62556/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in certifi version 2022.9.24[0m
[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust
store. TrustCor's root certificates are being removed pursuant to an
investigation prompted by media reporting that TrustCor's ownership also
operated a business that produced spyware. Conclusions of Mozilla's
investigation can be found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/52365/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 52365 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in certifi version 2022.9.24[0m
[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root
certificates. e-Tugra's root certificates were subject to an investigation
prompted by reporting of security issues in their systems. Certifi
2023.07.22 removes root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/59956/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 59956 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pygments version 2.13.0[0m
[1m Vulnerability ID: [0m58910
[1m Affected spec: [0m<2.15.0
[1m ADVISORY: [0mPygments 2.15.0 includes a fix for CVE-2022-40896: The
regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
properties files were discovered to be vulnerable. As a result,
pygmentizing a maliciously-crafted file of these kinds would have resulted
in high resources consumption or crashing of the
application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
top-python-packages-part-2
[1m CVE-2022-40896[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/58910/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 58910 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 9.2.0[0m
[1m Vulnerability ID: [0m55182
[1m Affected spec: [0m>=9.1.0,<9.3.0
[1m ADVISORY: [0mPillow 9.3.0 includes a security fix: Pillow will now
decode the data in its natural CMYK mode, then convert it to RGB and
rearrange the channels afterwards. Trying to load the data in an incorrect
mode could result in a segmentation fault.https://pillow.readthedocs.io/en
/stable/releasenotes/9.3.0.html#decode-jpeg-compressed-blp1-data-in-
original-mode
[1m PVE-2023-55182[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/55182/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 55182 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 9.2.0[0m
[1m Vulnerability ID: [0m62156
[1m Affected spec: [0m<10.0.0
[1m ADVISORY: [0mPillow 10.0.0 includes a fix for CVE-2023-44271: Denial
of Service that uncontrollably allocates memory to process a given task,
potentially causing a service to crash by having it run out of memory.
This occurs for truetype in ImageFont when textlength in an ImageDraw
instance operates on a long text argument.https://github.com/python-
pillow/Pillow/pull/7244
[1m CVE-2023-44271[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62156/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62156 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pillow version 9.2.0[0m
[1m Vulnerability ID: [0m51886
[1m Affected spec: [0m>=9.2.0,<9.3.0
[1m ADVISORY: [0mPillow before 9.3.0 allows denial of service via SAMPLES
PERPIXEL.https://pillow.readthedocs.io/en/stable/releasenotes/9.3.0.html#l
imit-samplesperpixel-to-avoid-runtime-dos
[1m CVE-2022-45199[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51886/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51886 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
14 vulnerabilities were reported in 8 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 14 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
✔ OK cover in 2 minutes, 21.002 seconds
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-test.txt
cover develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
cover installed: aiokafka==0.7.2,appdirs==1.4.4,async-timeout==3.0.1,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,bcrypt==4.0.1,cachetools==5.2.0,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,coverage==6.5.0,cryptography==38.0.1,cycler==0.11.0,dataclasses==0.6,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.8,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,google-auth==2.12.0,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,juju==3.0.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,kubernetes==24.2.0,lxml==4.9.1,macaroonbakery==1.3.1,matplotlib==3.6.1,mock==4.0.3,monotonic==1.6,motor==1.3.1,msgpack==1.0.4,munch==2.5.0,mypy-extensions==0.4.3,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@bd201f56f9719f77ffd1b6dd041738ef0a4a8002#egg=N2VC,netaddr==0.8.0,netifaces==0.11.0,nose2==0.12.0,numpy==1.23.3,oauthlib==3.2.1,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@c9512e2208ab7cc27d1cd312195f017cf834d88e#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@d9a11ddf8c375672e1e31800830776a2299488d2#egg=osm_mon,packaging==21.3,pandas==1.5.0,paramiko==2.11.0,pbr==5.10.0,Pillow==9.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,protobuf==3.20.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.13.0,pyinotify==0.9.6,pymacaroons==0.13.0,pymongo==3.12.3,PyNaCl==1.5.0,pyparsing==3.0.9,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requests-mock==1.10.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,theblues==0.5.2,toposort==1.7,typing-inspect==0.8.0,typing_extensions==4.4.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,websocket-client==1.4.1,websockets==7.0,wrapt==1.14.1,zipp==3.9.0
cover run-test-pre: PYTHONHASHSEED='3603373129'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage osm_mon
...............ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get Metrics data from vROPS for 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Exception while parsing metrics data from vROPS Extra data: line 1 column 5 (char 4)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 158, in get_metrics
m_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.8/json/__init__.py", line 357, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.8/json/decoder.py", line 340, in decode
raise JSONDecodeError("Extra data", s, end)
json.decoder.JSONDecodeError: Extra data: line 1 column 5 (char 4)
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:get_vm_resource_id: Error in parsing Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vrops/vrops_helper.py", line 92, in get_vm_resource_list_from_vrops
resp_data = json.loads(resp.content.decode("utf-8"))
File "/usr/lib/python3.8/json/__init__.py", line 357, in loads
return _default_decoder.decode(s)
File "/usr/lib/python3.8/json/decoder.py", line 337, in decode
obj, end = self.raw_decode(s, idx=_w(s, 0).end())
File "/usr/lib/python3.8/json/decoder.py", line 353, in raw_decode
obj, end = self.scan_once(s, idx)
json.decoder.JSONDecodeError: Expecting property name enclosed in double quotes: line 2 column 2 (char 3)
.ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
....ERROR:osm_mon.collector.vnf_collectors.vrops.vrops_helper:Failed to get resource list from vROPS: 404 b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
..ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to find vm_moref_id from vApp UUID: 1234
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred while getting VM moref ID for VM: Testing
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vmware.py", line 114, in get_vm_moref_id
vm_details = self.get_vapp_details_rest(vapp_uuid)
File "<string>", line 3, in get_vapp_details_rest
File "/usr/lib/python3.8/unittest/mock.py", line 1081, in __call__
return self._mock_call(*args, **kwargs)
File "/usr/lib/python3.8/unittest/mock.py", line 1085, in _mock_call
return self._execute_mock_call(*args, **kwargs)
File "/usr/lib/python3.8/unittest/mock.py", line 1140, in _execute_mock_call
raise effect
Exception: Testing
...ERROR:osm_mon.collector.vnf_collectors.vmware:REST API call https://vcd/api/vApp/vapp- failed. Return status code b'404 NOT FOUND\n\n Copyright 2016-2019 VMware Inc.\n This file is part of ETSI OSM\n All Rights Reserved.\n\n Licensed under the Apache License, Version 2.0 (the "License"); you may\n not use this file except in compliance with the License. You may obtain\n a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\n Unless required by applicable law or agreed to in writing, software\n distributed under the License is distributed on an "AS IS" BASIS, WITHOUT\n WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the\n License for the specific language governing permissions and limitations\n under the License.\n\n For those usages not covered by the Apache License, Version 2.0 please\n contact: osslegalrouting@vmware.com\n'
.WARNING:osm_mon.collector.vnf_collectors.vmware:Error occurred for getting vApp details: syntax error: line 1, column 0
Traceback (most recent call last):
File "/home/jenkins/workspace/MON-stage_2-merge_v13.0/osm_mon/collector/vnf_collectors/vmware.py", line 177, in get_vapp_details_rest
xmlroot_respond = XmlElementTree.fromstring(response.content)
File "/usr/lib/python3.8/xml/etree/ElementTree.py", line 1320, in XML
parser.feed(text)
xml.etree.ElementTree.ParseError: syntax error: line 1, column 0
.ERROR:osm_mon.collector.vnf_collectors.vmware:Can't connect to a vCloud director as: with exception HTTPSConnectionPool(host='vcd', port=443): Max retries exceeded with url: /api/versions (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f33926aaa60>: Failed to establish a new connection: [Errno -2] Name or service not known'))
ERROR:osm_mon.collector.vnf_collectors.vmware:Failed to connect to vCD
................WARNING:osm_mon.evaluator.service:No metric result for alarm <Mock name='mock.uuid' id='139859486193696'>
................
----------------------------------------------------------------------
Ran 65 tests in 0.856s
OK
Name Stmts Miss Cover
----------------------------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 34 34 0%
osm_mon/cmd/mon_utils.py 44 44 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 27 27 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 133 114 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 72 57 21%
osm_mon/collector/vnf_collectors/openstack.py 211 114 46%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 96 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 22 3 86%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 100 100 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 53 20 62%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 63 63 0%
osm_mon/server/service.py 22 22 0%
osm_mon/tests/__init__.py 0 0 100%
osm_mon/tests/unit/__init__.py 0 0 100%
osm_mon/tests/unit/collector/__init__.py 0 0 100%
osm_mon/tests/unit/collector/test_collector.py 8 3 62%
osm_mon/tests/unit/collector/test_collector_service.py 51 0 100%
osm_mon/tests/unit/collector/utils/__init__.py 0 0 100%
osm_mon/tests/unit/collector/utils/test_openstack.py 72 0 100%
osm_mon/tests/unit/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/test_openstack.py 70 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/__init__.py 0 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/mock_http.py 9 1 89%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vcd_collector.py 138 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vio_collector.py 68 0 100%
osm_mon/tests/unit/collector/vnf_collectors/vmware/test_vrops_helper.py 126 0 100%
osm_mon/tests/unit/core/__init__.py 0 0 100%
osm_mon/tests/unit/core/test_common_db_client.py 71 0 100%
osm_mon/tests/unit/core/test_message_bus_client.py 41 1 98%
osm_mon/tests/unit/evaluator/__init__.py 0 0 100%
osm_mon/tests/unit/evaluator/test_evaluator.py 23 0 100%
osm_mon/tests/unit/evaluator/test_evaluator_service.py 56 0 100%
osm_mon/tests/unit/evaluator/test_prometheus.py 19 0 100%
osm_mon/tests/unit/server/__init__.py 0 0 100%
osm_mon/tests/unit/server/test_server_service.py 10 0 100%
----------------------------------------------------------------------------------------------
TOTAL 2923 1329 55%
cover run-test: commands[3] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
----------------------------------------------------------------------------
osm_mon/__init__.py 0 0 100%
osm_mon/cmd/__init__.py 0 0 100%
osm_mon/cmd/mon_collector.py 32 32 0%
osm_mon/cmd/mon_dashboarder.py 35 35 0%
osm_mon/cmd/mon_evaluator.py 32 32 0%
osm_mon/cmd/mon_healthcheck.py 38 38 0%
osm_mon/cmd/mon_server.py 34 34 0%
osm_mon/cmd/mon_utils.py 44 44 0%
osm_mon/collector/__init__.py 0 0 100%
osm_mon/collector/backends/__init__.py 0 0 100%
osm_mon/collector/backends/base.py 3 3 0%
osm_mon/collector/backends/prometheus.py 36 36 0%
osm_mon/collector/collector.py 27 27 0%
osm_mon/collector/infra_collectors/__init__.py 0 0 100%
osm_mon/collector/infra_collectors/base.py 5 1 80%
osm_mon/collector/infra_collectors/base_osinfra.py 106 85 20%
osm_mon/collector/infra_collectors/base_sdnc.py 5 1 80%
osm_mon/collector/infra_collectors/base_vim.py 5 1 80%
osm_mon/collector/infra_collectors/onos.py 41 27 34%
osm_mon/collector/infra_collectors/openstack.py 5 1 80%
osm_mon/collector/infra_collectors/vio.py 5 1 80%
osm_mon/collector/infra_collectors/vmware.py 133 114 14%
osm_mon/collector/metric.py 5 0 100%
osm_mon/collector/service.py 140 77 45%
osm_mon/collector/utils/__init__.py 0 0 100%
osm_mon/collector/utils/openstack.py 48 5 90%
osm_mon/collector/vnf_collectors/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/base.py 8 1 88%
osm_mon/collector/vnf_collectors/base_vim.py 5 0 100%
osm_mon/collector/vnf_collectors/juju.py 72 57 21%
osm_mon/collector/vnf_collectors/openstack.py 211 114 46%
osm_mon/collector/vnf_collectors/vio.py 42 3 93%
osm_mon/collector/vnf_collectors/vmware.py 121 11 91%
osm_mon/collector/vnf_collectors/vrops/__init__.py 0 0 100%
osm_mon/collector/vnf_collectors/vrops/metrics.py 1 0 100%
osm_mon/collector/vnf_collectors/vrops/vrops_helper.py 96 2 98%
osm_mon/collector/vnf_metric.py 10 0 100%
osm_mon/core/__init__.py 0 0 100%
osm_mon/core/common_db.py 113 46 59%
osm_mon/core/config.py 39 11 72%
osm_mon/core/exceptions.py 6 0 100%
osm_mon/core/keystone.py 34 34 0%
osm_mon/core/message_bus_client.py 22 3 86%
osm_mon/core/models.py 29 0 100%
osm_mon/core/response.py 25 15 40%
osm_mon/core/utils.py 12 12 0%
osm_mon/dashboarder/__init__.py 0 0 100%
osm_mon/dashboarder/dashboarder.py 100 100 0%
osm_mon/dashboarder/service.py 190 190 0%
osm_mon/evaluator/__init__.py 0 0 100%
osm_mon/evaluator/backends/__init__.py 0 0 100%
osm_mon/evaluator/backends/base.py 6 1 83%
osm_mon/evaluator/backends/prometheus.py 51 20 61%
osm_mon/evaluator/evaluator.py 53 20 62%
osm_mon/evaluator/service.py 51 5 90%
osm_mon/server/__init__.py 0 0 100%
osm_mon/server/server.py 63 63 0%
osm_mon/server/service.py 22 22 0%
----------------------------------------------------------------------------
TOTAL 2161 1324 39%
cover run-test: commands[4] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[5] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
✔ OK pylint in 2 minutes, 30.614 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/MON-stage_2-merge_v13.0/requirements-test.txt, pylint
pylint develop-inst: /home/jenkins/workspace/MON-stage_2-merge_v13.0
pylint installed: aiokafka==0.7.2,appdirs==1.4.4,astroid==3.0.2,async-timeout==3.0.1,attrs==22.1.0,autopage==0.5.1,backports.zoneinfo==0.2.1,bcrypt==4.0.1,cachetools==5.2.0,certifi==2022.9.24,cffi==1.15.1,charset-normalizer==2.1.1,cliff==4.0.0,cmd2==2.4.2,contourpy==1.0.5,coverage==6.5.0,cryptography==38.0.1,cycler==0.11.0,dataclasses==0.6,dateparser==1.1.1,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dogpile.cache==1.1.8,fonttools==4.37.4,futurist==2.4.1,gnocchiclient==7.0.7,google-auth==2.12.0,httmock==1.4.0,humanfriendly==10.0,idna==3.4,importlib-metadata==5.0.0,iso8601==1.1.0,isort==5.13.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,juju==3.0.0,jujubundlelib==0.5.7,kafka-python==2.0.2,keystoneauth1==5.0.0,kiwisolver==1.4.4,kubernetes==24.2.0,lxml==4.9.1,macaroonbakery==1.3.1,matplotlib==3.6.1,mccabe==0.7.0,mock==4.0.3,monotonic==1.6,motor==1.3.1,msgpack==1.0.4,munch==2.5.0,mypy-extensions==0.4.3,-e git+https://osm.etsi.org/gerrit/osm/N2VC.git@bd201f56f9719f77ffd1b6dd041738ef0a4a8002#egg=N2VC,netaddr==0.8.0,netifaces==0.11.0,nose2==0.12.0,numpy==1.23.3,oauthlib==3.2.1,openstacksdk==0.101.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.2,oslo.config==9.0.0,oslo.context==5.0.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==5.0.0,oslo.utils==6.0.1,-e git+https://osm.etsi.org/gerrit/osm/common.git@c9512e2208ab7cc27d1cd312195f017cf834d88e#egg=osm_common,-e git+https://osm.etsi.org/gerrit/osm/MON.git@d9a11ddf8c375672e1e31800830776a2299488d2#egg=osm_mon,packaging==21.3,pandas==1.5.0,paramiko==2.11.0,pbr==5.10.0,Pillow==9.2.0,platformdirs==4.2.0,prettytable==0.7.2,prometheus-api-client==0.5.1,prometheus-client==0.14.1,protobuf==3.20.3,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.13.0,pyinotify==0.9.6,pylint==3.0.3,pymacaroons==0.13.0,pymongo==3.12.3,PyNaCl==1.5.0,pyparsing==3.0.9,pyperclip==1.8.2,pyRFC3339==1.1,python-ceilometerclient==2.9.0,python-cinderclient==8.3.0,python-dateutil==2.8.2,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,pytz==2022.4,pytz-deprecation-shim==0.1.0.post0,pyvcloud==23.0.4,PyYAML==5.4.1,regex==2022.3.2,requests==2.28.1,requests-mock==1.10.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,retrying-async==2.0.0,rfc3986==2.0.0,rsa==4.9,simplejson==3.17.6,six==1.16.0,stevedore==4.0.0,theblues==0.5.2,tomli==2.0.1,tomlkit==0.12.3,toposort==1.7,typing-inspect==0.8.0,typing_extensions==4.4.0,tzdata==2022.4,tzlocal==4.2,ujson==5.5.0,unittest-xml-reporting==3.2.0,urllib3==1.26.12,vcd-api-schemas-type==10.3.0.dev72,wcwidth==0.2.5,websocket-client==1.4.1,websockets==7.0,wrapt==1.14.1,zipp==3.9.0
pylint run-test-pre: PYTHONHASHSEED='727591458'
pylint run-test: commands[0] | pylint -E osm_mon
___________________________________ summary ____________________________________
black: commands succeeded
cover: commands succeeded
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
congratulations :)