[POL-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
✔ OK black in 20.357 seconds
black create: /tmp/.tox/black
black installdeps: black
black installed: black==24.4.0,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.0,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='1380376038'
black run-test: commands[0] | black --check --diff osm_policy_module/
All done! ✨ 🍰 ✨
47 files would be left unchanged.
black run-test: commands[1] | black --check --diff setup.py
All done! ✨ 🍰 ✨
1 file would be left unchanged.
✔ OK flake8 in 24.095 seconds
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8
flake8 develop-inst: /home/jenkins/workspace/POL-stage_2-merge_v12.0
flake8 installed: flake8==7.0.0,mccabe==0.7.0,-e git+https://osm.etsi.org/gerrit/osm/POL.git@90c437db951c5d9cebac47c65f7aefd2cf6e7577#egg=osm_policy_module,pycodestyle==2.11.1,pyflakes==3.2.0
flake8 run-test-pre: PYTHONHASHSEED='3790434200'
flake8 run-test: commands[0] | flake8 osm_policy_module/ setup.py
✔ OK safety in 1 minute, 2.616 seconds
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements.txt, safety
safety develop-inst: /home/jenkins/workspace/POL-stage_2-merge_v12.0
safety installed: aiokafka==0.7.2,annotated-types==0.6.0,Authlib==1.3.0,cached-property==1.5.2,certifi==2022.6.15,cffi==1.16.0,charset-normalizer==2.0.12,click==8.1.3,cryptography==42.0.5,dparse==0.6.4b0,idna==3.3,Jinja2==3.1.3,jsonschema==2.6.0,kafka-python==2.0.2,markdown-it-py==3.0.0,MarkupSafe==2.1.5,marshmallow==3.21.1,mdurl==0.1.2,mock==4.0.3,-e git+https://osm.etsi.org/gerrit/osm/POL.git@90c437db951c5d9cebac47c65f7aefd2cf6e7577#egg=osm_policy_module,packaging==24.0,peewee==3.8.2,peewee-migrate==1.1.6,pycparser==2.22,pydantic==2.7.0,pydantic_core==2.18.1,Pygments==2.17.2,PyMySQL==0.9.3,PyYAML==5.4.1,requests==2.28.0,rich==13.7.1,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.1.0,safety-schemas==0.0.2,shellingham==1.5.4,tomli==2.0.1,typer==0.12.3,typing_extensions==4.11.0,urllib3==1.26.9
safety run-test-pre: PYTHONHASHSEED='3083277123'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.1.0[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /usr/lib/python3.8/lib-dynload
-> /tmp/.tox/safety/bin
-> /home/jenkins/workspace/POL-stage_2-merge_v12.0
-> /usr/lib/python3.8
-> /usr/lib/python38.zip
-> /tmp/.tox/safety/lib/python3.8/site-packages
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 43 packages[0m
Timestamp [1m2024-04-18 08:27:57[0m
[1m 6[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in urllib3 version 1.26.9[0m
[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for
CVE-2023-43804: Urllib3 doesn't treat the 'Cookie' HTTP header special or
provide any helpers for managing cookies over HTTP, that is the
responsibility of the user. However, it is possible for a user to specify
a 'Cookie' header and unknowingly leak information via HTTP redirects to a
different origin if that user doesn't disable redirects explicitly.https:/
/github.com/urllib3/urllib3/security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61601/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61601 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 1.26.9[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in requests version 2.28.0[0m
[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a
product of how we use 'rebuild_proxies' to reattach the 'Proxy-
Authorization' header to requests. For HTTP connections sent through the
tunnel, the proxy will identify the header in the request itself and
remove it prior to forwarding to the destination server. However when sent
over HTTPS, the 'Proxy-Authorization' header must be sent in the CONNECT
request as the proxy has no visibility into the tunneled request. This
results in Requests forwarding proxy credentials to the destination server
unintentionally, allowing a malicious actor to potentially exfiltrate
sensitive information.
[1m CVE-2023-32681[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/58755/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 58755 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in peewee version 3.8.2[0m
[1m Vulnerability ID: [0m64952
[1m Affected spec: [0m<3.17.1
[1m ADVISORY: [0mPeewee 3.17.1 introduces enhancements to address a race
condition issue by implementing stricter locking mechanisms around pool
connection management.https://github.com/coleifer/peewee/commit/ea3fb11a9c
2a4b0cd958a453dd287e408477eda5
[1m PVE-2024-64952[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64952/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64952 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in certifi version 2022.6.15[0m
[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root
certificates. e-Tugra's root certificates were subject to an investigation
prompted by reporting of security issues in their systems. Certifi
2023.07.22 removes root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/59956/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 59956 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in certifi version 2022.6.15[0m
[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust
store. TrustCor's root certificates are being removed pursuant to an
investigation prompted by media reporting that TrustCor's ownership also
operated a business that produced spyware. Conclusions of Mozilla's
investigation can be found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/52365/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 52365 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
6 vulnerabilities were reported in 4 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 6 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/cover/log/cover-0.log
================================== log start ===================================
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements-test.txt
cover develop-inst: /home/jenkins/workspace/POL-stage_2-merge_v12.0
cover installed: aiokafka==0.7.2,cached-property==1.5.2,certifi==2022.6.15,charset-normalizer==2.0.12,click==8.1.3,coverage==6.4.1,dataclasses==0.6,idna==3.3,jsonschema==2.6.0,kafka-python==2.0.2,mock==4.0.3,nose2==0.11.0,osm_common @ git+https://osm.etsi.org/gerrit/osm/common.git@6aaeaa389273ec46b469f79f3c9b47cf3249bd74,-e git+https://osm.etsi.org/gerrit/osm/POL.git@90c437db951c5d9cebac47c65f7aefd2cf6e7577#egg=osm_policy_module,peewee==3.8.2,peewee-migrate==1.1.6,pycrypto==2.6.1,pymongo==3.12.3,PyMySQL==0.9.3,PyYAML==5.4.1,requests==2.28.0,six==1.16.0,urllib3==1.26.9
cover run-test-pre: PYTHONHASHSEED='3363842308'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage osm_policy_module
INFO:osm_policy_module.alarming.service:Executing request to url http://alarm-url/ for vnf alarm test_id with status alarm
Executing request to url http://alarm-url/ for vnf alarm test_id with status alarm
Executing request to url http://alarm-url/ for vnf alarm test_id with status alarm
INFO:osm_policy_module.alarming.service:Response <MagicMock name='post()' id='140620393138832'>
Response <MagicMock name='post()' id='140620393138832'>
Response <MagicMock name='post()' id='140620393138832'>
..INFO:osm_policy_module.alarming.service:Executing request to url http://insufficient-data-url/ for vnf alarm test_id with status insufficient-data
Executing request to url http://insufficient-data-url/ for vnf alarm test_id with status insufficient-data
Executing request to url http://insufficient-data-url/ for vnf alarm test_id with status insufficient-data
INFO:osm_policy_module.alarming.service:Response <MagicMock name='post()' id='140620392912352'>
Response <MagicMock name='post()' id='140620392912352'>
Response <MagicMock name='post()' id='140620392912352'>
.INFO:osm_policy_module.alarming.service:Executing request to url http://ok-url/ for vnf alarm test_id with status ok
Executing request to url http://ok-url/ for vnf alarm test_id with status ok
Executing request to url http://ok-url/ for vnf alarm test_id with status ok
INFO:osm_policy_module.alarming.service:Response <MagicMock name='post()' id='140620393431200'>
Response <MagicMock name='post()' id='140620393431200'>
Response <MagicMock name='post()' id='140620393431200'>
...INFO:osm_policy_module.autoscaling.service:Sending scale_in action message for ns: test_nsr_id
Sending scale_in action message for ns: test_nsr_id
Sending scale_in action message for ns: test_nsr_id
.INFO:osm_policy_module.autoscaling.service:Sending scale_in action message for ns: test_nsr_id
Sending scale_in action message for ns: test_nsr_id
Sending scale_in action message for ns: test_nsr_id
.INFO:osm_policy_module.autoscaling.service:Sending scale_in action message for ns: test_nsr_id
Sending scale_in action message for ns: test_nsr_id
Sending scale_in action message for ns: test_nsr_id
..INFO:osm_policy_module.autoscaling.service:Sending scale_out action message for ns: test_nsr_id
Sending scale_out action message for ns: test_nsr_id
Sending scale_out action message for ns: test_nsr_id
.INFO:osm_policy_module.autoscaling.service:Sending scale_out action message for ns: test_nsr_id
Sending scale_out action message for ns: test_nsr_id
Sending scale_out action message for ns: test_nsr_id
.INFO:osm_policy_module.autoscaling.service:Sending scale_out action message for ns: test_nsr_id
Sending scale_out action message for ns: test_nsr_id
Sending scale_out action message for ns: test_nsr_id
.....INFO:osm_policy_module.healing.service:HealingService Initialized
HealingService Initialized
HealingService Initialized
INFO:osm_policy_module.healing.service:Constructor created for HealingService
Constructor created for HealingService
Constructor created for HealingService
.INFO:osm_policy_module.healing.service:HealingService Initialized
HealingService Initialized
HealingService Initialized
INFO:osm_policy_module.healing.service:Constructor created for HealingService
Constructor created for HealingService
Constructor created for HealingService
INFO:osm_policy_module.core.agent:Configuring nsr_id: test_nsr_id
Configuring nsr_id: test_nsr_id
Configuring nsr_id: test_nsr_id
INFO:osm_policy_module.core.agent:Network_service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
Network_service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
Network_service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
.INFO:osm_policy_module.healing.service:HealingService Initialized
HealingService Initialized
HealingService Initialized
INFO:osm_policy_module.healing.service:Constructor created for HealingService
Constructor created for HealingService
Constructor created for HealingService
INFO:osm_policy_module.core.agent:_handle_policy_update: {'nsr_id': 'test_nsr_id', 'vnf_member_index': '1', 'operationState': 'COMPLETED'}
_handle_policy_update: {'nsr_id': 'test_nsr_id', 'vnf_member_index': '1', 'operationState': 'COMPLETED'}
_handle_policy_update: {'nsr_id': 'test_nsr_id', 'vnf_member_index': '1', 'operationState': 'COMPLETED'}
INFO:osm_policy_module.core.agent:Updating policies of VNF with nsr_id: test_nsr_id and vnf-member-index: 1
Updating policies of VNF with nsr_id: test_nsr_id and vnf-member-index: 1
Updating policies of VNF with nsr_id: test_nsr_id and vnf-member-index: 1
INFO:osm_policy_module.core.agent:_handle_policy_update: {'nsr_id': 'test_nsr_id', 'vnf_member_index': '1', 'operationState': 'FAILED'}
_handle_policy_update: {'nsr_id': 'test_nsr_id', 'vnf_member_index': '1', 'operationState': 'FAILED'}
_handle_policy_update: {'nsr_id': 'test_nsr_id', 'vnf_member_index': '1', 'operationState': 'FAILED'}
INFO:osm_policy_module.core.agent:Network service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
Network service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
Network service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
.INFO:osm_policy_module.healing.service:HealingService Initialized
HealingService Initialized
HealingService Initialized
INFO:osm_policy_module.healing.service:Constructor created for HealingService
Constructor created for HealingService
Constructor created for HealingService
INFO:osm_policy_module.core.agent:Deleting policies of VNF with nsr_id: test_nsr_id and vnf-member-index: 1
Deleting policies of VNF with nsr_id: test_nsr_id and vnf-member-index: 1
Deleting policies of VNF with nsr_id: test_nsr_id and vnf-member-index: 1
INFO:osm_policy_module.core.agent:Network service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
Network service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
Network service is not in COMPLETED or PARTIALLY_COMPLETED state. Current state is FAILED. Skipping...
...EINFO:osm_policy_module.healing.service:HealingService Initialized
HealingService Initialized
HealingService Initialized
INFO:osm_policy_module.healing.service:Constructor created for HealingService
Constructor created for HealingService
Constructor created for HealingService
INFO:osm_policy_module.autoscaling.service:Configuring scaling groups for network service with nsr_id: test_nsr_id
Configuring scaling groups for network service with nsr_id: test_nsr_id
Configuring scaling groups for network service with nsr_id: test_nsr_id
EINFO:osm_policy_module.healing.service:HealingService Initialized
HealingService Initialized
HealingService Initialized
INFO:osm_policy_module.healing.service:Constructor created for HealingService
Constructor created for HealingService
Constructor created for HealingService
INFO:osm_policy_module.alarming.service:Configuring vnf alarms for network service test_nsr_id
Configuring vnf alarms for network service test_nsr_id
Configuring vnf alarms for network service test_nsr_id
ERROR:osm_policy_module.alarming.service:Error configuring VNF alarms:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
sqlite3.OperationalError: no such table: vnfalarm
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/alarming/service.py", line 85, in configure_vnf_alarms
VnfAlarmRepository.get(
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/core/database.py", line 224, in get
return VnfAlarm.select().where(*expressions).get()
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 6042, in get
return clone.execute(database)[0]
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1625, in inner
return method(self, database, *args, **kwargs)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1696, in execute
return self._execute(database)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1847, in _execute
cursor = database.execute(self)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2727, in execute
return self.execute_sql(sql, params, commit=commit)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2718, in execute_sql
raise
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2512, in __exit__
reraise(new_type, new_type(*exc_args), traceback)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 186, in reraise
raise value.with_traceback(tb)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
peewee.OperationalError: no such table: vnfalarm
Error configuring VNF alarms:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
sqlite3.OperationalError: no such table: vnfalarm
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/alarming/service.py", line 85, in configure_vnf_alarms
VnfAlarmRepository.get(
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/core/database.py", line 224, in get
return VnfAlarm.select().where(*expressions).get()
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 6042, in get
return clone.execute(database)[0]
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1625, in inner
return method(self, database, *args, **kwargs)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1696, in execute
return self._execute(database)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1847, in _execute
cursor = database.execute(self)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2727, in execute
return self.execute_sql(sql, params, commit=commit)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2718, in execute_sql
raise
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2512, in __exit__
reraise(new_type, new_type(*exc_args), traceback)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 186, in reraise
raise value.with_traceback(tb)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
peewee.OperationalError: no such table: vnfalarm
Error configuring VNF alarms:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
sqlite3.OperationalError: no such table: vnfalarm
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/alarming/service.py", line 85, in configure_vnf_alarms
VnfAlarmRepository.get(
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/core/database.py", line 224, in get
return VnfAlarm.select().where(*expressions).get()
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 6042, in get
return clone.execute(database)[0]
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1625, in inner
return method(self, database, *args, **kwargs)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1696, in execute
return self._execute(database)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1847, in _execute
cursor = database.execute(self)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2727, in execute
return self.execute_sql(sql, params, commit=commit)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2718, in execute_sql
raise
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2512, in __exit__
reraise(new_type, new_type(*exc_args), traceback)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 186, in reraise
raise value.with_traceback(tb)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
peewee.OperationalError: no such table: vnfalarm
EERROR:aiokafka:Unable connect to "kafka:9092": [Errno -2] Name or service not known
Unable connect to "kafka:9092": [Errno -2] Name or service not known
Unable connect to "kafka:9092": [Errno -2] Name or service not known
s
======================================================================
ERROR: test_configure_healing_alarms (osm_policy_module.tests.integration.test_policy_agent.PolicyModuleAgentTest)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
sqlite3.OperationalError: database is locked
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/tests/integration/test_policy_agent.py", line 475, in setUp
database.db.drop_tables(MODELS)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2875, in drop_tables
model.drop_table(**kwargs)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 5855, in drop_table
cls._schema.drop_all(safe, drop_sequences, **options)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 5081, in drop_all
self.drop_table(safe, **options)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 4970, in drop_table
self.database.execute(self._drop_table(safe=safe, **options))
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2727, in execute
return self.execute_sql(sql, params, commit=commit)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2718, in execute_sql
raise
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2512, in __exit__
reraise(new_type, new_type(*exc_args), traceback)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 186, in reraise
raise value.with_traceback(tb)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
peewee.OperationalError: database is locked
======================================================================
ERROR: test_configure_scaling_groups (osm_policy_module.tests.integration.test_policy_agent.PolicyModuleAgentTest)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/usr/lib/python3.8/unittest/mock.py", line 1325, in patched
return func(*newargs, **newkeywargs)
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/tests/integration/test_policy_agent.py", line 517, in test_configure_scaling_groups
self.loop.run_until_complete(
File "/usr/lib/python3.8/asyncio/base_events.py", line 616, in run_until_complete
return future.result()
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/autoscaling/service.py", line 83, in configure_scaling_groups
for vnfr in vnfrs:
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 3627, in __exit__
return self._helper.__exit__(exc_type, exc_val, exc_tb)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 3663, in __exit__
self.commit(False)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 3642, in commit
self.db.commit()
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2837, in commit
return self._state.conn.commit()
sqlite3.OperationalError: disk I/O error
======================================================================
ERROR: test_configure_vnf_alarms (osm_policy_module.tests.integration.test_policy_agent.PolicyModuleAgentTest)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
sqlite3.OperationalError: no such table: vnfalarm
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/usr/lib/python3.8/unittest/mock.py", line 1325, in patched
return func(*newargs, **newkeywargs)
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/tests/integration/test_policy_agent.py", line 585, in test_configure_vnf_alarms
self.loop.run_until_complete(
File "/usr/lib/python3.8/asyncio/base_events.py", line 616, in run_until_complete
return future.result()
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/alarming/service.py", line 178, in configure_vnf_alarms
raise e
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/alarming/service.py", line 85, in configure_vnf_alarms
VnfAlarmRepository.get(
File "/home/jenkins/workspace/POL-stage_2-merge_v12.0/osm_policy_module/core/database.py", line 224, in get
return VnfAlarm.select().where(*expressions).get()
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 6042, in get
return clone.execute(database)[0]
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1625, in inner
return method(self, database, *args, **kwargs)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1696, in execute
return self._execute(database)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 1847, in _execute
cursor = database.execute(self)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2727, in execute
return self.execute_sql(sql, params, commit=commit)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2718, in execute_sql
raise
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2512, in __exit__
reraise(new_type, new_type(*exc_args), traceback)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 186, in reraise
raise value.with_traceback(tb)
File "/tmp/.tox/cover/lib/python3.8/site-packages/peewee.py", line 2714, in execute_sql
cursor.execute(sql, params or ())
peewee.OperationalError: no such table: vnfalarm
ERROR:asyncio:Unclosed AIOKafkaProducer
producer: <aiokafka.producer.producer.AIOKafkaProducer object at 0x7fe4bc809400>
Unclosed AIOKafkaProducer
producer: <aiokafka.producer.producer.AIOKafkaProducer object at 0x7fe4bc809400>
Unclosed AIOKafkaProducer
producer: <aiokafka.producer.producer.AIOKafkaProducer object at 0x7fe4bc809400>
----------------------------------------------------------------------
Ran 27 tests in 12.925s
FAILED (errors=3, skipped=1)
Name Stmts Miss Cover
------------------------------------------------------------------------------------------
osm_policy_module/__init__.py 0 0 100%
osm_policy_module/alarming/__init__.py 0 0 100%
osm_policy_module/alarming/service.py 173 95 45%
osm_policy_module/autoscaling/__init__.py 0 0 100%
osm_policy_module/autoscaling/service.py 246 91 63%
osm_policy_module/cmd/__init__.py 0 0 100%
osm_policy_module/cmd/policy_module_agent.py 34 34 0%
osm_policy_module/cmd/policy_module_healthcheck.py 30 30 0%
osm_policy_module/common/__init__.py 0 0 100%
osm_policy_module/common/common_db_client.py 35 17 51%
osm_policy_module/common/lcm_client.py 45 25 44%
osm_policy_module/common/message_bus_client.py 22 2 91%
osm_policy_module/common/mon_client.py 81 63 22%
osm_policy_module/core/__init__.py 0 0 100%
osm_policy_module/core/agent.py 115 50 57%
osm_policy_module/core/config.py 39 11 72%
osm_policy_module/core/database.py 166 27 84%
osm_policy_module/core/exceptions.py 4 0 100%
osm_policy_module/healing/__init__.py 0 0 100%
osm_policy_module/healing/service.py 137 111 19%
osm_policy_module/migrations/001_initial.py 50 50 0%
osm_policy_module/migrations/002_add_vnf_alarm.py 25 25 0%
osm_policy_module/migrations/003_add_fields_to_policy.py 7 7 0%
osm_policy_module/migrations/004_add_fields_to_alarm.py 7 7 0%
osm_policy_module/migrations/005_change_vnf_index_member_to_str.py 11 11 0%
osm_policy_module/migrations/006_add_heal_alarm.py 24 24 0%
osm_policy_module/migrations/007_add_vnf_alarm_fields.py 7 7 0%
osm_policy_module/migrations/__init__.py 0 0 100%
osm_policy_module/migrations/conf.py 2 2 0%
osm_policy_module/tests/__init__.py 0 0 100%
osm_policy_module/tests/integration/__init__.py 0 0 100%
osm_policy_module/tests/integration/test_kafka_messages.py 44 14 68%
osm_policy_module/tests/integration/test_policy_agent.py 124 33 73%
osm_policy_module/tests/unit/__init__.py 0 0 100%
osm_policy_module/tests/unit/alarming/__init__.py 0 0 100%
osm_policy_module/tests/unit/alarming/test_alarming_service.py 83 6 93%
osm_policy_module/tests/unit/autoscaling/__init__.py 0 0 100%
osm_policy_module/tests/unit/autoscaling/test_autoscaling_service.py 177 0 100%
osm_policy_module/tests/unit/common/__init__.py 0 0 100%
osm_policy_module/tests/unit/common/test_message_bus_client.py 41 1 98%
osm_policy_module/tests/unit/core/__init__.py 0 0 100%
osm_policy_module/tests/unit/core/test_policy_agent.py 148 2 99%
osm_policy_module/tests/unit/utils/__init__.py 0 0 100%
osm_policy_module/tests/unit/utils/test_vnfd_utils.py 19 0 100%
osm_policy_module/utils/__init__.py 0 0 100%
osm_policy_module/utils/vnfd.py 14 0 100%
------------------------------------------------------------------------------------------
TOTAL 1910 745 61%
ERROR: InvocationError for command /tmp/.tox/cover/bin/nose2 -C --coverage osm_policy_module (exited with code 1)
=================================== log end ====================================
✖ FAIL cover in 1 minute, 15.452 seconds
✔ OK pylint in 1 minute, 35.353 seconds
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/POL-stage_2-merge_v12.0/requirements-test.txt, pylint
pylint develop-inst: /home/jenkins/workspace/POL-stage_2-merge_v12.0
pylint installed: aiokafka==0.7.2,astroid==3.1.0,cached-property==1.5.2,certifi==2022.6.15,charset-normalizer==2.0.12,click==8.1.3,coverage==6.4.1,dataclasses==0.6,dill==0.3.8,idna==3.3,isort==5.13.2,jsonschema==2.6.0,kafka-python==2.0.2,mccabe==0.7.0,mock==4.0.3,nose2==0.11.0,osm_common @ git+https://osm.etsi.org/gerrit/osm/common.git@6aaeaa389273ec46b469f79f3c9b47cf3249bd74,-e git+https://osm.etsi.org/gerrit/osm/POL.git@90c437db951c5d9cebac47c65f7aefd2cf6e7577#egg=osm_policy_module,peewee==3.8.2,peewee-migrate==1.1.6,platformdirs==4.2.0,pycrypto==2.6.1,pylint==3.1.0,pymongo==3.12.3,PyMySQL==0.9.3,PyYAML==5.4.1,requests==2.28.0,six==1.16.0,tomli==2.0.1,tomlkit==0.12.4,typing_extensions==4.11.0,urllib3==1.26.9
pylint run-test-pre: PYTHONHASHSEED='2207186817'
pylint run-test: commands[0] | - pylint -E osm_policy_module
************* Module osm_policy_module.alarming.service
osm_policy_module/alarming/service.py:188:29: E1133: Non-iterable value VnfAlarmRepository.list(VnfAlarm.nsr_id == nsr_id) is used in an iterating context (not-an-iterable)
osm_policy_module/alarming/service.py:226:29: E1133: Non-iterable value VnfAlarmRepository.list(alarm_conditions) is used in an iterating context (not-an-iterable)
osm_policy_module/alarming/service.py:319:39: E0701: Bad except clauses order (RequestException is an ancestor class of ConnectionError) (bad-except-order)
osm_policy_module/alarming/service.py:342:35: E0701: Bad except clauses order (RequestException is an ancestor class of ConnectionError) (bad-except-order)
************* Module osm_policy_module.healing.service
osm_policy_module/healing/service.py:157:29: E1133: Non-iterable value HealingActionRepository.list(HealingAction.nsr_id == nsr_id) is used in an iterating context (not-an-iterable)
osm_policy_module/healing/service.py:194:29: E1133: Non-iterable value HealingActionRepository.list(HealingAction.nsr_id == nsr_id) is used in an iterating context (not-an-iterable)
osm_policy_module/healing/service.py:265:33: E1133: Non-iterable value alarms is used in an iterating context (not-an-iterable)
************* Module osm_policy_module.autoscaling.service
osm_policy_module/autoscaling/service.py:270:41: E1133: Non-iterable value ScalingGroupRepository.list(scale_conditions) is used in an iterating context (not-an-iterable)
osm_policy_module/autoscaling/service.py:304:41: E1133: Non-iterable value ScalingGroupRepository.list(ScalingGroup.nsr_id == nsr_id) is used in an iterating context (not-an-iterable)
osm_policy_module/autoscaling/service.py:387:29: E1133: Non-iterable value alarms is used in an iterating context (not-an-iterable)
___________________________________ summary ____________________________________
black: commands succeeded
ERROR: cover: parallel child exit code 1
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded