Started by upstream project "buildall-stage_2-merge-master" build number 428
originally caused by:
Started by timer
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/RO.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --force --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/5962-rebase
Seen branch in repository origin/Azure
Seen branch in repository origin/GCP
Seen branch in repository origin/WIM
Seen branch in repository origin/bug1511
Seen branch in repository origin/contrail
Seen branch in repository origin/feature1429
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7148
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/fog
Seen branch in repository origin/lcm
Seen branch in repository origin/master
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/py3
Seen branch in repository origin/python3
Seen branch in repository origin/rift300
Seen branch in repository origin/snapcraft
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v1.0
Seen branch in repository origin/v1.1
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v2.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen branch in repository origin/vio
Seen branch in repository origin/vnffg
Seen 42 remote branches
Obtained Jenkinsfile from e31d74ba07b1fbe8111d522a4f7d7d69d78d77de
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-3 in /home/jenkins/workspace/RO-stage_2-merge_master
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/RO.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/RO.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision e31d74ba07b1fbe8111d522a4f7d7d69d78d77de (master)
> git config core.sparsecheckout # timeout=10
> git checkout -f e31d74ba07b1fbe8111d522a4f7d7d69d78d77de
Commit message: "Disable the check of the release notes"
> git rev-list --no-walk e31d74ba07b1fbe8111d522a4f7d7d69d78d77de # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/RO-stage_2-merge_master/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/master^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/master^{commit} # timeout=10
Checking out Revision 7abbfd5aed5bd744d5f49ee834f89822136ca6cc (refs/remotes/origin/master)
> git config core.sparsecheckout # timeout=10
> git checkout -f 7abbfd5aed5bd744d5f49ee834f89822136ca6cc
> git branch -a -v --no-abbrev # timeout=10
> git branch -D master # timeout=10
> git checkout -b master 7abbfd5aed5bd744d5f49ee834f89822136ca6cc
Commit message: "Move lcm certificate to lcm folder in OSM helm chart"
> git rev-list --no-walk 7abbfd5aed5bd744d5f49ee834f89822136ca6cc # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 24503 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/982/display/redirect?page=changes
GERRIT_PROJECT=osm/RO
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/982/
HUDSON_COOKIE=12716a95-7cb9-4b3d-afc1-2b4c9a05f735
JENKINS_SERVER_COOKIE=durable-15f0a7c49ca4d49f3e1dc1ea0e74d101
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=e31d74ba07b1fbe8111d522a4f7d7d69d78d77de
WORKSPACE=/home/jenkins/workspace/RO-stage_2-merge_master
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=master
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/982/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=1
XDG_SESSION_ID=3541
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/982/display/redirect?page=tests
BUILD_DISPLAY_NAME=#982
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=master
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=982
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-RO-stage_2-merge-master-982
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/
BUILD_NUMBER=982
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/982/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/17/14317/1
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/master/display/redirect
JOB_NAME=RO-stage_2-merge/master
TEST_INSTALL=false
PWD=/home/jenkins/workspace/RO-stage_2-merge_master
SSH_CONNECTION=212.234.161.1 24503 172.21.249.3 22
BRANCH_NAME=master
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ git fetch --tags
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ git fetch origin refs/changes/17/14317/1
From https://osm.etsi.org/gerrit/osm/RO
* branch refs/changes/17/14317/1 -> FETCH_HEAD
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ git checkout -f e31d74ba07b1fbe8111d522a4f7d7d69d78d77de
HEAD is now at e31d74b Disable the check of the release notes
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .coverage_rosdn_tapi
Removing .local/
Removing .safety/
Removing NG-RO/deb_dist/
Removing NG-RO/dist/
Removing NG-RO/osm_ng_ro-9.0.0.post170+g8c89474.tar.gz
Removing NG-RO/osm_ng_ro.egg-info/
Removing NG-RO/osm_ng_ro/requirements.txt
Removing RO-SDN-arista_cloudvision/deb_dist/
Removing RO-SDN-arista_cloudvision/dist/
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision.egg-info/
Removing RO-SDN-dpb/deb_dist/
Removing RO-SDN-dpb/dist/
Removing RO-SDN-dpb/osm_rosdn_dpb-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-dpb/osm_rosdn_dpb.egg-info/
Removing RO-SDN-dynpac/deb_dist/
Removing RO-SDN-dynpac/dist/
Removing RO-SDN-dynpac/osm_rosdn_dynpac-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-dynpac/osm_rosdn_dynpac.egg-info/
Removing RO-SDN-floodlight_openflow/deb_dist/
Removing RO-SDN-floodlight_openflow/dist/
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof.egg-info/
Removing RO-SDN-ietfl2vpn/deb_dist/
Removing RO-SDN-ietfl2vpn/dist/
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn.egg-info/
Removing RO-SDN-juniper_contrail/deb_dist/
Removing RO-SDN-juniper_contrail/dist/
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail.egg-info/
Removing RO-SDN-odl_openflow/deb_dist/
Removing RO-SDN-odl_openflow/dist/
Removing RO-SDN-odl_openflow/osm_rosdn_odlof-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-odl_openflow/osm_rosdn_odlof.egg-info/
Removing RO-SDN-onos_openflow/deb_dist/
Removing RO-SDN-onos_openflow/dist/
Removing RO-SDN-onos_openflow/osm_rosdn_onosof-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-onos_openflow/osm_rosdn_onosof.egg-info/
Removing RO-SDN-onos_vpls/deb_dist/
Removing RO-SDN-onos_vpls/dist/
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls.egg-info/
Removing RO-SDN-tapi/deb_dist/
Removing RO-SDN-tapi/dist/
Removing RO-SDN-tapi/osm_rosdn_tapi-9.0.0.post170+g8c89474.tar.gz
Removing RO-SDN-tapi/osm_rosdn_tapi.egg-info/
Removing RO-VIM-aws/deb_dist/
Removing RO-VIM-aws/dist/
Removing RO-VIM-aws/osm_rovim_aws-9.0.0.post170+g8c89474.tar.gz
Removing RO-VIM-aws/osm_rovim_aws.egg-info/
Removing RO-VIM-azure/deb_dist/
Removing RO-VIM-azure/dist/
Removing RO-VIM-azure/osm_rovim_azure-9.0.0.post170+g8c89474.tar.gz
Removing RO-VIM-azure/osm_rovim_azure.egg-info/
Removing RO-VIM-gcp/deb_dist/
Removing RO-VIM-gcp/dist/
Removing RO-VIM-gcp/osm_rovim_gcp-9.0.0.post170+g8c89474.tar.gz
Removing RO-VIM-gcp/osm_rovim_gcp.egg-info/
Removing RO-VIM-openstack/deb_dist/
Removing RO-VIM-openstack/dist/
Removing RO-VIM-openstack/osm_rovim_openstack-9.0.0.post170+g8c89474.tar.gz
Removing RO-VIM-openstack/osm_rovim_openstack.egg-info/
Removing RO-VIM-openvim/deb_dist/
Removing RO-VIM-openvim/dist/
Removing RO-VIM-openvim/osm_rovim_openvim-9.0.0.post170+g8c89474.tar.gz
Removing RO-VIM-openvim/osm_rovim_openvim.egg-info/
Removing RO-VIM-vmware/deb_dist/
Removing RO-VIM-vmware/dist/
Removing RO-VIM-vmware/osm_rovim_vmware-9.0.0.post170+g8c89474.tar.gz
Removing RO-VIM-vmware/osm_rovim_vmware.egg-info/
Removing RO-plugin/.eggs/
Removing RO-plugin/deb_dist/
Removing RO-plugin/dist/
Removing RO-plugin/osm_ro_plugin-9.0.0.post170+g8c89474.tar.gz
Removing RO-plugin/osm_ro_plugin.egg-info/
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing nosetests.xml
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
Not checking release notes for merge job
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/ro-master .
Sending build context to Docker daemon 170.2MB
Step 1/6 : FROM ubuntu:22.04
---> 52882761a72a
Step 2/6 : ARG APT_PROXY
---> Using cache
---> d8be122d3e42
Step 3/6 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> 80bcbdac0f70
Step 4/6 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools python3-pip tox
---> Using cache
---> 48099a4425a1
Step 5/6 : ENV LC_ALL C.UTF-8
---> Using cache
---> 45d36c1e4798
Step 6/6 : ENV LANG C.UTF-8
---> Using cache
---> a582202f7242
Successfully built a582202f7242
Successfully tagged osm/ro-master:latest
[Pipeline] }
[Pipeline] // stage
[RO-stage_2-merge_master] Running shell script
[Pipeline] sh
+ id -u
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/RO-stage_2-merge_master -v /home/jenkins/workspace/RO-stage_2-merge_master:/home/jenkins/workspace/RO-stage_2-merge_master:rw,z -v /home/jenkins/workspace/RO-stage_2-merge_master@tmp:/home/jenkins/workspace/RO-stage_2-merge_master@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/ro-master
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/RO-stage_2-merge_master -r -g jenkins jenkins
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[RO-stage_2-merge_master] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black==24.1.1
black installed: black==24.1.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.1,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='2740596759'
black run-test: commands[0] | black --check --diff NG-RO
All done! ✨ 🍰 ✨
14 files would be left unchanged.
black run-test: commands[1] | black --check --diff RO-plugin
All done! ✨ 🍰 ✨
9 files would be left unchanged.
black run-test: commands[2] | black --check --diff RO-SDN-arista_cloudvision
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[3] | black --check --diff RO-SDN-dpb
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[4] | black --check --diff RO-SDN-dynpac
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[5] | black --check --diff RO-SDN-floodlight_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[6] | black --check --diff RO-SDN-ietfl2vpn
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[7] | black --check --diff RO-SDN-juniper_contrail
All done! ✨ 🍰 ✨
7 files would be left unchanged.
black run-test: commands[8] | black --check --diff RO-SDN-odl_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[9] | black --check --diff RO-SDN-onos_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[10] | black --check --diff RO-SDN-onos_vpls
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[11] | black --check --diff RO-SDN-tapi
All done! ✨ 🍰 ✨
17 files would be left unchanged.
black run-test: commands[12] | black --check --diff RO-VIM-aws
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[13] | black --check --diff RO-VIM-azure
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[14] | black --check --diff RO-VIM-openstack
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[15] | black --check --diff RO-VIM-openvim
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[16] | black --check --diff RO-VIM-vmware
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[17] | black --check --diff RO-VIM-gcp
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[18] | black --check --diff integration-tests
All done! ✨ 🍰 ✨
1 file would be left unchanged.
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements-test.txt
cover installed: adal==1.2.7,aiokafka==0.8.1,appdirs==1.4.4,async-timeout==4.0.3,atpublic==4.0,attrs==23.1.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.29.4,azure-identity==1.14.0,azure-mgmt-compute==30.3.0,azure-mgmt-core==1.4.0,azure-mgmt-network==25.1.0,azure-mgmt-resource==23.0.1,bcrypt==4.0.1,boto==2.49.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cheroot==10.0.0,CherryPy==18.1.2,cliff==4.3.0,cmd2==2.4.3,coverage==7.3.1,cryptography==41.0.4,cvprac==1.3.1,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dnspython==2.4.2,dogpile.cache==1.2.2,flufl.enum==6.0.2,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.1,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.22.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,ipconflict==0.5.0,iso8601==2.0.0,isodate==0.6.1,jaraco.functools==3.9.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,kafka-python==2.0.2,keystoneauth1==5.3.0,logutils==0.3.5,lxml==4.9.3,MarkupSafe==2.1.3,mock==5.1.0,more-itertools==10.1.0,motor==3.3.1,msal==1.24.0,msal-extensions==1.0.0,msgpack==1.0.7,msrest==0.7.1,msrestazure==0.6.4,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd,-e git+https://osm.etsi.org/gerrit/osm/RO.git@8c894742dba283113a19ae469c4a311749894ec1#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,portalocker==2.8.2,portend==3.2.0,prettytable==3.9.0,progressbar==2.5,protobuf==4.24.3,py-radix==0.10.0,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,PyJWT==2.8.0,pymongo==4.5.0,PyNaCl==1.5.0,pyOpenSSL==23.2.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.4.0,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,pyvcloud==19.1.1,pyvmomi==8.0.2.0,PyYAML==6.0.1,referencing==0.30.2,requests==2.31.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rpds-py==0.10.3,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tempora==5.5.0,tqdm==4.66.1,typing_extensions==4.8.0,tzdata==2023.3,uritemplate==4.1.1,urllib3==2.0.5,uuid==1.30,warlock==2.0.1,wcwidth==0.2.6,wrapt==1.15.0,zc.lockfile==3.0.post1,zipp==3.17.0
cover run-test-pre: PYTHONHASHSEED='2740596759'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage NG-RO/osm_ng_ro -s NG-RO/osm_ng_ro
WARNING:root:The 'osm_ng_ro' distribution was not found and is required by the application occured while getting the ro version
............ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..........................ERROR:root:ro_task=122436:1 vim=0 del-shared-volume=sample_shared_volume_id_3: Connection failed.
..ERROR:root:task=123456:1 vim=0 new-shared-volume: Connection failed.
.........................................................................................................................................................................................................................................................................................................................
----------------------------------------------------------------------
Ran 357 tests in 2.262s
OK
Name Stmts Miss Cover
-------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1450 808 44%
NG-RO/osm_ng_ro/ns_thread.py 1434 987 31%
NG-RO/osm_ng_ro/ro_main.py 459 459 0%
NG-RO/osm_ng_ro/tests/__init__.py 0 0 100%
NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100%
NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99%
NG-RO/osm_ng_ro/tests/test_ns.py 1909 12 99%
NG-RO/osm_ng_ro/tests/test_ns_thread.py 693 0 100%
NG-RO/osm_ng_ro/validation.py 35 13 63%
NG-RO/osm_ng_ro/vim_admin.py 224 186 17%
-------------------------------------------------------------
TOTAL 8029 2527 69%
cover run-test: commands[3] | sh -c 'mv .coverage .coverage_ng_ro'
cover run-test: commands[4] | nose2 -C --coverage RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail -s RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
....
----------------------------------------------------------------------
Ran 4 tests in 0.008s
OK
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------------------
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 98 66 33%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 146 79 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 380 310 18%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100%
-------------------------------------------------------------------------------------------------------------------
TOTAL 659 455 31%
cover run-test: commands[5] | sh -c 'mv .coverage .coverage_rosdn_juniper_contrail'
cover run-test: commands[6] | nose2 -C --coverage RO-SDN-tapi/osm_rosdn_tapi -s RO-SDN-tapi/osm_rosdn_tapi
127.0.0.1 - - [14/May/2024 09:04:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:22] "GET /restconf/data/tapi-common:context/service-interface-point HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:22] "POST /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context HTTP/1.1" 201 -
127.0.0.1 - - [14/May/2024 09:04:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:22] "GET /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context/connectivity-service HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:22] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:22] "POST /restconf/operations/tapi-connectivity:delete-connectivity-service HTTP/1.1" 204 -
.127.0.0.1 - - [14/May/2024 09:04:23] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:23] "GET /restconf/data/tapi-common:context/service-interface-point HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:23] "POST /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context HTTP/1.1" 201 -
127.0.0.1 - - [14/May/2024 09:04:23] "POST /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context HTTP/1.1" 201 -
127.0.0.1 - - [14/May/2024 09:04:23] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:23] "GET /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context/connectivity-service HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:23] "GET /restconf/data/tapi-common:context/tapi-connectivity:connectivity-context/connectivity-service HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:23] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:23] "POST /restconf/operations/tapi-connectivity:delete-connectivity-service HTTP/1.1" 204 -
127.0.0.1 - - [14/May/2024 09:04:23] "POST /restconf/operations/tapi-connectivity:delete-connectivity-service HTTP/1.1" 204 -
.127.0.0.1 - - [14/May/2024 09:04:24] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:24] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:24] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:24] "GET /restconf/data/tapi-common:context HTTP/1.1" 200 -
127.0.0.1 - - [14/May/2024 09:04:24] "GET /restconf/data/tapi-common:context/service-interface-point HTTP/1.1" 200 -
.
----------------------------------------------------------------------
Ran 3 tests in 1.768s
OK
Name Stmts Miss Cover
---------------------------------------------------------------------------
RO-SDN-tapi/osm_rosdn_tapi/__init__.py 0 0 100%
RO-SDN-tapi/osm_rosdn_tapi/conn_info.py 19 3 84%
RO-SDN-tapi/osm_rosdn_tapi/exceptions.py 66 25 62%
RO-SDN-tapi/osm_rosdn_tapi/log_messages.py 8 0 100%
RO-SDN-tapi/osm_rosdn_tapi/message_composers.py 37 4 89%
RO-SDN-tapi/osm_rosdn_tapi/message_templates.py 6 0 100%
RO-SDN-tapi/osm_rosdn_tapi/services_composer.py 52 10 81%
RO-SDN-tapi/osm_rosdn_tapi/tapi_client.py 90 22 76%
RO-SDN-tapi/osm_rosdn_tapi/tests/__init__.py 0 0 100%
RO-SDN-tapi/osm_rosdn_tapi/tests/constants.py 6 0 100%
RO-SDN-tapi/osm_rosdn_tapi/tests/exceptions.py 10 4 60%
RO-SDN-tapi/osm_rosdn_tapi/tests/mock_osm_ro.py 33 7 79%
RO-SDN-tapi/osm_rosdn_tapi/tests/mock_tapi_handler.py 80 13 84%
RO-SDN-tapi/osm_rosdn_tapi/tests/test_wim_tapi.py 65 0 100%
RO-SDN-tapi/osm_rosdn_tapi/tests/tools.py 9 2 78%
RO-SDN-tapi/osm_rosdn_tapi/wimconn_tapi.py 93 5 95%
---------------------------------------------------------------------------
TOTAL 574 95 83%
cover run-test: commands[7] | sh -c 'mv .coverage .coverage_rosdn_tapi'
cover run-test: commands[8] | nose2 -C --coverage RO-VIM-openstack/osm_rovim_openstack -s RO-VIM-openstack/osm_rovim_openstack
................................................................................................ERROR:ro.vim.openstack:General Exception Invalid Type
Traceback (most recent call last):
File "/home/jenkins/workspace/RO-stage_2-merge_master/RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py", line 3134, in _delete_created_items
k_item, k_id = self._get_item_name_id(k)
File "/tmp/.tox/cover/lib/python3.10/site-packages/mock/mock.py", line 1178, in __call__
return _mock_self._mock_call(*args, **kwargs)
File "/tmp/.tox/cover/lib/python3.10/site-packages/mock/mock.py", line 1182, in _mock_call
return _mock_self._execute_mock_call(*args, **kwargs)
File "/tmp/.tox/cover/lib/python3.10/site-packages/mock/mock.py", line 1243, in _execute_mock_call
raise result
TypeError: Invalid Type
.......................ERROR:ro.vim.openstack:General Exception
Traceback (most recent call last):
File "/home/jenkins/workspace/RO-stage_2-merge_master/RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py", line 92, in format_exception
return func(*args, *kwargs)
File "/home/jenkins/workspace/RO-stage_2-merge_master/RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py", line 3193, in delete_vminstance
created_items = self._extract_items_wth_keep_flag_from_created_items(
File "/tmp/.tox/cover/lib/python3.10/site-packages/mock/mock.py", line 1178, in __call__
return _mock_self._mock_call(*args, **kwargs)
File "/tmp/.tox/cover/lib/python3.10/site-packages/mock/mock.py", line 1182, in _mock_call
return _mock_self._execute_mock_call(*args, **kwargs)
File "/tmp/.tox/cover/lib/python3.10/site-packages/mock/mock.py", line 1239, in _execute_mock_call
raise effect
AttributeError
...........................................................................................................................
ERROR:nose2.main:Internal Error
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/sqlitedb.py", line 99, in _execute
return self.con.execute(sql, parameters) # type: ignore[arg-type]
sqlite3.OperationalError: no such table: line_bits
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/sqlitedb.py", line 104, in _execute
return self.con.execute(sql, parameters) # type: ignore[arg-type]
sqlite3.OperationalError: no such table: line_bits
The above exception was the direct cause of the following exception:
Traceback (most recent call last):
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/main.py", line 302, in runTests
self.result = runner.run(self.test)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/runner.py", line 61, in run
self.session.hooks.afterTestRun(event)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/events.py", line 233, in __call__
result = getattr(plugin, self.method)(event)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/plugins/result.py", line 125, in afterTestRun
self._reportSummary(event)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/plugins/result.py", line 193, in _reportSummary
self._printSummary(evt)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/plugins/result.py", line 205, in _printSummary
self.session.hooks.beforeSummaryReport(reportEvent)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/events.py", line 233, in __call__
result = getattr(plugin, self.method)(event)
File "/tmp/.tox/cover/lib/python3.10/site-packages/nose2/plugins/coverage.py", line 138, in beforeSummaryReport
percent_coverage = self.covController.report(
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/control.py", line 1084, in report
return reporter.report(morfs, outfile=file)
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/report.py", line 181, in report
for fr, analysis in get_analysis_to_report(self.coverage, morfs):
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/report_core.py", line 100, in get_analysis_to_report
analysis = coverage._analyze(fr)
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/control.py", line 945, in _analyze
return Analysis(data, self.config.precision, fr, self._file_mapper)
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/results.py", line 40, in __init__
executed = self.data.lines(self.filename) or []
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/sqldata.py", line 965, in lines
with con.execute(query, data) as cur:
File "/usr/lib/python3.10/contextlib.py", line 135, in __enter__
return next(self.gen)
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/sqlitedb.py", line 134, in execute
cur = self._execute(sql, parameters)
File "/tmp/.tox/cover/lib/python3.10/site-packages/coverage/sqlitedb.py", line 122, in _execute
raise DataError(f"Couldn't use data file {self.filename!r}: {msg}") from exc
coverage.exceptions.DataError: Couldn't use data file '/home/jenkins/workspace/RO-stage_2-merge_master/.coverage': no such table: line_bits
Internal Error: runTests aborted: Couldn't use data file '/home/jenkins/workspace/RO-stage_2-merge_master/.coverage': no such table: line_bits
ERROR: InvocationError for command /tmp/.tox/cover/bin/nose2 -C --coverage RO-VIM-openstack/osm_rovim_openstack -s RO-VIM-openstack/osm_rovim_openstack (exited with code 1)
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==7.0.0, flake8-import-order
flake8 installed: flake8==7.0.0,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.11.1,pyflakes==3.2.0
flake8 run-test-pre: PYTHONHASHSEED='2740596759'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-SDN-tapi/osm_rosdn_tapi/ RO-SDN-tapi/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[16] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
flake8 run-test: commands[17] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py
flake8 run-test: commands[18] | flake8 integration-tests/
pylint create: /tmp/.tox/pylint
pylint installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements-test.txt, pylint==3.0.3
pylint installed: adal==1.2.7,aiokafka==0.8.1,appdirs==1.4.4,astroid==3.0.3,async-timeout==4.0.3,atpublic==4.0,attrs==23.1.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.29.4,azure-identity==1.14.0,azure-mgmt-compute==30.3.0,azure-mgmt-core==1.4.0,azure-mgmt-network==25.1.0,azure-mgmt-resource==23.0.1,bcrypt==4.0.1,boto==2.49.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cheroot==10.0.0,CherryPy==18.1.2,cliff==4.3.0,cmd2==2.4.3,coverage==7.3.1,cryptography==41.0.4,cvprac==1.3.1,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dill==0.3.8,dnspython==2.4.2,dogpile.cache==1.2.2,flufl.enum==6.0.2,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.1,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.22.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,ipconflict==0.5.0,iso8601==2.0.0,isodate==0.6.1,isort==5.13.2,jaraco.functools==3.9.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,kafka-python==2.0.2,keystoneauth1==5.3.0,logutils==0.3.5,lxml==4.9.3,MarkupSafe==2.1.3,mccabe==0.7.0,mock==5.1.0,more-itertools==10.1.0,motor==3.3.1,msal==1.24.0,msal-extensions==1.0.0,msgpack==1.0.7,msrest==0.7.1,msrestazure==0.6.4,netaddr==0.9.0,netifaces==0.11.0,nose2==0.13.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@409397d74a1a9dd1257a55b6c9ae02a7b8bf1bdd,-e git+https://osm.etsi.org/gerrit/osm/RO.git@8c894742dba283113a19ae469c4a311749894ec1#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,platformdirs==4.2.1,portalocker==2.8.2,portend==3.2.0,prettytable==3.9.0,progressbar==2.5,protobuf==4.24.3,py-radix==0.10.0,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pycryptodome==3.19.0,Pygments==2.16.1,pyinotify==0.9.6,PyJWT==2.8.0,pylint==3.0.3,pymongo==4.5.0,PyNaCl==1.5.0,pyOpenSSL==23.2.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.4.0,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,pyvcloud==19.1.1,pyvmomi==8.0.2.0,PyYAML==6.0.1,referencing==0.30.2,requests==2.31.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rpds-py==0.10.3,rsa==4.9,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tempora==5.5.0,tomli==2.0.1,tomlkit==0.12.5,tqdm==4.66.1,typing_extensions==4.8.0,tzdata==2023.3,uritemplate==4.1.1,urllib3==2.0.5,uuid==1.30,warlock==2.0.1,wcwidth==0.2.6,wrapt==1.15.0,zc.lockfile==3.0.post1,zipp==3.17.0
pylint run-test-pre: PYTHONHASHSEED='2740596759'
pylint run-test: commands[0] | pylint -E NG-RO/osm_ng_ro --disable=E1101
pylint run-test: commands[1] | pylint -E RO-plugin/osm_ro_plugin --disable=E1101
pylint run-test: commands[2] | - pylint -E RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision --disable=all
No files to lint: exiting.
pylint run-test: commands[3] | pylint -E RO-SDN-dpb/osm_rosdn_dpb
pylint run-test: commands[4] | pylint -E RO-SDN-dynpac/osm_rosdn_dynpac --disable=E1101
pylint run-test: commands[5] | pylint -E RO-SDN-floodlight_openflow/osm_rosdn_floodlightof
pylint run-test: commands[6] | pylint -E RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn --disable=E1101
pylint run-test: commands[7] | pylint -E RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
pylint run-test: commands[8] | pylint -E RO-SDN-odl_openflow/osm_rosdn_odlof
pylint run-test: commands[9] | pylint -E RO-SDN-onos_openflow/osm_rosdn_onosof
pylint run-test: commands[10] | pylint -E RO-SDN-onos_vpls/osm_rosdn_onos_vpls --disable=E1101
pylint run-test: commands[11] | pylint -E RO-SDN-tapi/osm_rosdn_tapi
pylint run-test: commands[12] | pylint -E RO-VIM-aws/osm_rovim_aws
pylint run-test: commands[13] | - pylint -E RO-VIM-azure/osm_rovim_azure --disable=all
No files to lint: exiting.
pylint run-test: commands[14] | pylint -E RO-VIM-openstack/osm_rovim_openstack --disable=E1101
pylint run-test: commands[15] | - pylint -E RO-VIM-openvim/osm_rovim_openvim --disable=all
No files to lint: exiting.
pylint run-test: commands[16] | - pylint -E RO-VIM-vmware/osm_rovim_vmware --disable=all
No files to lint: exiting.
pylint run-test: commands[17] | pylint -E RO-VIM-gcp/osm_rovim_gcp --disable=E1101
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_master/requirements.txt, safety
safety installed: adal==1.2.7,annotated-types==0.6.0,appdirs==1.4.4,atpublic==4.0,attrs==23.1.0,Authlib==1.3.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.29.4,azure-identity==1.14.0,azure-mgmt-compute==30.3.0,azure-mgmt-core==1.4.0,azure-mgmt-network==25.1.0,azure-mgmt-resource==23.0.1,bcrypt==4.0.1,boto==2.49.0,cachetools==5.3.1,certifi==2023.7.22,cffi==1.16.0,charset-normalizer==3.2.0,cheroot==10.0.0,CherryPy==18.1.2,click==8.1.7,cliff==4.3.0,cmd2==2.4.3,cryptography==41.0.4,cvprac==1.3.1,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.2.2,dparse==0.6.4b0,flufl.enum==6.0.2,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.1,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.22.0,humanfriendly==10.0,idna==3.4,importlib-metadata==6.8.0,ipconflict==0.5.0,iso8601==2.0.0,isodate==0.6.1,jaraco.functools==3.9.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.33,jsonpointer==2.4,jsonschema==4.19.1,jsonschema-specifications==2023.7.1,keystoneauth1==5.3.0,logutils==0.3.5,lxml==4.9.3,markdown-it-py==3.0.0,MarkupSafe==2.1.3,marshmallow==3.21.2,mdurl==0.1.2,more-itertools==10.1.0,msal==1.24.0,msal-extensions==1.0.0,msgpack==1.0.7,msrest==0.7.1,msrestazure==0.6.4,netaddr==0.9.0,netifaces==0.11.0,oauthlib==3.2.2,openstacksdk==1.5.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.8.1,oslo.config==9.2.0,oslo.context==5.2.0,oslo.i18n==6.1.0,oslo.log==5.3.0,oslo.serialization==5.2.0,oslo.utils==6.2.1,packaging==23.1,paramiko==3.3.1,pbr==5.11.1,portalocker==2.8.2,portend==3.2.0,prettytable==3.9.0,progressbar==2.5,protobuf==4.24.3,py-radix==0.10.0,pyasn1==0.5.0,pyasn1-modules==0.3.0,pycparser==2.21,pydantic==2.7.1,pydantic_core==2.18.2,Pygments==2.16.1,pyinotify==0.9.6,PyJWT==2.8.0,PyNaCl==1.5.0,pyOpenSSL==23.2.0,pyparsing==3.1.1,pyperclip==1.8.2,PySocks==1.7.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.4.0,python-keystoneclient==5.2.0,python-neutronclient==11.0.0,python-novaclient==18.4.0,python-openstackclient==6.3.0,pytz==2023.3.post1,pyvcloud==19.1.1,pyvmomi==8.0.2.0,PyYAML==6.0.1,referencing==0.30.2,requests==2.31.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rich==13.7.1,rpds-py==0.10.3,rsa==4.9,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==3.2.0,safety-schemas==0.0.2,shellingham==1.5.4,simplejson==3.19.1,six==1.16.0,stevedore==5.1.0,tempora==5.5.0,tomli==2.0.1,tqdm==4.66.1,typer==0.12.3,typing_extensions==4.8.0,tzdata==2023.3,uritemplate==4.1.1,urllib3==2.0.5,uuid==1.30,warlock==2.0.1,wcwidth==0.2.6,wrapt==1.15.0,zc.lockfile==3.0.post1,zipp==3.17.0
safety run-test-pre: PYTHONHASHSEED='2740596759'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by safetycli.com \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv3.2.0[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /usr/lib/python310.zip
-> /usr/lib/python3.10/lib-dynload
-> /tmp/.tox/safety/lib/python3.10/site-packages
-> /tmp/.tox/safety/bin
-> /usr/lib/python3.10
Using [1mopen-source vulnerability database[0m
[1m Found and scanned 144 packages[0m
Timestamp [1m2024-05-14 09:09:58[0m
[1m 16[0m[1m vulnerabilities reported[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[1mVULNERABILITIES REPORTED[0m
+==============================================================================+
[31m-> Vulnerability found in wheel version 0.37.1[0m
[1m Vulnerability ID: [0m51499
[1m Affected spec: [0m<0.38.1
[1m ADVISORY: [0mWheel 0.38.1 includes a fix for CVE-2022-40898: An issue
discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier
allows remote attackers to cause a denial of service via attacker
controlled input to wheel cli.https://pyup.io/posts/pyup-discovers-redos-
vulnerabilities-in-top-python-packages
[1m CVE-2022-40898[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/51499/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 51499 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in urllib3 version 2.0.5[0m
[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m>=2.0.0a1,<2.0.7
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for
CVE-2023-45803: Request body not stripped after redirect from 303 status
changes request method to GET.https://github.com/urllib3/urllib3/security/
advisories/GHSA-g4mx-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/61893/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 61893 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pyvcloud version 19.1.1[0m
[1m Vulnerability ID: [0m36809
[1m Affected spec: [0m<20.0.0
[1m ADVISORY: [0mPyvcloud 20.0.0 fixes CVE-2017-18342: Replace
yaml.load() with yaml.safe_load()
[1m CVE-2017-18342[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/36809/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 36809 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pyopenssl version 23.2.0[0m
[1m Vulnerability ID: [0m65213
[1m Affected spec: [0m>=22.0.0
[1m ADVISORY: [0mCVE-2023-6129 affects PyOpenSSL versions starting from
22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC
CPUs. This issue could lead to state corruption in applications, causing
inaccurate outcomes or service disruptions. Attackers need specific
conditions to exploit this flaw, including the ability to manipulate the
algorithm's use and reliance on certain system registers by the
application.
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65213/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65213 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m62044
[1m Affected spec: [0m<23.3
[1m ADVISORY: [0mAffected versions of Pip are vulnerable to Command
Injection. When installing a package from a Mercurial VCS URL (ie "pip
install hg+...") with pip prior to v23.3, the specified Mercurial revision
could be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not affect
users who aren't installing from Mercurial.
[1m CVE-2023-5752[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62044/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62044 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in pip version 22.0.2[0m
[1m Vulnerability ID: [0m67599
[1m Affected spec: [0m>=0
[1m ADVISORY: [0m** DISPUTED ** An issue was discovered in pip (all
versions) because it installs the version with the highest version number,
even if the user had intended to obtain a private package from a private
index. This only affects use of the --extra-index-url option, and
exploitation requires that the package does not already exist in the
public index (and thus the attacker can put the package there with an
arbitrary version number). NOTE: it has been reported that this is
intended functionality and the user is responsible for using --extra-
index-url securely.
[1m CVE-2018-20225[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/67599/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 67599 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in paramiko version 3.3.1[0m
[1m Vulnerability ID: [0m65193
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mParamiko's core implementation of the SSH transport
protocol, including certain OpenSSH extensions used before OpenSSH 9.6, is
vulnerable to a "Terrapin attack." This vulnerability allows remote
attackers to manipulate packet integrity during the handshake phase,
potentially leading to security downgrades or disabled features in SSH
connections. Specific attacks target the use of ChaCha20-Poly1305 and CBC
with Encrypt-then-MAC, where sequence numbers and integrity checks are
improperly managed. This issue particularly affects the
chacha20-poly1305@openssh.com and -etm@openssh.com MAC algorithms.
[1m CVE-2023-48795[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65193/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65193 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in paramiko version 3.3.1[0m
[1m Vulnerability ID: [0m63227
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mParamiko 3.4.0 has been released to fix vulnerabilities
affecting encrypt-then-MAC digest algorithms in tandem with CBC ciphers,
and ChaCha20-poly1305. The fix requires cooperation from both ends of the
connection, making it effective when the remote end is OpenSSH >= 9.6 and
configured to use the new “strict kex” mode. For further details, refer to
the official Paramiko documentation or GitHub
repository.https://github.com/advisories/GHSA-45x7-px36-x8w8
[1m CVE-2023-48795[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/63227/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 63227 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in msal version 1.24.0[0m
[1m Vulnerability ID: [0m66065
[1m Affected spec: [0m>=0,<1.24.1
[1m ADVISORY: [0mThe Microsoft Authentication Library (MSAL) for Python
before 1.24.1 is susceptible to a vulnerability in certain versions due to
inadequate input sanitization within the authcode.py file. This flaw
allows for the improper neutralization of special elements in data query
logic.https://github.com/AzureAD/microsoft-authentication-library-for-
python/commit/3427c2577bb674196a59e58cbf5aa91ad92cba7d
[1m PVE-2024-99774[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66065/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66065 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package.
This issue may allow a remote attacker to decrypt captured messages in TLS
servers that use RSA key exchanges, which may lead to exposure of
confidential or sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65278/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65278 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66704
[1m Affected spec: [0m>=38.0.0,<42.0.4
[1m ADVISORY: [0mcryptography is a package designed to expose
cryptographic primitives and recipes to Python developers. Starting in
version 38.0.0 and before version 42.0.4, if
`pkcs12.serialize_key_and_certificates` is called with both a certificate
whose public key did not match the provided private key and an
`encryption_algorithm` with `hmac_hash` set (via
`PrivateFormat.PKCS12.encryption_builder().hmac_hash(...)`, then a NULL
pointer dereference would occur, crashing the Python process. This has
been resolved in version 42.0.4, the first version in which a `ValueError`
is properly raised.
[1m CVE-2024-26130[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66704/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66704 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65647
[1m Affected spec: [0m<42.0.5
[1m ADVISORY: [0mCryptography version 42.0.5 introduces a limit on the
number of name constraint checks during X.509 path validation to prevent
denial of service attacks.https://github.com/pyca/cryptography/commit/4be5
3bf20cc90cbac01f5f94c5d1aecc5289ba1f
[1m PVE-2024-65647[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65647/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65647 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC
CPUs, which allows an attacker to disrupt the application's state. This
disruption might result in false calculations or cause a denial of
service. The vulnerability's exploitation hinges on the attacker's ability
to alter the algorithm's application and the dependency of the software on
non-volatile XMM registers.https://github.com/pyca/cryptography/commit/89d
0d56fb104ac4e0e6db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/65212/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 65212 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m66777
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mCVE-2023-6237 addresses a vulnerability in RSA public
key verification where checking a large, incorrect RSA key with
EVP_PKEY_public_check() could take an excessive amount of time. This is
due to no size limit on the RSA public key and an unnecessarily high
number of Miller-Rabin rounds for modulus non-primality checks. The fix
sets a maximum key size of 16384 bits and reduces Miller-Rabin rounds to
5, enhancing security and performance by preventing the
RSA_R_MODULUS_TOO_LARGE error.
[1m CVE-2023-6237[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/66777/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 66777 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in cryptography version 41.0.4[0m
[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/62556/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 62556 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
[31m-> Vulnerability found in jinja2 version 3.1.2[0m
[1m Vulnerability ID: [0m64227
[1m Affected spec: [0m<3.1.3
[1m ADVISORY: [0mJinja2 before 3.1.3 is affected by a Cross-Site
Scripting vulnerability. Special placeholders in the template allow
writing code similar to Python syntax. It is possible to inject arbitrary
HTML attributes into the rendered HTML template. The Jinja 'xmlattr'
filter can be abused to inject arbitrary HTML attribute keys and values,
bypassing the auto escaping mechanism and potentially leading to XSS. It
may also be possible to bypass attribute validation checks if they are
blacklist-based.
[1m CVE-2024-22195[0m
[1m For more information about this vulnerability, visit
[0mhttps://data.safetycli.com/v/64227/97c[0m
To ignore this vulnerability, use PyUp vulnerability id 64227 in safety’s
ignore command-line argument or add the ignore to your safety policy file.
+==============================================================================+
[32m[1mREMEDIATIONS[0m
16 vulnerabilities were reported in 9 packages. For detailed remediation &
fix recommendations, upgrade to a commercial license.
+==============================================================================+
Scan was completed. 16 vulnerabilities were reported.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
___________________________________ summary ____________________________________
black: commands succeeded
ERROR: cover: commands failed
flake8: commands succeeded
pylint: commands succeeded
safety: commands succeeded
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 42fea89abb7b5b9b128cf970ef857763694b86e06734c0e1a3e30b60ba7a8fc9
$ docker rm -f 42fea89abb7b5b9b128cf970ef857763694b86e06734c0e1a3e30b60ba7a8fc9
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE