Started by upstream project "buildall-stage_2-merge-v12" build number 400
originally caused by:
Started by timer
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/RO.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/5962-rebase
Seen branch in repository origin/Azure
Seen branch in repository origin/GCP
Seen branch in repository origin/WIM
Seen branch in repository origin/bug1511
Seen branch in repository origin/contrail
Seen branch in repository origin/feature1429
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7148
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/fog
Seen branch in repository origin/lcm
Seen branch in repository origin/master
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/py3
Seen branch in repository origin/python3
Seen branch in repository origin/rift300
Seen branch in repository origin/snapcraft
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v1.0
Seen branch in repository origin/v1.1
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v2.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen branch in repository origin/vio
Seen branch in repository origin/vnffg
Seen 42 remote branches
Obtained Jenkinsfile from 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Running on osm-cicd-2 in /home/jenkins/workspace/RO-stage_2-merge_v12.0
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/RO.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/RO.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 4c8efb91e6fe449961d2f3a750e6cf84cb167fea (v12.0)
> git config core.sparsecheckout # timeout=10
> git checkout -f 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
Commit message: "Fix Bug 2282: Can't instantiate NS using a pre-existing volume"
> git rev-list --no-walk 4c8efb91e6fe449961d2f3a750e6cf84cb167fea # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/RO-stage_2-merge_v12.0/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/v12.0^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/v12.0^{commit} # timeout=10
Checking out Revision 8e91a950fbfac8777b24f8fc577f7159bce65ee4 (refs/remotes/origin/v12.0)
> git config core.sparsecheckout # timeout=10
> git checkout -f 8e91a950fbfac8777b24f8fc577f7159bce65ee4
> git branch -a -v --no-abbrev # timeout=10
> git branch -D v12.0 # timeout=10
> git checkout -b v12.0 8e91a950fbfac8777b24f8fc577f7159bce65ee4
Commit message: "Fix Bug 2338: updated kubernetes apt repo from apt.kubernetes.io to pkgs.k8s.io"
> git rev-list --no-walk 8e91a950fbfac8777b24f8fc577f7159bce65ee4 # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 22456 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect?page=changes
GERRIT_PROJECT=osm/RO
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=docker osm-cicd-2 osm2 pipeline stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/
HUDSON_COOKIE=5acde2cb-4179-405f-829b-5243d7658757
JENKINS_SERVER_COOKIE=durable-6da2330843f491a716aff12bd5a0b7ad
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=4c8efb91e6fe449961d2f3a750e6cf84cb167fea
WORKSPACE=/home/jenkins/workspace/RO-stage_2-merge_v12.0
LOGNAME=jenkins
NODE_NAME=osm-cicd-2
GERRIT_BRANCH=v12.0
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=0
XDG_SESSION_ID=2054
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect?page=tests
BUILD_DISPLAY_NAME=#450
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=v12.0
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=450
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-RO-stage_2-merge-v12.0-450
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/
BUILD_NUMBER=450
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/450/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/59/14259/1
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/display/redirect
JOB_NAME=RO-stage_2-merge/v12.0
TEST_INSTALL=false
PWD=/home/jenkins/workspace/RO-stage_2-merge_v12.0
SSH_CONNECTION=212.234.161.1 22456 172.21.249.2 22
BRANCH_NAME=v12.0
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git fetch --tags
[RO-stage_2-merge_v12.0] Running shell script
[Pipeline] sh
+ git fetch origin refs/changes/59/14259/1
From https://osm.etsi.org/gerrit/osm/RO
* branch refs/changes/59/14259/1 -> FETCH_HEAD
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git checkout -f 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
HEAD is now at 4c8efb9 Fix Bug 2282: Can't instantiate NS using a pre-existing volume
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .local/
Removing NG-RO/deb_dist/
Removing NG-RO/dist/
Removing NG-RO/osm_ng_ro-12.0.8+g8214dac.tar.gz
Removing NG-RO/osm_ng_ro.egg-info/
Removing NG-RO/osm_ng_ro/requirements.txt
Removing RO-SDN-arista_cloudvision/deb_dist/
Removing RO-SDN-arista_cloudvision/dist/
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision-12.0.8+g8214dac.tar.gz
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision.egg-info/
Removing RO-SDN-dpb/deb_dist/
Removing RO-SDN-dpb/dist/
Removing RO-SDN-dpb/osm_rosdn_dpb-12.0.8+g8214dac.tar.gz
Removing RO-SDN-dpb/osm_rosdn_dpb.egg-info/
Removing RO-SDN-dynpac/deb_dist/
Removing RO-SDN-dynpac/dist/
Removing RO-SDN-dynpac/osm_rosdn_dynpac-12.0.8+g8214dac.tar.gz
Removing RO-SDN-dynpac/osm_rosdn_dynpac.egg-info/
Removing RO-SDN-floodlight_openflow/deb_dist/
Removing RO-SDN-floodlight_openflow/dist/
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof-12.0.8+g8214dac.tar.gz
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof.egg-info/
Removing RO-SDN-ietfl2vpn/deb_dist/
Removing RO-SDN-ietfl2vpn/dist/
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn-12.0.8+g8214dac.tar.gz
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn.egg-info/
Removing RO-SDN-juniper_contrail/deb_dist/
Removing RO-SDN-juniper_contrail/dist/
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail-12.0.8+g8214dac.tar.gz
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail.egg-info/
Removing RO-SDN-odl_openflow/deb_dist/
Removing RO-SDN-odl_openflow/dist/
Removing RO-SDN-odl_openflow/osm_rosdn_odlof-12.0.8+g8214dac.tar.gz
Removing RO-SDN-odl_openflow/osm_rosdn_odlof.egg-info/
Removing RO-SDN-onos_openflow/deb_dist/
Removing RO-SDN-onos_openflow/dist/
Removing RO-SDN-onos_openflow/osm_rosdn_onosof-12.0.8+g8214dac.tar.gz
Removing RO-SDN-onos_openflow/osm_rosdn_onosof.egg-info/
Removing RO-SDN-onos_vpls/deb_dist/
Removing RO-SDN-onos_vpls/dist/
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls-12.0.8+g8214dac.tar.gz
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls.egg-info/
Removing RO-VIM-aws/deb_dist/
Removing RO-VIM-aws/dist/
Removing RO-VIM-aws/osm_rovim_aws-12.0.8+g8214dac.tar.gz
Removing RO-VIM-aws/osm_rovim_aws.egg-info/
Removing RO-VIM-azure/deb_dist/
Removing RO-VIM-azure/dist/
Removing RO-VIM-azure/osm_rovim_azure-12.0.8+g8214dac.tar.gz
Removing RO-VIM-azure/osm_rovim_azure.egg-info/
Removing RO-VIM-gcp/deb_dist/
Removing RO-VIM-gcp/dist/
Removing RO-VIM-gcp/osm_rovim_gcp-12.0.8+g8214dac.tar.gz
Removing RO-VIM-gcp/osm_rovim_gcp.egg-info/
Removing RO-VIM-openstack/deb_dist/
Removing RO-VIM-openstack/dist/
Removing RO-VIM-openstack/osm_rovim_openstack-12.0.8+g8214dac.tar.gz
Removing RO-VIM-openstack/osm_rovim_openstack.egg-info/
Removing RO-VIM-openvim/deb_dist/
Removing RO-VIM-openvim/dist/
Removing RO-VIM-openvim/osm_rovim_openvim-12.0.8+g8214dac.tar.gz
Removing RO-VIM-openvim/osm_rovim_openvim.egg-info/
Removing RO-VIM-vmware/deb_dist/
Removing RO-VIM-vmware/dist/
Removing RO-VIM-vmware/osm_rovim_vmware-12.0.8+g8214dac.tar.gz
Removing RO-VIM-vmware/osm_rovim_vmware.egg-info/
Removing RO-plugin/.eggs/
Removing RO-plugin/deb_dist/
Removing RO-plugin/dist/
Removing RO-plugin/osm_ro_plugin-12.0.8+g8214dac.tar.gz
Removing RO-plugin/osm_ro_plugin.egg-info/
Removing build.env
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing dists/
Removing nosetests.xml
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
Not checking release notes for merge job
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/ro-v12.0 .
Sending build context to Docker daemon 68.75MB
Step 1/8 : FROM ubuntu:20.04
---> 33985b2ba010
Step 2/8 : ARG APT_PROXY
---> Using cache
---> a5cc015a61ff
Step 3/8 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> cf79a3d50dc4
Step 4/8 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools
---> Using cache
---> f96f66129cb6
Step 5/8 : RUN python3 -m easy_install pip==21.3.1
---> Using cache
---> de4e2bb6c02d
Step 6/8 : RUN pip install tox==3.24.5
---> Using cache
---> 856f958c9ec4
Step 7/8 : ENV LC_ALL C.UTF-8
---> Running in a6f9da183ff5
Removing intermediate container a6f9da183ff5
---> fb38cf9c489e
Step 8/8 : ENV LANG C.UTF-8
---> Running in 8d34798a1fd9
Removing intermediate container 8d34798a1fd9
---> 2c0609232870
Successfully built 2c0609232870
Successfully tagged osm/ro-v12.0:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ id -u
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-2 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/RO-stage_2-merge_v12.0 -v /home/jenkins/workspace/RO-stage_2-merge_v12.0:/home/jenkins/workspace/RO-stage_2-merge_v12.0:rw,z -v /home/jenkins/workspace/RO-stage_2-merge_v12.0@tmp:/home/jenkins/workspace/RO-stage_2-merge_v12.0@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/ro-v12.0
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[RO-stage_2-merge_v12.0] Running shell script
[Pipeline] sh
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/RO-stage_2-merge_v12.0 -r -g jenkins jenkins
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.0,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='2802686026'
black run-test: commands[0] | black --check --diff NG-RO
All done! ✨ 🍰 ✨
14 files would be left unchanged.
black run-test: commands[1] | black --check --diff RO-plugin
All done! ✨ 🍰 ✨
9 files would be left unchanged.
black run-test: commands[2] | black --check --diff RO-SDN-arista_cloudvision
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[3] | black --check --diff RO-SDN-dpb
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[4] | black --check --diff RO-SDN-dynpac
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[5] | black --check --diff RO-SDN-floodlight_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[6] | black --check --diff RO-SDN-ietfl2vpn
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[7] | black --check --diff RO-SDN-juniper_contrail
All done! ✨ 🍰 ✨
7 files would be left unchanged.
black run-test: commands[8] | black --check --diff RO-SDN-odl_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[9] | black --check --diff RO-SDN-onos_openflow
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[10] | black --check --diff RO-SDN-onos_vpls
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[11] | black --check --diff RO-VIM-aws
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[12] | black --check --diff RO-VIM-azure
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[13] | black --check --diff RO-VIM-openstack
All done! ✨ 🍰 ✨
5 files would be left unchanged.
black run-test: commands[14] | black --check --diff RO-VIM-openvim
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[15] | black --check --diff RO-VIM-vmware
All done! ✨ 🍰 ✨
6 files would be left unchanged.
black run-test: commands[16] | black --check --diff RO-VIM-gcp
All done! ✨ 🍰 ✨
4 files would be left unchanged.
black run-test: commands[17] | black --check --diff integration-tests
All done! ✨ 🍰 ✨
1 file would be left unchanged.
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==6.1.0, flake8-import-order
flake8 installed: flake8==6.1.0,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.11.1,pyflakes==3.1.0
flake8 run-test-pre: PYTHONHASHSEED='2802686026'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
flake8 run-test: commands[16] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py
flake8 run-test: commands[17] | flake8 integration-tests/
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, safety
safety installed: adal==1.2.7,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,click==8.1.7,cliff==3.10.1,cmd2==2.4.1,cryptography==37.0.2,cvprac==1.2.0,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,dparse==0.6.3,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tomli==2.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0
safety run-test-pre: PYTHONHASHSEED='2802686026'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by pyup.io \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv2.3.5[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/lib/python3.8/site-packages
Using [1mnon-commercial database[0m
[1m Found and scanned 129 packages[0m
Timestamp [1m2024-04-22 08:30:17[0m
[1m 21[0m[1m vulnerabilities found[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[31m[1mVULNERABILITIES FOUND[0m
+==============================================================================+
[31m-> Vulnerability found in jinja2 version 3.1.2
[0m[1m Vulnerability ID: [0m64227
[1m Affected spec: [0m<3.1.3
[1m ADVISORY: [0mJinja2 before 3.1.3 is affected by a Cross-Site Scripting
vulnerability. Special placeholders in the template allow writing code
similar to Python syntax. It is possible to inject arbitrary HTML attributes
into the rendered HTML template. The Jinja 'xmlattr' filter can be abused to
inject arbitrary HTML attribute keys and values, bypassing the auto escaping
mechanism and potentially leading to XSS. It may also be possible to bypass
attribute validation checks if they are blacklist-based.
[1m CVE-2024-22195[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/64227/f17[0m
[31m-> Vulnerability found in pygments version 2.12.0
[0m[1m Vulnerability ID: [0m58910
[1m Affected spec: [0m<2.15.0
[1m ADVISORY: [0mPygments 2.15.0 includes a fix for CVE-2022-40896: The
regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
properties files were discovered to be vulnerable. As a result, pygmentizing
a maliciously-crafted file of these kinds would have resulted in high
resources consumption or crashing of the
application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
top-python-packages-part-2
[1m CVE-2022-40896[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58910/f17[0m
[31m-> Vulnerability found in certifi version 2022.6.15
[0m[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust store.
TrustCor's root certificates are being removed pursuant to an investigation
prompted by media reporting that TrustCor's ownership also operated a
business that produced spyware. Conclusions of Mozilla's investigation can be
found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/52365/f17[0m
[31m-> Vulnerability found in certifi version 2022.6.15
[0m[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates.
e-Tugra's root certificates were subject to an investigation prompted by
reporting of security issues in their systems. Certifi 2023.07.22 removes
root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59956/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package. This
issue may allow a remote attacker to decrypt captured messages in TLS servers
that use RSA key exchanges, which may lead to exposure of confidential or
sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65278/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m59473
[1m Affected spec: [0m<41.0.2
[1m ADVISORY: [0mThe cryptography package before 41.0.2 for Python
mishandles SSH certificates that have critical options.
[1m CVE-2023-38325[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59473/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62556/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m66777
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mCVE-2023-6237 addresses a vulnerability in RSA public key
verification where checking a large, incorrect RSA key with
EVP_PKEY_public_check() could take an excessive amount of time. This is due
to no size limit on the RSA public key and an unnecessarily high number of
Miller-Rabin rounds for modulus non-primality checks. The fix sets a maximum
key size of 16384 bits and reduces Miller-Rabin rounds to 5, enhancing
security and performance by preventing the RSA_R_MODULUS_TOO_LARGE error.
[1m CVE-2023-6237[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/66777/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC CPUs,
which allows an attacker to disrupt the application's state. This disruption
might result in false calculations or cause a denial of service. The
vulnerability's exploitation hinges on the attacker's ability to alter the
algorithm's application and the dependency of the software on non-volatile
XMM registers.https://github.com/pyca/cryptography/commit/89d0d56fb104ac4e0e6
db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65212/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m65647
[1m Affected spec: [0m<42.0.5
[1m ADVISORY: [0mCryptography version 42.0.5 introduces a limit on the
number of name constraint checks during X.509 path validation to prevent
denial of service attacks.https://github.com/pyca/cryptography/commit/4be53bf
20cc90cbac01f5f94c5d1aecc5289ba1f
[1m PVE-2024-65647[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65647/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m53048
[1m Affected spec: [0m>=1.8,<39.0.1
[1m ADVISORY: [0mCryptography 39.0.1 includes a fix for CVE-2023-23931: In
affected versions 'Cipher.update_into' would accept Python objects which
implement the buffer protocol, but provide only immutable buffers. This would
allow immutable objects (such as 'bytes') to be mutated, thus violating
fundamental rules of Python and resulting in corrupted output. This issue has
been present since 'update_into' was originally introduced in cryptography
1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-
vj6r
[1m CVE-2023-23931[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/53048/f17[0m
[31m-> Vulnerability found in lxml version 4.9.0
[0m[1m Vulnerability ID: [0m50748
[1m Affected spec: [0m<4.9.1
[1m ADVISORY: [0mLxml 4.9.1 includes a fix for CVE-2022-2309: NULL Pointer
Dereference allows attackers to cause a denial of service (or application
crash). This only applies when lxml is used together with libxml2 2.9.10
through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows
triggering crashes through forged input data, given a vulnerable code
sequence in the application. The vulnerability is caused by the iterwalk
function (also used by the canonicalize function). Such code shouldn't be in
wide-spread use, given that parsing + iterwalk would usually be replaced with
the more efficient iterparse function. However, an XML converter that
serialises to C14N would also be vulnerable, for example, and there are
legitimate use cases for this code sequence. If untrusted input is received
(also remotely) and processed via iterwalk function, a crash can be
triggered.
[1m CVE-2022-2309[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50748/f17[0m
[31m-> Vulnerability found in msal version 1.18.0
[0m[1m Vulnerability ID: [0m66065
[1m Affected spec: [0m>=0,<1.24.1
[1m ADVISORY: [0mThe Microsoft Authentication Library (MSAL) for Python
before 1.24.1 is susceptible to a vulnerability in certain versions due to
inadequate input sanitization within the authcode.py file. This flaw allows
for the improper neutralization of special elements in data query
logic.https://github.com/AzureAD/microsoft-authentication-library-for-
python/commit/3427c2577bb674196a59e58cbf5aa91ad92cba7d
[1m PVE-2024-99774[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/66065/f17[0m
[31m-> Vulnerability found in oauthlib version 3.2.0
[0m[1m Vulnerability ID: [0m50959
[1m Affected spec: [0m>=3.1.1,<3.2.1
[1m ADVISORY: [0mOAuthLib 3.2.1 includes a fix for CVE-2022-36087: In
OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect
uri can cause denial of service. An attacker can also leverage usage of
'uri_validate' functions depending where it is used. OAuthLib applications
using OAuth2.0 provider support or use directly 'uri_validate' are affected
by this issue. There are no known workarounds.https://github.com/oauthlib/oau
thlib/security/advisories/GHSA-3pgj-pg6c-r5p7
[1m CVE-2022-36087[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50959/f17[0m
[31m-> Vulnerability found in paramiko version 2.11.0
[0m[1m Vulnerability ID: [0m65193
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mThe SSH transport protocol with certain OpenSSH extensions,
found in OpenSSH before 9.6 and other products, allows remote attackers to
bypass integrity checks such that some packets are omitted (from the
extension negotiation message), and a client and server may consequently end
up with a connection for which some security features have been downgraded or
disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet
Protocol (BPP), implemented by these extensions, mishandles the handshake
phase and mishandles use of sequence numbers. For example, there is an
effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with
Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if
CBC is used) the -etm@openssh.com MAC algorithms.
[1m CVE-2023-48795[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65193/f17[0m
[31m-> Vulnerability found in protobuf version 4.21.1
[0m[1m Vulnerability ID: [0m51167
[1m Affected spec: [0m>=4.0.0rc0,<4.21.6
[1m ADVISORY: [0mProtobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix
for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the
ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2,
3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and
including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-
python can lead to out of memory failures. A specially crafted message with
multiple key-value per elements creates parsing issues, and can lead to a
Denial of Service against services receiving unsanitized input.https://github
.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
[1m CVE-2022-1941[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/51167/f17[0m
[31m-> Vulnerability found in pyopenssl version 22.0.0
[0m[1m Vulnerability ID: [0m65213
[1m Affected spec: [0m>=22.0.0
[1m ADVISORY: [0mCVE-2023-6129 affects PyOpenSSL versions starting from
22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC CPUs.
This issue could lead to state corruption in applications, causing inaccurate
outcomes or service disruptions. Attackers need specific conditions to
exploit this flaw, including the ability to manipulate the algorithm's use
and reliance on certain system registers by the application.
[1m CVE-2023-6129[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65213/f17[0m
[31m-> Vulnerability found in pyvcloud version 19.1.1
[0m[1m Vulnerability ID: [0m36809
[1m Affected spec: [0m<20.0.0
[1m ADVISORY: [0mPyvcloud 20.0.0 fixes CVE-2017-18342: Replace yaml.load()
with yaml.safe_load()
[1m CVE-2017-18342[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/36809/f17[0m
[31m-> Vulnerability found in requests version 2.28.0
[0m[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a product
of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header
to requests. For HTTP connections sent through the tunnel, the proxy will
identify the header in the request itself and remove it prior to forwarding
to the destination server. However when sent over HTTPS, the 'Proxy-
Authorization' header must be sent in the CONNECT request as the proxy has no
visibility into the tunneled request. This results in Requests forwarding
proxy credentials to the destination server unintentionally, allowing a
malicious actor to potentially exfiltrate sensitive information.
[1m CVE-2023-32681[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58755/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.9
[0m[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803:
Request body not stripped after redirect from 303 status changes request
method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m
x-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61893/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.9
[0m[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804:
Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers
for managing cookies over HTTP, that is the responsibility of the user.
However, it is possible for a user to specify a 'Cookie' header and
unknowingly leak information via HTTP redirects to a different origin if that
user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/
security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61601/f17[0m
Scan was completed. 21 vulnerabilities were found.
+==============================================================================+
[32m[1m REMEDIATIONS[0m
21 vulnerabilities were found in 13 packages. For detailed remediation & fix
recommendations, upgrade to a commercial license.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt
ERROR: invocation failed (exit code 1), logfile: /tmp/.tox/cover/log/cover-1.log
================================== log start ===================================
Collecting osm-common@ git+https://osm.etsi.org/gerrit/osm/common.git@v12.0 (from -r /home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt (line 25))
Cloning https://osm.etsi.org/gerrit/osm/common.git (to revision v12.0) to /tmp/pip-install-22m8vseb/osm-common_82e2a0e3e02941c4be9279432c8601bc
Running command git clone --filter=blob:none --quiet https://osm.etsi.org/gerrit/osm/common.git /tmp/pip-install-22m8vseb/osm-common_82e2a0e3e02941c4be9279432c8601bc
warning: filtering not recognized by server, ignoring
Running command git checkout -b v12.0 --track origin/v12.0
Switched to a new branch 'v12.0'
Branch 'v12.0' set up to track remote branch 'v12.0' from 'origin'.
Resolved https://osm.etsi.org/gerrit/osm/common.git to commit 6aaeaa389273ec46b469f79f3c9b47cf3249bd74
Preparing metadata (setup.py): started
Preparing metadata (setup.py): finished with status 'done'
Obtaining file:///home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin (from -r /home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt (line 17))
Preparing metadata (setup.py): started
Preparing metadata (setup.py): finished with status 'error'
error: subprocess-exited-with-error
× python setup.py egg_info did not run successfully.
│ exit code: 1
╰─> [42 lines of output]
/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py:81: _DeprecatedInstaller: setuptools.installer and fetch_build_eggs are deprecated.
!!
********************************************************************************
Requirements should be satisfied by a PEP 517 installer.
If you are using pip, you can try `pip install --use-pep517`.
********************************************************************************
!!
dist.fetch_build_eggs(dist.setup_requires)
Traceback (most recent call last):
File "<string>", line 2, in <module>
File "<pip-setuptools-caller>", line 34, in <module>
File "/home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin/setup.py", line 39, in <module>
setup(
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py", line 103, in setup
_install_setup_requires(attrs)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py", line 76, in _install_setup_requires
_fetch_build_eggs(dist)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/__init__.py", line 81, in _fetch_build_eggs
dist.fetch_build_eggs(dist.setup_requires)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/dist.py", line 640, in fetch_build_eggs
return _fetch_build_eggs(self, requires)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/installer.py", line 38, in _fetch_build_eggs
resolved_dists = pkg_resources.working_set.resolve(
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 798, in resolve
dist = self._resolve_dist(
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 834, in _resolve_dist
dist = best[req.key] = env.best_match(
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 1104, in best_match
return self.obtain(req, installer)
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 1115, in obtain
return installer(requirement) if installer else None
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/installer.py", line 106, in _fetch_build_egg_no_warn
wheel.install_as_egg(dist_location)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/wheel.py", line 120, in install_as_egg
self._install_as_egg(destination_eggdir, zf)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/wheel.py", line 128, in _install_as_egg
self._convert_metadata(zf, destination_eggdir, dist_info, egg_info)
File "/tmp/.tox/cover/lib/python3.8/site-packages/setuptools/wheel.py", line 173, in _convert_metadata
os.rename(dist_info, egg_info)
OSError: [Errno 39] Directory not empty: '/home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin/.eggs/setuptools_version_command-99.9-py3.8.egg/setuptools_version_command-99.9.dist-info' -> '/home/jenkins/workspace/RO-stage_2-merge_v12.0/RO-plugin/.eggs/setuptools_version_command-99.9-py3.8.egg/EGG-INFO'
[end of output]
note: This error originates from a subprocess, and is likely not a problem with pip.
error: metadata-generation-failed
× Encountered error while generating package metadata.
╰─> See above for output.
note: This is an issue with the package mentioned above, not pip.
hint: See above for details.
=================================== log end ====================================
ERROR: could not install deps [-r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt]; v = InvocationError('/tmp/.tox/cover/bin/python -m pip install -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt', 1)
___________________________________ summary ____________________________________
black: commands succeeded
flake8: commands succeeded
safety: commands succeeded
ERROR: cover: could not install deps [-r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt]; v = InvocationError('/tmp/.tox/cover/bin/python -m pip install -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt', 1)
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 a045b789a54963db2abaecf84b2f2f7e94a034a812b499e99124dcebe487b43d
$ docker rm -f a045b789a54963db2abaecf84b2f2f7e94a034a812b499e99124dcebe487b43d
[Pipeline] // withDockerContainer
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
ERROR: script returned exit code 1
Finished: FAILURE