Started by upstream project "buildall-stage_2-merge-v12" build number 432
originally caused by:
Started by user garciadeblas
> git rev-parse --is-inside-work-tree # timeout=10
Setting origin to https://osm.etsi.org/gerrit/osm/RO.git
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching origin...
Fetching upstream changes from origin
> git --version # timeout=10
> git config --get remote.origin.url # timeout=10
> git fetch --tags --force --progress origin +refs/heads/*:refs/remotes/origin/*
Seen branch in repository origin/5962-rebase
Seen branch in repository origin/Azure
Seen branch in repository origin/GCP
Seen branch in repository origin/WIM
Seen branch in repository origin/bug1511
Seen branch in repository origin/contrail
Seen branch in repository origin/feature1429
Seen branch in repository origin/feature5837
Seen branch in repository origin/feature7106
Seen branch in repository origin/feature7148
Seen branch in repository origin/feature7184
Seen branch in repository origin/feature7928
Seen branch in repository origin/fog
Seen branch in repository origin/lcm
Seen branch in repository origin/master
Seen branch in repository origin/netslice
Seen branch in repository origin/ng-ro-refactor
Seen branch in repository origin/paas
Seen branch in repository origin/py3
Seen branch in repository origin/python3
Seen branch in repository origin/rift300
Seen branch in repository origin/snapcraft
Seen branch in repository origin/sol006
Seen branch in repository origin/sol006v331
Seen branch in repository origin/v1.0
Seen branch in repository origin/v1.1
Seen branch in repository origin/v10.0
Seen branch in repository origin/v11.0
Seen branch in repository origin/v12.0
Seen branch in repository origin/v13.0
Seen branch in repository origin/v14.0
Seen branch in repository origin/v15.0
Seen branch in repository origin/v2.0
Seen branch in repository origin/v3.1
Seen branch in repository origin/v4.0
Seen branch in repository origin/v5.0
Seen branch in repository origin/v6.0
Seen branch in repository origin/v7.0
Seen branch in repository origin/v8.0
Seen branch in repository origin/v9.0
Seen branch in repository origin/vio
Seen branch in repository origin/vnffg
Seen 42 remote branches
Obtained Jenkinsfile from 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
Running in Durability level: MAX_SURVIVABILITY
[Pipeline] properties
[Pipeline] node
Still waiting to schedule task
Waiting for next available executor on βstage_2β
Running on osm-cicd-3 in /home/jenkins/workspace/RO-stage_2-merge_v12.0
[Pipeline] {
[Pipeline] checkout
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10
Fetching without tags
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/RO.git
> git --version # timeout=10
> git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/RO.git +refs/heads/*:refs/remotes/origin/*
Checking out Revision 4c8efb91e6fe449961d2f3a750e6cf84cb167fea (v12.0)
> git config core.sparsecheckout # timeout=10
> git checkout -f 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
Commit message: "Fix Bug 2282: Can't instantiate NS using a pre-existing volume"
> git rev-list --no-walk 4c8efb91e6fe449961d2f3a750e6cf84cb167fea # timeout=10
[Pipeline] dir
Running in /home/jenkins/workspace/RO-stage_2-merge_v12.0/devops
[Pipeline] {
[Pipeline] git
No credentials specified
> git rev-parse --is-inside-work-tree # timeout=10
Fetching changes from the remote Git repository
> git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10
Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops
> git --version # timeout=10
> git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/*
> git rev-parse refs/remotes/origin/v12.0^{commit} # timeout=10
> git rev-parse refs/remotes/origin/origin/v12.0^{commit} # timeout=10
Checking out Revision dc4169284beb616ff53eee78d05efdda4ba48d96 (refs/remotes/origin/v12.0)
> git config core.sparsecheckout # timeout=10
> git checkout -f dc4169284beb616ff53eee78d05efdda4ba48d96
> git branch -a -v --no-abbrev # timeout=10
> git branch -D v12.0 # timeout=10
> git checkout -b v12.0 dc4169284beb616ff53eee78d05efdda4ba48d96
Commit message: "Fix Copy Artifacts stage in stage3 in case that tree fails"
> git rev-list --no-walk 8e91a950fbfac8777b24f8fc577f7159bce65ee4 # timeout=10
[Pipeline] }
[Pipeline] // dir
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] echo
do_stage_3= false
[Pipeline] load
[Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy)
[Pipeline] }
[Pipeline] // load
[Pipeline] stage
[Pipeline] { (Prepare)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ env
JENKINS_HOME=/var/lib/jenkins
SSH_CLIENT=212.234.161.1 24503 22
USER=jenkins
RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/482/display/redirect?page=changes
GERRIT_PROJECT=osm/RO
XDG_SESSION_TYPE=tty
SHLVL=0
NODE_LABELS=osm-cicd-3 osm3 stage_2
HUDSON_URL=https://osm.etsi.org/jenkins/
MOTD_SHOWN=pam
OLDPWD=/home/jenkins
HOME=/home/jenkins
BUILD_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/482/
HUDSON_COOKIE=84ad43ec-b9ee-4a9c-9d88-19bbe025308d
JENKINS_SERVER_COOKIE=durable-6da2330843f491a716aff12bd5a0b7ad
DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus
GERRIT_PATCHSET_REVISION=4c8efb91e6fe449961d2f3a750e6cf84cb167fea
WORKSPACE=/home/jenkins/workspace/RO-stage_2-merge_v12.0
LOGNAME=jenkins
NODE_NAME=osm-cicd-3
GERRIT_BRANCH=v12.0
_=/usr/bin/java
RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/482/display/redirect?page=artifacts
XDG_SESSION_CLASS=user
EXECUTOR_NUMBER=4
XDG_SESSION_ID=3541
RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/482/display/redirect?page=tests
BUILD_DISPLAY_NAME=#482
PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit
HUDSON_HOME=/var/lib/jenkins
JOB_BASE_NAME=v12.0
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
BUILD_ID=482
XDG_RUNTIME_DIR=/run/user/1001
BUILD_TAG=jenkins-RO-stage_2-merge-v12.0-482
JENKINS_URL=https://osm.etsi.org/jenkins/
LANG=C.UTF-8
JOB_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/
BUILD_NUMBER=482
SHELL=/bin/bash
RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/482/display/redirect
ARTIFACTORY_SERVER=artifactory-osm
GERRIT_REFSPEC=refs/changes/59/14259/1
HUDSON_SERVER_COOKIE=6d3295a483c3e6d5
JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v12.0/display/redirect
JOB_NAME=RO-stage_2-merge/v12.0
TEST_INSTALL=false
PWD=/home/jenkins/workspace/RO-stage_2-merge_v12.0
SSH_CONNECTION=212.234.161.1 24503 172.21.249.3 22
BRANCH_NAME=v12.0
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Checkout)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git fetch --tags
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git fetch origin refs/changes/59/14259/1
From https://osm.etsi.org/gerrit/osm/RO
* branch refs/changes/59/14259/1 -> FETCH_HEAD
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ git checkout -f 4c8efb91e6fe449961d2f3a750e6cf84cb167fea
HEAD is now at 4c8efb9 Fix Bug 2282: Can't instantiate NS using a pre-existing volume
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ sudo git clean -dfx
Removing .cache/
Removing .coverage
Removing .local/
Removing NG-RO/deb_dist/
Removing NG-RO/dist/
Removing NG-RO/osm_ng_ro-12.0.8.post1+g4c8efb9.tar.gz
Removing NG-RO/osm_ng_ro.egg-info/
Removing NG-RO/osm_ng_ro/requirements.txt
Removing RO-SDN-arista_cloudvision/deb_dist/
Removing RO-SDN-arista_cloudvision/dist/
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision.egg-info/
Removing RO-SDN-dpb/deb_dist/
Removing RO-SDN-dpb/dist/
Removing RO-SDN-dpb/osm_rosdn_dpb-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-dpb/osm_rosdn_dpb.egg-info/
Removing RO-SDN-dynpac/deb_dist/
Removing RO-SDN-dynpac/dist/
Removing RO-SDN-dynpac/osm_rosdn_dynpac-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-dynpac/osm_rosdn_dynpac.egg-info/
Removing RO-SDN-floodlight_openflow/deb_dist/
Removing RO-SDN-floodlight_openflow/dist/
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-floodlight_openflow/osm_rosdn_floodlightof.egg-info/
Removing RO-SDN-ietfl2vpn/deb_dist/
Removing RO-SDN-ietfl2vpn/dist/
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn.egg-info/
Removing RO-SDN-juniper_contrail/deb_dist/
Removing RO-SDN-juniper_contrail/dist/
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail.egg-info/
Removing RO-SDN-odl_openflow/deb_dist/
Removing RO-SDN-odl_openflow/dist/
Removing RO-SDN-odl_openflow/osm_rosdn_odlof-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-odl_openflow/osm_rosdn_odlof.egg-info/
Removing RO-SDN-onos_openflow/deb_dist/
Removing RO-SDN-onos_openflow/dist/
Removing RO-SDN-onos_openflow/osm_rosdn_onosof-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-onos_openflow/osm_rosdn_onosof.egg-info/
Removing RO-SDN-onos_vpls/deb_dist/
Removing RO-SDN-onos_vpls/dist/
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-SDN-onos_vpls/osm_rosdn_onos_vpls.egg-info/
Removing RO-VIM-aws/deb_dist/
Removing RO-VIM-aws/dist/
Removing RO-VIM-aws/osm_rovim_aws-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-VIM-aws/osm_rovim_aws.egg-info/
Removing RO-VIM-azure/deb_dist/
Removing RO-VIM-azure/dist/
Removing RO-VIM-azure/osm_rovim_azure-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-VIM-azure/osm_rovim_azure.egg-info/
Removing RO-VIM-gcp/deb_dist/
Removing RO-VIM-gcp/dist/
Removing RO-VIM-gcp/osm_rovim_gcp-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-VIM-gcp/osm_rovim_gcp.egg-info/
Removing RO-VIM-openstack/deb_dist/
Removing RO-VIM-openstack/dist/
Removing RO-VIM-openstack/osm_rovim_openstack-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-VIM-openstack/osm_rovim_openstack.egg-info/
Removing RO-VIM-openvim/deb_dist/
Removing RO-VIM-openvim/dist/
Removing RO-VIM-openvim/osm_rovim_openvim-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-VIM-openvim/osm_rovim_openvim.egg-info/
Removing RO-VIM-vmware/deb_dist/
Removing RO-VIM-vmware/dist/
Removing RO-VIM-vmware/osm_rovim_vmware-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-VIM-vmware/osm_rovim_vmware.egg-info/
Removing RO-plugin/.eggs/
Removing RO-plugin/deb_dist/
Removing RO-plugin/dist/
Removing RO-plugin/osm_ro_plugin-12.0.8.post1+g4c8efb9.tar.gz
Removing RO-plugin/osm_ro_plugin.egg-info/
Removing build.env
Removing changelog/
Removing cover/
Removing coverage.xml
Removing deb_dist/
Removing dists/
Removing nosetests.xml
Removing pool/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (License Scan)
[Pipeline] echo
skip the scan for merge
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Release Note Check)
[Pipeline] fileExists
[Pipeline] echo
Not checking release notes for merge job
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Docker-Build)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/ro-v12.0 .
Sending build context to Docker daemon 66.94MB
Step 1/8 : FROM ubuntu:20.04
---> 2abc4dfd8318
Step 2/8 : ARG APT_PROXY
---> Using cache
---> 5c36130a0ee6
Step 3/8 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi
---> Using cache
---> 0bb125df54e2
Step 4/8 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools
---> Using cache
---> 0fb5891c172c
Step 5/8 : RUN python3 -m easy_install pip==21.3.1
---> Using cache
---> 8c3089b7e0bb
Step 6/8 : RUN pip install tox==3.24.5
---> Using cache
---> f08fea27c7ba
Step 7/8 : ENV LC_ALL C.UTF-8
---> Using cache
---> fafd36d7bf48
Step 8/8 : ENV LANG C.UTF-8
---> Using cache
---> 3b589ef22bf1
Successfully built 3b589ef22bf1
Successfully tagged osm/ro-v12.0:latest
[Pipeline] }
[Pipeline] // stage
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ id -u
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ id -g
[Pipeline] withDockerContainer
osm-cicd-3 does not seem to be running inside a container
$ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/RO-stage_2-merge_v12.0 -v /home/jenkins/workspace/RO-stage_2-merge_v12.0:/home/jenkins/workspace/RO-stage_2-merge_v12.0:rw,z -v /home/jenkins/workspace/RO-stage_2-merge_v12.0@tmp:/home/jenkins/workspace/RO-stage_2-merge_v12.0@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/ro-v12.0
[Pipeline] {
[Pipeline] stage
[Pipeline] { (Test)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ groupadd -o -g 1001 -r jenkins
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ pwd
+ useradd -o -u 1001 -d /home/jenkins/workspace/RO-stage_2-merge_v12.0 -r -g jenkins jenkins
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ echo #! /bin/sh
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ chmod 755 /usr/bin/mesg
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops-stages/stage-test.sh
Launching tox
black create: /tmp/.tox/black
black installdeps: black==23.12.1
black installed: black==23.12.1,click==8.1.7,mypy-extensions==1.0.0,packaging==24.0,pathspec==0.12.1,platformdirs==4.2.2,tomli==2.0.1,typing_extensions==4.11.0
black run-test-pre: PYTHONHASHSEED='2915035600'
black run-test: commands[0] | black --check --diff NG-RO
All done! β¨ π° β¨
14 files would be left unchanged.
black run-test: commands[1] | black --check --diff RO-plugin
All done! β¨ π° β¨
9 files would be left unchanged.
black run-test: commands[2] | black --check --diff RO-SDN-arista_cloudvision
All done! β¨ π° β¨
6 files would be left unchanged.
black run-test: commands[3] | black --check --diff RO-SDN-dpb
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[4] | black --check --diff RO-SDN-dynpac
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[5] | black --check --diff RO-SDN-floodlight_openflow
All done! β¨ π° β¨
5 files would be left unchanged.
black run-test: commands[6] | black --check --diff RO-SDN-ietfl2vpn
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[7] | black --check --diff RO-SDN-juniper_contrail
All done! β¨ π° β¨
7 files would be left unchanged.
black run-test: commands[8] | black --check --diff RO-SDN-odl_openflow
All done! β¨ π° β¨
5 files would be left unchanged.
black run-test: commands[9] | black --check --diff RO-SDN-onos_openflow
All done! β¨ π° β¨
5 files would be left unchanged.
black run-test: commands[10] | black --check --diff RO-SDN-onos_vpls
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[11] | black --check --diff RO-VIM-aws
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[12] | black --check --diff RO-VIM-azure
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[13] | black --check --diff RO-VIM-openstack
All done! β¨ π° β¨
5 files would be left unchanged.
black run-test: commands[14] | black --check --diff RO-VIM-openvim
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[15] | black --check --diff RO-VIM-vmware
All done! β¨ π° β¨
6 files would be left unchanged.
black run-test: commands[16] | black --check --diff RO-VIM-gcp
All done! β¨ π° β¨
4 files would be left unchanged.
black run-test: commands[17] | black --check --diff integration-tests
All done! β¨ π° β¨
1 file would be left unchanged.
flake8 create: /tmp/.tox/flake8
flake8 installdeps: flake8==6.1.0, flake8-import-order
flake8 installed: flake8==6.1.0,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.11.1,pyflakes==3.1.0
flake8 run-test-pre: PYTHONHASHSEED='2915035600'
flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py
flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py
flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py
flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py
flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py
flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py
flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py
flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py
flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py
flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py
flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py
flake8 run-test: commands[11] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py
flake8 run-test: commands[12] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py
flake8 run-test: commands[13] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py
flake8 run-test: commands[14] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py
flake8 run-test: commands[15] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py
flake8 run-test: commands[16] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py
flake8 run-test: commands[17] | flake8 integration-tests/
safety create: /tmp/.tox/safety
safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, safety
safety installed: adal==1.2.7,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,click==8.1.7,cliff==3.10.1,cmd2==2.4.1,cryptography==37.0.2,cvprac==1.2.0,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,dparse==0.6.3,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,ruamel.yaml==0.18.6,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tomli==2.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0
safety run-test-pre: PYTHONHASHSEED='2915035600'
safety run-test: commands[0] | - safety check --full-report
+==============================================================================+
/$$$$$$ /$$
/$$__ $$ | $$
/$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$
/$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$
| $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$
\____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$
/$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$
|_______/ \_______/|__/ \_______/ \___/ \____ $$
/$$ | $$
| $$$$$$/
by pyup.io \______/
+==============================================================================+
[1mREPORT[0m
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
Safety [1mv2.3.5[0m is scanning for [1mVulnerabilities[0m[1m...[0m
[1m Scanning dependencies[0m in your [1menvironment:[0m
-> /tmp/.tox/safety/lib/python3.8/site-packages
Using [1mnon-commercial database[0m
[1m Found and scanned 129 packages[0m
Timestamp [1m2024-05-22 22:35:21[0m
[1m 24[0m[1m vulnerabilities found[0m
[1m 0[0m[1m vulnerabilities ignored[0m
+==============================================================================+
[31m[1mVULNERABILITIES FOUND[0m
+==============================================================================+
[31m-> Vulnerability found in jinja2 version 3.1.2
[0m[1m Vulnerability ID: [0m64227
[1m Affected spec: [0m<3.1.3
[1m ADVISORY: [0mJinja2 before 3.1.3 is affected by a Cross-Site Scripting
vulnerability. Special placeholders in the template allow writing code
similar to Python syntax. It is possible to inject arbitrary HTML attributes
into the rendered HTML template. The Jinja 'xmlattr' filter can be abused to
inject arbitrary HTML attribute keys and values, bypassing the auto escaping
mechanism and potentially leading to XSS. It may also be possible to bypass
attribute validation checks if they are blacklist-based.
[1m CVE-2024-22195[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/64227/f17[0m
[31m-> Vulnerability found in pygments version 2.12.0
[0m[1m Vulnerability ID: [0m58910
[1m Affected spec: [0m<2.15.0
[1m ADVISORY: [0mPygments 2.15.0 includes a fix for CVE-2022-40896: The
regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java
properties files were discovered to be vulnerable. As a result, pygmentizing
a maliciously-crafted file of these kinds would have resulted in high
resources consumption or crashing of the
application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-
top-python-packages-part-2
[1m CVE-2022-40896[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58910/f17[0m
[31m-> Vulnerability found in certifi version 2022.6.15
[0m[1m Vulnerability ID: [0m52365
[1m Affected spec: [0m<2022.12.07
[1m ADVISORY: [0mCertifi 2022.12.07 includes a fix for CVE-2022-23491:
Certifi 2022.12.07 removes root certificates from "TrustCor" from the root
store. These are in the process of being removed from Mozilla's trust store.
TrustCor's root certificates are being removed pursuant to an investigation
prompted by media reporting that TrustCor's ownership also operated a
business that produced spyware. Conclusions of Mozilla's investigation can be
found in the linked google group
discussion.https://github.com/certifi/python-
certifi/security/advisories/GHSA-43fp-
rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security-
policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
[1m CVE-2022-23491[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/52365/f17[0m
[31m-> Vulnerability found in certifi version 2022.6.15
[0m[1m Vulnerability ID: [0m59956
[1m Affected spec: [0m>=2015.04.28,<2023.07.22
[1m ADVISORY: [0mCertifi 2023.07.22 includes a fix for CVE-2023-37920:
Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates.
e-Tugra's root certificates were subject to an investigation prompted by
reporting of security issues in their systems. Certifi 2023.07.22 removes
root certificates from "e-Tugra" from the root
store.https://github.com/certifi/python-certifi/security/advisories/GHSA-
xqr8-7jwr-rhp7
[1m CVE-2023-37920[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59956/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m65212
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mVersions of Cryptograph starting from 35.0.0 are
susceptible to a security flaw in the POLY1305 MAC algorithm on PowerPC CPUs,
which allows an attacker to disrupt the application's state. This disruption
might result in false calculations or cause a denial of service. The
vulnerability's exploitation hinges on the attacker's ability to alter the
algorithm's application and the dependency of the software on non-volatile
XMM registers.https://github.com/pyca/cryptography/commit/89d0d56fb104ac4e0e6
db63d78fc22b8c53d27e9
[1m CVE-2023-6129[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65212/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m66777
[1m Affected spec: [0m>=35.0.0,<42.0.2
[1m ADVISORY: [0mCVE-2023-6237 addresses a vulnerability in RSA public key
verification where checking a large, incorrect RSA key with
EVP_PKEY_public_check() could take an excessive amount of time. This is due
to no size limit on the RSA public key and an unnecessarily high number of
Miller-Rabin rounds for modulus non-primality checks. The fix sets a maximum
key size of 16384 bits and reduces Miller-Rabin rounds to 5, enhancing
security and performance by preventing the RSA_R_MODULUS_TOO_LARGE error.
[1m CVE-2023-6237[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/66777/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m65647
[1m Affected spec: [0m<42.0.5
[1m ADVISORY: [0mCryptography version 42.0.5 introduces a limit on the
number of name constraint checks during X.509 path validation to prevent
denial of service attacks.https://github.com/pyca/cryptography/commit/4be53bf
20cc90cbac01f5f94c5d1aecc5289ba1f
[1m PVE-2024-65647[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65647/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m53048
[1m Affected spec: [0m>=1.8,<39.0.1
[1m ADVISORY: [0mCryptography 39.0.1 includes a fix for CVE-2023-23931: In
affected versions 'Cipher.update_into' would accept Python objects which
implement the buffer protocol, but provide only immutable buffers. This would
allow immutable objects (such as 'bytes') to be mutated, thus violating
fundamental rules of Python and resulting in corrupted output. This issue has
been present since 'update_into' was originally introduced in cryptography
1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-
vj6r
[1m CVE-2023-23931[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/53048/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m59473
[1m Affected spec: [0m<41.0.2
[1m ADVISORY: [0mThe cryptography package before 41.0.2 for Python
mishandles SSH certificates that have critical options.
[1m CVE-2023-38325[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/59473/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m62556
[1m Affected spec: [0m>=3.1,<41.0.6
[1m ADVISORY: [0mCryptography 41.0.6 includes a fix for CVE-2023-49083:
NULL-dereference when loading PKCS7
certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97
[1m CVE-2023-49083[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/62556/f17[0m
[31m-> Vulnerability found in cryptography version 37.0.2
[0m[1m Vulnerability ID: [0m65278
[1m Affected spec: [0m<42.0.0
[1m ADVISORY: [0mA flaw was found in the python-cryptography package. This
issue may allow a remote attacker to decrypt captured messages in TLS servers
that use RSA key exchanges, which may lead to exposure of confidential or
sensitive data. See CVE-2023-50782.
[1m CVE-2023-50782[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65278/f17[0m
[31m-> Vulnerability found in idna version 3.3
[0m[1m Vulnerability ID: [0m67895
[1m Affected spec: [0m<3.7
[1m ADVISORY: [0mCVE-2024-3651 impacts the idna.encode() function, where a
specially crafted argument could lead to significant resource consumption,
causing a denial-of-service. In version 3.7, this function has been updated
to reject such inputs efficiently, minimizing resource use. A practical
workaround involves enforcing a maximum domain name length of 253 characters
before encoding, as the vulnerability is triggered by unusually large inputs
that normal operations wouldn't encounter.
[1m CVE-2024-3651[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/67895/f17[0m
[31m-> Vulnerability found in lxml version 4.9.0
[0m[1m Vulnerability ID: [0m50748
[1m Affected spec: [0m<4.9.1
[1m ADVISORY: [0mLxml 4.9.1 includes a fix for CVE-2022-2309: NULL Pointer
Dereference allows attackers to cause a denial of service (or application
crash). This only applies when lxml is used together with libxml2 2.9.10
through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows
triggering crashes through forged input data, given a vulnerable code
sequence in the application. The vulnerability is caused by the iterwalk
function (also used by the canonicalize function). Such code shouldn't be in
wide-spread use, given that parsing + iterwalk would usually be replaced with
the more efficient iterparse function. However, an XML converter that
serialises to C14N would also be vulnerable, for example, and there are
legitimate use cases for this code sequence. If untrusted input is received
(also remotely) and processed via iterwalk function, a crash can be
triggered.
[1m CVE-2022-2309[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50748/f17[0m
[31m-> Vulnerability found in msal version 1.18.0
[0m[1m Vulnerability ID: [0m66065
[1m Affected spec: [0m>=0,<1.24.1
[1m ADVISORY: [0mThe Microsoft Authentication Library (MSAL) for Python
before 1.24.1 is susceptible to a vulnerability in certain versions due to
inadequate input sanitization within the authcode.py file. This flaw allows
for the improper neutralization of special elements in data query
logic.https://github.com/AzureAD/microsoft-authentication-library-for-
python/commit/3427c2577bb674196a59e58cbf5aa91ad92cba7d
[1m PVE-2024-99774[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/66065/f17[0m
[31m-> Vulnerability found in oauthlib version 3.2.0
[0m[1m Vulnerability ID: [0m50959
[1m Affected spec: [0m>=3.1.1,<3.2.1
[1m ADVISORY: [0mOAuthLib 3.2.1 includes a fix for CVE-2022-36087: In
OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect
uri can cause denial of service. An attacker can also leverage usage of
'uri_validate' functions depending where it is used. OAuthLib applications
using OAuth2.0 provider support or use directly 'uri_validate' are affected
by this issue. There are no known workarounds.https://github.com/oauthlib/oau
thlib/security/advisories/GHSA-3pgj-pg6c-r5p7
[1m CVE-2022-36087[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/50959/f17[0m
[31m-> Vulnerability found in paramiko version 2.11.0
[0m[1m Vulnerability ID: [0m65193
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mParamiko's core implementation of the SSH transport
protocol, including certain OpenSSH extensions used before OpenSSH 9.6, is
vulnerable to a "Terrapin attack." This vulnerability allows remote attackers
to manipulate packet integrity during the handshake phase, potentially
leading to security downgrades or disabled features in SSH connections.
Specific attacks target the use of ChaCha20-Poly1305 and CBC with Encrypt-
then-MAC, where sequence numbers and integrity checks are improperly managed.
This issue particularly affects the chacha20-poly1305@openssh.com and
-etm@openssh.com MAC algorithms.
[1m CVE-2023-48795[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65193/f17[0m
[31m-> Vulnerability found in paramiko version 2.11.0
[0m[1m Vulnerability ID: [0m63227
[1m Affected spec: [0m<3.4.0
[1m ADVISORY: [0mParamiko 3.4.0 has been released to fix vulnerabilities
affecting encrypt-then-MAC digest algorithms in tandem with CBC ciphers, and
ChaCha20-poly1305. The fix requires cooperation from both ends of the
connection, making it effective when the remote end is OpenSSH >= 9.6 and
configured to use the new βstrict kexβ mode. For further details, refer to
the official Paramiko documentation or GitHub
repository.https://github.com/advisories/GHSA-45x7-px36-x8w8
[1m CVE-2023-48795[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/63227/f17[0m
[31m-> Vulnerability found in pip version 24.0
[0m[1m Vulnerability ID: [0m67599
[1m Affected spec: [0m>=0
[1m ADVISORY: [0m** DISPUTED ** An issue was discovered in pip (all
versions) because it installs the version with the highest version number,
even if the user had intended to obtain a private package from a private
index. This only affects use of the --extra-index-url option, and
exploitation requires that the package does not already exist in the public
index (and thus the attacker can put the package there with an arbitrary
version number). NOTE: it has been reported that this is intended
functionality and the user is responsible for using --extra-index-url
securely.
[1m CVE-2018-20225[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/67599/f17[0m
[31m-> Vulnerability found in protobuf version 4.21.1
[0m[1m Vulnerability ID: [0m51167
[1m Affected spec: [0m>=4.0.0rc0,<4.21.6
[1m ADVISORY: [0mProtobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix
for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the
ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2,
3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and
including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf-
python can lead to out of memory failures. A specially crafted message with
multiple key-value per elements creates parsing issues, and can lead to a
Denial of Service against services receiving unsanitized input.https://github
.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf
[1m CVE-2022-1941[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/51167/f17[0m
[31m-> Vulnerability found in pyopenssl version 22.0.0
[0m[1m Vulnerability ID: [0m65213
[1m Affected spec: [0m>=22.0.0
[1m ADVISORY: [0mCVE-2023-6129 affects PyOpenSSL versions starting from
22.0.0 due to a vulnerability in the POLY1305 MAC algorithm on PowerPC CPUs.
This issue could lead to state corruption in applications, causing inaccurate
outcomes or service disruptions. Attackers need specific conditions to
exploit this flaw, including the ability to manipulate the algorithm's use
and reliance on certain system registers by the application.
[1m CVE-2023-6129[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/65213/f17[0m
[31m-> Vulnerability found in pyvcloud version 19.1.1
[0m[1m Vulnerability ID: [0m36809
[1m Affected spec: [0m<20.0.0
[1m ADVISORY: [0mPyvcloud 20.0.0 fixes CVE-2017-18342: Replace yaml.load()
with yaml.safe_load()
[1m CVE-2017-18342[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/36809/f17[0m
[31m-> Vulnerability found in requests version 2.28.0
[0m[1m Vulnerability ID: [0m58755
[1m Affected spec: [0m>=2.3.0,<2.31.0
[1m ADVISORY: [0mRequests 2.31.0 includes a fix for CVE-2023-32681: Since
Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to
destination servers when redirected to an HTTPS endpoint. This is a product
of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header
to requests. For HTTP connections sent through the tunnel, the proxy will
identify the header in the request itself and remove it prior to forwarding
to the destination server. However when sent over HTTPS, the 'Proxy-
Authorization' header must be sent in the CONNECT request as the proxy has no
visibility into the tunneled request. This results in Requests forwarding
proxy credentials to the destination server unintentionally, allowing a
malicious actor to potentially exfiltrate sensitive information.
[1m CVE-2023-32681[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/58755/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.9
[0m[1m Vulnerability ID: [0m61893
[1m Affected spec: [0m<1.26.18
[1m ADVISORY: [0mUrllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803:
Request body not stripped after redirect from 303 status changes request
method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m
x-q9vg-27p4
[1m CVE-2023-45803[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61893/f17[0m
[31m-> Vulnerability found in urllib3 version 1.26.9
[0m[1m Vulnerability ID: [0m61601
[1m Affected spec: [0m<1.26.17
[1m ADVISORY: [0mUrllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804:
Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers
for managing cookies over HTTP, that is the responsibility of the user.
However, it is possible for a user to specify a 'Cookie' header and
unknowingly leak information via HTTP redirects to a different origin if that
user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/
security/advisories/GHSA-v845-jxx5-vc9f
[1m CVE-2023-43804[0m
[1m For more information, please visit
[0mhttps://data.safetycli.com/v/61601/f17[0m
Scan was completed. 24 vulnerabilities were found.
+==============================================================================+
[32m[1m REMEDIATIONS[0m
24 vulnerabilities were found in 15 packages. For detailed remediation & fix
recommendations, upgrade to a commercial license.
+==============================================================================+
[31m[22m Safety is using PyUp's free open-source vulnerability database. This
data is 30 days old and limited. [0m
[31m For real-time enhanced vulnerability data, fix recommendations, severity
reporting, cybersecurity support, team and project policy management and more
sign up at https://pyup.io or email sales@pyup.io[0m
+==============================================================================+[0m
cover create: /tmp/.tox/cover
cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v12.0/requirements-test.txt
cover installed: adal==1.2.7,aiokafka==0.7.2,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,cliff==3.10.1,cmd2==2.4.1,coverage==6.4.1,cryptography==37.0.2,cvprac==1.2.0,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,kafka-python==2.0.2,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,mock==4.0.3,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,nose2==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,osm_common @ git+https://osm.etsi.org/gerrit/osm/common.git@6aaeaa389273ec46b469f79f3c9b47cf3249bd74,-e git+https://osm.etsi.org/gerrit/osm/RO.git@4c8efb91e6fe449961d2f3a750e6cf84cb167fea#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,pymongo==3.12.3,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0
cover run-test-pre: PYTHONHASHSEED='2915035600'
cover run-test: commands[0] | sh -c 'rm -f nosetests.xml'
cover run-test: commands[1] | coverage erase
cover run-test: commands[2] | nose2 -C --coverage NG-RO/osm_ng_ro -s NG-RO/osm_ng_ro
ERROR:root:The 'osm_ng_ro' distribution was not found and is required by the application occured while getting the ro version
Traceback (most recent call last):
File "/home/jenkins/workspace/RO-stage_2-merge_v12.0/NG-RO/osm_ng_ro/__init__.py", line 26, in <module>
version = get_distribution("osm_ng_ro").version
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 497, in get_distribution
dist = get_provider(dist)
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 384, in get_provider
return working_set.find(moduleOrReq) or require(str(moduleOrReq))[0]
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 937, in require
needed = self.resolve(parse_requirements(requirements))
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 798, in resolve
dist = self._resolve_dist(
File "/tmp/.tox/cover/lib/python3.8/site-packages/pkg_resources/__init__.py", line 839, in _resolve_dist
raise DistributionNotFound(req, requirers)
pkg_resources.DistributionNotFound: The 'osm_ng_ro' distribution was not found and is required by the application
....ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
..ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim'
.................................................................................................................................................................................................................................................................................................................................
----------------------------------------------------------------------
Ran 329 tests in 1.076s
OK
Name Stmts Miss Cover
-------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1182 672 43%
NG-RO/osm_ng_ro/ns_thread.py 1287 913 29%
NG-RO/osm_ng_ro/ro_main.py 457 457 0%
NG-RO/osm_ng_ro/tests/__init__.py 0 0 100%
NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100%
NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99%
NG-RO/osm_ng_ro/tests/test_ns.py 1694 6 99%
NG-RO/osm_ng_ro/tests/test_ns_thread.py 555 0 100%
NG-RO/osm_ng_ro/validation.py 34 13 62%
NG-RO/osm_ng_ro/vim_admin.py 224 187 17%
-------------------------------------------------------------
TOTAL 7258 2310 68%
cover run-test: commands[3] | sh -c 'mv .coverage .coverage_ng_ro'
cover run-test: commands[4] | nose2 -C --coverage RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail -s RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail
....
----------------------------------------------------------------------
Ran 4 tests in 0.008s
OK
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------------------
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100%
-------------------------------------------------------------------------------------------------------------------
TOTAL 697 484 31%
cover run-test: commands[5] | sh -c 'mv .coverage .coverage_rosdn_juniper_contrail'
cover run-test: commands[6] | nose2 -C --coverage RO-VIM-openstack/osm_rovim_openstack -s RO-VIM-openstack/osm_rovim_openstack
..........................................................................................................................................................................................................................WARNING:cinderclient.api_versions:Version 2 is deprecated, use alternative version 3 instead.
....................................
----------------------------------------------------------------------
Ran 254 tests in 1.983s
OK
Name Stmts Miss Cover
------------------------------------------------------------------------------------------
RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/tests/test_vimconn_openstack.py 3094 23 99%
RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1821 1002 45%
------------------------------------------------------------------------------------------
TOTAL 4915 1025 79%
cover run-test: commands[7] | sh -c 'mv .coverage .coverage_rovim_openstack'
cover run-test: commands[8] | coverage combine .coverage_ng_ro .coverage_rovim_openstack .coverage_rosdn_juniper_contrail
Combined data file .coverage_ng_ro
Combined data file .coverage_rovim_openstack
Combined data file .coverage_rosdn_juniper_contrail
cover run-test: commands[9] | coverage report '--omit=*tests*'
Name Stmts Miss Cover
-------------------------------------------------------------------------------------------------------
NG-RO/osm_ng_ro/__init__.py 8 0 100%
NG-RO/osm_ng_ro/html_out.py 55 55 0%
NG-RO/osm_ng_ro/monitor.py 301 3 99%
NG-RO/osm_ng_ro/ns.py 1182 672 43%
NG-RO/osm_ng_ro/ns_thread.py 1287 913 29%
NG-RO/osm_ng_ro/ro_main.py 457 457 0%
NG-RO/osm_ng_ro/validation.py 34 13 62%
NG-RO/osm_ng_ro/vim_admin.py 224 187 17%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46%
RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19%
RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100%
RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1821 1002 45%
-------------------------------------------------------------------------------------------------------
TOTAL 6031 3786 37%
cover run-test: commands[10] | coverage html -d ./cover '--omit=*tests*'
Wrote HTML report to ./cover/index.html
cover run-test: commands[11] | coverage xml -o coverage.xml '--omit=*tests*'
Wrote XML report to coverage.xml
___________________________________ summary ____________________________________
black: commands succeeded
flake8: commands succeeded
safety: commands succeeded
cover: commands succeeded
congratulations :)
[Pipeline] fileExists
[Pipeline] step
[Cobertura] Publishing Cobertura coverage report...
[Cobertura] Publishing Cobertura coverage results...
[Cobertura] Cobertura coverage report found.
[Pipeline] fileExists
[Pipeline] junit
Recording test results
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Build)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops-stages/stage-build.sh
+ rm -rf 'deb_dist/*'
+ mkdir -p deb_dist
+ PACKAGES='
dist_ro_plugin
dist_ng_ro
dist_ro_sdn_arista_cloudvision
dist_ro_sdn_dpb
dist_ro_sdn_dynpac
dist_ro_sdn_floodlight_of
dist_ro_sdn_ietfl2vpn
dist_ro_sdn_juniper_contrail
dist_ro_sdn_odl_of
dist_ro_sdn_onos_of
dist_ro_sdn_onos_vpls
dist_ro_vim_aws
dist_ro_vim_azure
dist_ro_vim_openstack
dist_ro_vim_openvim
dist_ro_vim_vmware
dist_ro_vim_gcp'
++ echo dist_ro_plugin dist_ng_ro dist_ro_sdn_arista_cloudvision dist_ro_sdn_dpb dist_ro_sdn_dynpac dist_ro_sdn_floodlight_of dist_ro_sdn_ietfl2vpn dist_ro_sdn_juniper_contrail dist_ro_sdn_odl_of dist_ro_sdn_onos_of dist_ro_sdn_onos_vpls dist_ro_vim_aws dist_ro_vim_azure dist_ro_vim_openstack dist_ro_vim_openvim dist_ro_vim_vmware dist_ro_vim_gcp
++ sed 's/ /,/g'
+ TOX_ENV_LIST=dist_ro_plugin,dist_ng_ro,dist_ro_sdn_arista_cloudvision,dist_ro_sdn_dpb,dist_ro_sdn_dynpac,dist_ro_sdn_floodlight_of,dist_ro_sdn_ietfl2vpn,dist_ro_sdn_juniper_contrail,dist_ro_sdn_odl_of,dist_ro_sdn_onos_of,dist_ro_sdn_onos_vpls,dist_ro_vim_aws,dist_ro_vim_azure,dist_ro_vim_openstack,dist_ro_vim_openvim,dist_ro_vim_vmware,dist_ro_vim_gcp
+ TOX_PARALLEL_NO_SPINNER=1
+ tox -e dist_ro_plugin,dist_ng_ro,dist_ro_sdn_arista_cloudvision,dist_ro_sdn_dpb,dist_ro_sdn_dynpac,dist_ro_sdn_floodlight_of,dist_ro_sdn_ietfl2vpn,dist_ro_sdn_juniper_contrail,dist_ro_sdn_odl_of,dist_ro_sdn_onos_of,dist_ro_sdn_onos_vpls,dist_ro_vim_aws,dist_ro_vim_azure,dist_ro_vim_openstack,dist_ro_vim_openvim,dist_ro_vim_vmware,dist_ro_vim_gcp
+ cp RO-plugin/deb_dist/python3-osm-ro-plugin_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ cp NG-RO/deb_dist/python3-osm-ng-ro_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for vim_plugin in RO-VIM-*
+ cp RO-VIM-aws/deb_dist/python3-osm-rovim-aws_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for vim_plugin in RO-VIM-*
+ cp RO-VIM-azure/deb_dist/python3-osm-rovim-azure_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for vim_plugin in RO-VIM-*
+ cp RO-VIM-gcp/deb_dist/python3-osm-rovim-gcp_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for vim_plugin in RO-VIM-*
+ cp RO-VIM-openstack/deb_dist/python3-osm-rovim-openstack_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for vim_plugin in RO-VIM-*
+ cp RO-VIM-openvim/deb_dist/python3-osm-rovim-openvim_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for vim_plugin in RO-VIM-*
+ cp RO-VIM-vmware/deb_dist/python3-osm-rovim-vmware_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-arista_cloudvision/deb_dist/python3-osm-rosdn-arista-cloudvision_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-dpb/deb_dist/python3-osm-rosdn-dpb_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-dynpac/deb_dist/python3-osm-rosdn-dynpac_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-floodlight_openflow/deb_dist/python3-osm-rosdn-floodlightof_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-ietfl2vpn/deb_dist/python3-osm-rosdn-ietfl2vpn_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-juniper_contrail/deb_dist/python3-osm-rosdn-juniper-contrail_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-odl_openflow/deb_dist/python3-osm-rosdn-odlof_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-onos_openflow/deb_dist/python3-osm-rosdn-onosof_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
+ for sdn_plugin in RO-SDN-*
+ cp RO-SDN-onos_vpls/deb_dist/python3-osm-rosdn-onos-vpls_12.0.8.post1+g4c8efb9-1_all.deb deb_dist/
[Pipeline] }
[Pipeline] // stage
[Pipeline] stage
[Pipeline] { (Archive)
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c mkdir -p changelog
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops/tools/generatechangelog-pipeline.sh > changelog/changelog-RO.html
[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ runuser jenkins -c devops-stages/stage-archive.sh
devops-stages/stage-archive.sh: 21: apt-ftparchive: not found
[Pipeline] getArtifactoryServer
[Pipeline] newBuildInfo
[Pipeline] artifactoryUpload
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/dists/unstable/RO/binary-amd64/Packages.gz
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/dists/unstable/RO/binary-amd64/Packages
[consumer_2] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-onosof_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rovim-aws_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rovim-openstack_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_2] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-ng-ro_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-dpb_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-arista-cloudvision_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rovim-vmware_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_2] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rovim-azure_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-dynpac_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-onos-vpls_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_2] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-ro-plugin_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rovim-gcp_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-juniper-contrail_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_2] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-ietfl2vpn_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-odlof_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_2] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rosdn-floodlightof_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_0] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/pool/RO/python3-osm-rovim-openvim_12.0.8.post1%2Bg4c8efb9-1_all.deb
[consumer_1] Deploying artifact: https://artifactory-osm.etsi.org/artifactory/osm-RO/v12.0/482/changelog/changelog-RO.html[Pipeline] publishBuildInfo
Deploying build info to: https://artifactory-osm.etsi.org/artifactory/api/build
Deploying build descriptor to: https://artifactory-osm.etsi.org/artifactory/api/build
Build successfully deployed. Browse it in Artifactory under https://artifactory-osm.etsi.org/artifactory/webapp/builds/RO-stage_2-merge%20::%20v12.0/482[Pipeline] sh
[RO-stage_2-merge_v12.0] Running shell script
+ env
[Pipeline] step
Archiving artifacts
Recording fingerprints
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
$ docker stop --time=1 d79c6ba108e3bacae46cd661215f2072e5ca3a0d372770ba7498309658c7dd32
$ docker rm -f d79c6ba108e3bacae46cd661215f2072e5ca3a0d372770ba7498309658c7dd32
[Pipeline] // withDockerContainer
[Pipeline] stage
[Pipeline] { (Snap build)
[Pipeline] fileExists
[Pipeline] }
[Pipeline] // stage
[Pipeline] }
[Pipeline] // node
[Pipeline] End of Pipeline
Finished: SUCCESS