Started by upstream project "buildall-stage_2-merge-v13" build number 320 originally caused by: Started by timer > git rev-parse --is-inside-work-tree # timeout=10 Setting origin to https://osm.etsi.org/gerrit/osm/RO.git > git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10 Fetching origin... Fetching upstream changes from origin > git --version # timeout=10 > git config --get remote.origin.url # timeout=10 > git fetch --tags --progress origin +refs/heads/*:refs/remotes/origin/* Seen branch in repository origin/5962-rebase Seen branch in repository origin/Azure Seen branch in repository origin/GCP Seen branch in repository origin/WIM Seen branch in repository origin/bug1511 Seen branch in repository origin/contrail Seen branch in repository origin/feature1429 Seen branch in repository origin/feature5837 Seen branch in repository origin/feature7106 Seen branch in repository origin/feature7148 Seen branch in repository origin/feature7184 Seen branch in repository origin/feature7928 Seen branch in repository origin/fog Seen branch in repository origin/lcm Seen branch in repository origin/master Seen branch in repository origin/netslice Seen branch in repository origin/ng-ro-refactor Seen branch in repository origin/paas Seen branch in repository origin/py3 Seen branch in repository origin/python3 Seen branch in repository origin/rift300 Seen branch in repository origin/snapcraft Seen branch in repository origin/sol006 Seen branch in repository origin/sol006v331 Seen branch in repository origin/v1.0 Seen branch in repository origin/v1.1 Seen branch in repository origin/v10.0 Seen branch in repository origin/v11.0 Seen branch in repository origin/v12.0 Seen branch in repository origin/v13.0 Seen branch in repository origin/v14.0 Seen branch in repository origin/v15.0 Seen branch in repository origin/v2.0 Seen branch in repository origin/v3.1 Seen branch in repository origin/v4.0 Seen branch in repository origin/v5.0 Seen branch in repository origin/v6.0 Seen branch in repository origin/v7.0 Seen branch in repository origin/v8.0 Seen branch in repository origin/v9.0 Seen branch in repository origin/vio Seen branch in repository origin/vnffg Seen 42 remote branches Obtained Jenkinsfile from 8453602c784e1f2458612d70ff40e19c2ff73d6f Running in Durability level: MAX_SURVIVABILITY [Pipeline] properties [Pipeline] node Running on osm-cicd-3 in /home/jenkins/workspace/RO-stage_2-merge_v13.0 [Pipeline] { [Pipeline] checkout No credentials specified > git rev-parse --is-inside-work-tree # timeout=10 Fetching changes from the remote Git repository > git config remote.origin.url https://osm.etsi.org/gerrit/osm/RO.git # timeout=10 Fetching without tags Fetching upstream changes from https://osm.etsi.org/gerrit/osm/RO.git > git --version # timeout=10 > git fetch --no-tags --force --progress https://osm.etsi.org/gerrit/osm/RO.git +refs/heads/*:refs/remotes/origin/* Checking out Revision 8453602c784e1f2458612d70ff40e19c2ff73d6f (v13.0) > git config core.sparsecheckout # timeout=10 > git checkout -f 8453602c784e1f2458612d70ff40e19c2ff73d6f Commit message: "Bug 2202: Adding support for cinder V3 API with V2 API for persistent volumes." > git rev-list --no-walk 8453602c784e1f2458612d70ff40e19c2ff73d6f # timeout=10 [Pipeline] dir Running in /home/jenkins/workspace/RO-stage_2-merge_v13.0/devops [Pipeline] { [Pipeline] git No credentials specified > git rev-parse --is-inside-work-tree # timeout=10 Fetching changes from the remote Git repository > git config remote.origin.url https://osm.etsi.org/gerrit/osm/devops # timeout=10 Fetching upstream changes from https://osm.etsi.org/gerrit/osm/devops > git --version # timeout=10 > git fetch --tags --force --progress https://osm.etsi.org/gerrit/osm/devops +refs/heads/*:refs/remotes/origin/* > git rev-parse refs/remotes/origin/v13.0^{commit} # timeout=10 > git rev-parse refs/remotes/origin/origin/v13.0^{commit} # timeout=10 Checking out Revision df75b7aed0e184455b9de743f82003a1a2513956 (refs/remotes/origin/v13.0) > git config core.sparsecheckout # timeout=10 > git checkout -f df75b7aed0e184455b9de743f82003a1a2513956 > git branch -a -v --no-abbrev # timeout=10 > git branch -D v13.0 # timeout=10 > git checkout -b v13.0 df75b7aed0e184455b9de743f82003a1a2513956 Commit message: "Update gen-repo.sh to fix download from artifactory" > git rev-list --no-walk df75b7aed0e184455b9de743f82003a1a2513956 # timeout=10 [Pipeline] } [Pipeline] // dir [Pipeline] load [Pipeline] { (devops/jenkins/ci-pipelines/ci_stage_2.groovy) [Pipeline] } [Pipeline] // load [Pipeline] echo do_stage_3= false [Pipeline] load [Pipeline] { (devops/jenkins/ci-pipelines/ci_helper.groovy) [Pipeline] } [Pipeline] // load [Pipeline] stage [Pipeline] { (Prepare) [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + env JENKINS_HOME=/var/lib/jenkins SSH_CLIENT=212.234.161.1 13726 22 USER=jenkins RUN_CHANGES_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/347/display/redirect?page=changes GERRIT_PROJECT=osm/RO XDG_SESSION_TYPE=tty SHLVL=0 NODE_LABELS=osm-cicd-3 osm3 stage_2 HUDSON_URL=https://osm.etsi.org/jenkins/ MOTD_SHOWN=pam OLDPWD=/home/jenkins HOME=/home/jenkins BUILD_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/347/ HUDSON_COOKIE=ad0d874e-b79c-45ab-94a8-6c2aa8ca9b2d JENKINS_SERVER_COOKIE=durable-8512a94381103eaafc7dd81c7418a473 DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/1001/bus GERRIT_PATCHSET_REVISION=8453602c784e1f2458612d70ff40e19c2ff73d6f WORKSPACE=/home/jenkins/workspace/RO-stage_2-merge_v13.0 LOGNAME=jenkins NODE_NAME=osm-cicd-3 GERRIT_BRANCH=v13.0 _=/usr/bin/java RUN_ARTIFACTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/347/display/redirect?page=artifacts XDG_SESSION_CLASS=user EXECUTOR_NUMBER=4 XDG_SESSION_ID=144 RUN_TESTS_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/347/display/redirect?page=tests BUILD_DISPLAY_NAME=#347 PROJECT_URL_PREFIX=https://osm.etsi.org/gerrit HUDSON_HOME=/var/lib/jenkins JOB_BASE_NAME=v13.0 PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin BUILD_ID=347 XDG_RUNTIME_DIR=/run/user/1001 BUILD_TAG=jenkins-RO-stage_2-merge-v13.0-347 JENKINS_URL=https://osm.etsi.org/jenkins/ LANG=C.UTF-8 JOB_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/ BUILD_NUMBER=347 SHELL=/bin/bash RUN_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/347/display/redirect ARTIFACTORY_SERVER=artifactory-osm GERRIT_REFSPEC=refs/changes/73/12973/3 HUDSON_SERVER_COOKIE=6d3295a483c3e6d5 JOB_DISPLAY_URL=https://osm.etsi.org/jenkins/job/RO-stage_2-merge/job/v13.0/display/redirect JOB_NAME=RO-stage_2-merge/v13.0 TEST_INSTALL=false PWD=/home/jenkins/workspace/RO-stage_2-merge_v13.0 SSH_CONNECTION=212.234.161.1 13726 172.21.249.3 22 BRANCH_NAME=v13.0 [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Checkout) [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + git fetch --tags [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + git fetch origin refs/changes/73/12973/3 From https://osm.etsi.org/gerrit/osm/RO * branch refs/changes/73/12973/3 -> FETCH_HEAD [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + git checkout -f 8453602c784e1f2458612d70ff40e19c2ff73d6f HEAD is now at 8453602 Bug 2202: Adding support for cinder V3 API with V2 API for persistent volumes. [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + sudo git clean -dfx Removing .cache/ Removing .coverage Removing .local/ Removing RO-plugin/.eggs/ Removing RO-plugin/osm_ro_plugin.egg-info/ Removing cover/ Removing coverage.xml Removing nosetests.xml [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (License Scan) [Pipeline] echo skip the scan for merge [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Release Note Check) [Pipeline] fileExists [Pipeline] echo Not checking release notes for merge job [Pipeline] } [Pipeline] // stage [Pipeline] stage [Pipeline] { (Docker-Build) [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + docker build --build-arg APT_PROXY=http://172.21.1.1:3142 -t osm/ro-v13.0 . Sending build context to Docker daemon 167.7MB Step 1/8 : FROM ubuntu:20.04 ---> f78909c2b360 Step 2/8 : ARG APT_PROXY ---> Using cache ---> 3f6949be98ab Step 3/8 : RUN if [ ! -z $APT_PROXY ] ; then echo "Acquire::http::Proxy \"$APT_PROXY\";" > /etc/apt/apt.conf.d/proxy.conf ; echo "Acquire::https::Proxy \"$APT_PROXY\";" >> /etc/apt/apt.conf.d/proxy.conf ; fi ---> Using cache ---> 83e4b76bb37a Step 4/8 : RUN DEBIAN_FRONTEND=noninteractive apt-get update && DEBIAN_FRONTEND=noninteractive apt-get -y install debhelper dh-python git python3 python3-all python3-dev python3-setuptools ---> Using cache ---> af2ca96d6fd7 Step 5/8 : RUN python3 -m easy_install pip==21.3.1 ---> Using cache ---> 47a2c0de14eb Step 6/8 : RUN pip install tox==3.24.5 ---> Using cache ---> b4175b532254 Step 7/8 : ENV LC_ALL C.UTF-8 ---> Using cache ---> 952a8a1de05f Step 8/8 : ENV LANG C.UTF-8 ---> Using cache ---> 03f3d11869d6 Successfully built 03f3d11869d6 Successfully tagged osm/ro-v13.0:latest [Pipeline] } [Pipeline] // stage [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + id -u [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + id -g [Pipeline] withDockerContainer osm-cicd-3 does not seem to be running inside a container $ docker run -t -d -u 1001:1001 -u root -w /home/jenkins/workspace/RO-stage_2-merge_v13.0 -v /home/jenkins/workspace/RO-stage_2-merge_v13.0:/home/jenkins/workspace/RO-stage_2-merge_v13.0:rw,z -v /home/jenkins/workspace/RO-stage_2-merge_v13.0@tmp:/home/jenkins/workspace/RO-stage_2-merge_v13.0@tmp:rw,z -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** -e ******** --entrypoint cat osm/ro-v13.0 [Pipeline] { [Pipeline] stage [Pipeline] { (Test) [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + groupadd -o -g 1001 -r jenkins [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + pwd + useradd -o -u 1001 -d /home/jenkins/workspace/RO-stage_2-merge_v13.0 -r -g jenkins jenkins [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + echo #! /bin/sh [Pipeline] sh [RO-stage_2-merge_v13.0] Running shell script + chmod 755 /usr/bin/mesg [RO-stage_2-merge_v13.0] Running shell script [Pipeline] sh + runuser jenkins -c devops-stages/stage-test.sh Launching tox black create: /tmp/.tox/black black installdeps: black black installed: black==24.1.1,click==8.1.7,mypy-extensions==1.0.0,packaging==23.2,pathspec==0.12.1,platformdirs==4.1.0,tomli==2.0.1,typing_extensions==4.9.0 black run-test-pre: PYTHONHASHSEED='1222343584' black run-test: commands[0] | black --check --diff NG-RO --- /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/monitor.py 2024-01-28 09:52:58.930247+00:00 +++ /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/monitor.py 2024-01-30 09:50:59.386467+00:00 @@ -524,25 +524,25 @@ vdur_update (dict): Dictionary which keeps the differences of vdur server (server): VM info vdur_path (str): Path of VDUR in DB """ if server.status in openStackvmStatusOk: - vdur_vim_info_update["vim_status"] = vdur_update[ - vdur_path + ".status" - ] = server.status + vdur_vim_info_update["vim_status"] = vdur_update[vdur_path + ".status"] = ( + server.status + ) else: - vdur_vim_info_update["vim_status"] = vdur_update[ - vdur_path + ".status" - ] = server.status + vdur_vim_info_update["vim_status"] = vdur_update[vdur_path + ".status"] = ( + server.status + ) vdur_vim_info_update["vim_message"] = "VIM status reported " + server.status vdur_vim_info_update["vim_details"] = self._get_server_info(server) vdur_vim_info_update["vim_id"] = server.id - vdur_vim_info_update["vim_name"] = vdur_update[ - vdur_path + ".name" - ] = server.name + vdur_vim_info_update["vim_name"] = vdur_update[vdur_path + ".name"] = ( + server.name + ) @staticmethod def get_interface_info( ports: dict, interface: dict, server: object ) -> Optional[dict]: @@ -608,23 +608,23 @@ vnfr_update (dict): VDUR record path in DB vnfr_id (str): VNFR ID """ current_ip_address = MonitorVms._get_current_ip_address(interface_info) if current_ip_address: - vdur_update[ - vdur_path + ".interfaces." + str(index) + ".ip-address" - ] = current_ip_address + vdur_update[vdur_path + ".interfaces." + str(index) + ".ip-address"] = ( + current_ip_address + ) if old_interface.get("mgmt_vdu_interface"): vdur_update[vdur_path + ".ip-address"] = current_ip_address if old_interface.get("mgmt_vnf_interface"): vnfr_update[vnfr_id + ".ip-address"] = current_ip_address - vdur_update[ - vdur_path + ".interfaces." + str(index) + ".mac-address" - ] = interface_info.get("mac_address") + vdur_update[vdur_path + ".interfaces." + str(index) + ".mac-address"] = ( + interface_info.get("mac_address") + ) @staticmethod def _get_current_ip_address(interface_info: dict) -> Optional[str]: if interface_info.get("fixed_ips") and interface_info["fixed_ips"][0]: return interface_info["fixed_ips"][0].get("ip_address") @@ -665,18 +665,22 @@ raise MonitorVmsException("Existing interfaces info could not found.") vdur_vim_info_update["interfaces"][index].update( { "mac_address": interface_info["mac_address"], - "ip_address": interface_info["fixed_ips"][0].get("ip_address") - if interface_info.get("fixed_ips") - else None, + "ip_address": ( + interface_info["fixed_ips"][0].get("ip_address") + if interface_info.get("fixed_ips") + else None + ), "vim_net_id": interface_info["network_id"], "vim_info": self.serialize(interface_info), - "compute_node": server.to_dict()["OS-EXT-SRV-ATTR:host"] - if server.to_dict().get("OS-EXT-SRV-ATTR:host") - else None, + "compute_node": ( + server.to_dict()["OS-EXT-SRV-ATTR:host"] + if server.to_dict().get("OS-EXT-SRV-ATTR:host") + else None + ), } ) def prepare_interface_updates( self, @@ -742,13 +746,13 @@ vnfr_id (str): VNFR ID """ for index, old_interface in enumerate(existing_vim_info["interfaces"]): interface_info = self.get_interface_info(ports, old_interface, server) if not interface_info: - vdur_vim_info_update[ - "vim_message" - ] = f"Interface {old_interface['vim_interface_id']} deleted externally." + vdur_vim_info_update["vim_message"] = ( + f"Interface {old_interface['vim_interface_id']} deleted externally." + ) else: if interface_info.get("status") in openStacknetStatusOk: self.prepare_interface_updates( vdur_vim_info_update, would reformat /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/monitor.py --- /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ro_main.py 2024-01-28 09:52:58.958250+00:00 +++ /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ro_main.py 2024-01-30 09:50:59.702425+00:00 @@ -251,13 +251,13 @@ ) indata = filecontent.file # .read() if filecontent.content_type.value: - cherrypy.request.headers[ - "Content-Type" - ] = filecontent.content_type.value + cherrypy.request.headers["Content-Type"] = ( + filecontent.content_type.value + ) else: # raise cherrypy.HTTPError(HTTPStatus.Not_Acceptable, # "Only 'Content-Type' of type 'application/json' or # 'application/yaml' for input format are available") error_text = "Invalid yaml format " @@ -353,13 +353,13 @@ # TODO check that cherrypy close file. If not implement pending things to close per thread next return data if accept: if "application/json" in accept: - cherrypy.response.headers[ - "Content-Type" - ] = "application/json; charset=utf-8" + cherrypy.response.headers["Content-Type"] = ( + "application/json; charset=utf-8" + ) a = json.dumps(data, indent=4) + "\n" return a.encode("utf8") elif "text/html" in accept: return html.format( @@ -536,19 +536,19 @@ self.ns.fs.file_delete(folder) return ",".join(folders) + " folders deleted\n" elif args and args[0] == "login": if not cherrypy.request.headers.get("Authorization"): - cherrypy.response.headers[ - "WWW-Authenticate" - ] = 'Basic realm="Access to OSM site", charset="UTF-8"' + cherrypy.response.headers["WWW-Authenticate"] = ( + 'Basic realm="Access to OSM site", charset="UTF-8"' + ) cherrypy.response.status = HTTPStatus.UNAUTHORIZED.value elif args and args[0] == "login2": if not cherrypy.request.headers.get("Authorization"): - cherrypy.response.headers[ - "WWW-Authenticate" - ] = 'Bearer realm="Access to OSM site"' + cherrypy.response.headers["WWW-Authenticate"] = ( + 'Bearer realm="Access to OSM site"' + ) cherrypy.response.status = HTTPStatus.UNAUTHORIZED.value elif args and args[0] == "sleep": sleep_time = 5 try: @@ -740,13 +740,15 @@ self._set_location_header(main_topic, version, topic, _id) cherrypy.response.status = ( HTTPStatus.ACCEPTED.value if not done - else HTTPStatus.OK.value - if outdata is not None - else HTTPStatus.NO_CONTENT.value + else ( + HTTPStatus.OK.value + if outdata is not None + else HTTPStatus.NO_CONTENT.value + ) ) return self._format_out(outdata, token_info, _format) except Exception as e: if isinstance( @@ -763,13 +765,13 @@ ): http_code_value = cherrypy.response.status = e.http_code.value http_code_name = e.http_code.name cherrypy.log("Exception {}".format(e)) else: - http_code_value = ( - cherrypy.response.status - ) = HTTPStatus.BAD_REQUEST.value # INTERNAL_SERVER_ERROR + http_code_value = cherrypy.response.status = ( + HTTPStatus.BAD_REQUEST.value + ) # INTERNAL_SERVER_ERROR cherrypy.log("CRITICAL: Exception {}".format(e), traceback=True) http_code_name = HTTPStatus.BAD_REQUEST.name if hasattr(outdata, "close"): # is an open file outdata.close() would reformat /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ro_main.py --- /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ns_thread.py 2024-01-28 09:52:58.954249+00:00 +++ /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ns_thread.py 2024-01-30 09:51:00.812473+00:00 @@ -283,13 +283,15 @@ "ro_task={} {} get-net={}: status={} {}".format( ro_task_id, ro_task["target_id"], vim_id, ro_vim_item_update.get("vim_status"), - ro_vim_item_update.get("vim_message") - if ro_vim_item_update.get("vim_status") != "ACTIVE" - else "", + ( + ro_vim_item_update.get("vim_message") + if ro_vim_item_update.get("vim_status") != "ACTIVE" + else "" + ), ) ) return task_status, ro_vim_item_update @@ -577,13 +579,15 @@ "ro_task={} {} get-vm={}: status={} {}".format( ro_task_id, ro_task["target_id"], vim_id, ro_vim_item_update.get("vim_status"), - ro_vim_item_update.get("vim_message") - if ro_vim_item_update.get("vim_status") != "ACTIVE" - else "", + ( + ro_vim_item_update.get("vim_message") + if ro_vim_item_update.get("vim_status") != "ACTIVE" + else "" + ), ) ) return task_status, ro_vim_item_update @@ -1130,13 +1134,13 @@ service_endpoint_id = "{}:{}".format(port["compute_node"], port["pci"]) new_port = { "service_endpoint_id": pmap.get("service_endpoint_id") or service_endpoint_id, - "service_endpoint_encapsulation_type": "dot1q" - if port["type"] == "SR-IOV" - else None, + "service_endpoint_encapsulation_type": ( + "dot1q" if port["type"] == "SR-IOV" else None + ), "service_endpoint_encapsulation_info": { "vlan": port.get("vlan"), "mac": port.get("mac-address"), "device_id": pmap.get("device_id") or port["compute_node"], "device_interface_id": pmap.get("device_interface_id") @@ -1675,13 +1679,11 @@ step = "" loaded = target_id in self.vim_targets target_database = ( "vim_accounts" if target == "vim" - else "wim_accounts" - if target == "wim" - else "sdns" + else "wim_accounts" if target == "wim" else "sdns" ) try: step = "Getting {} from db".format(target_id) db_vim = self.db.get_one(target_database, {"_id": _id}) @@ -1782,13 +1784,11 @@ """ target, _, _id = target_id.partition(":") target_database = ( "vim_accounts" if target == "vim" - else "wim_accounts" - if target == "wim" - else "sdns" + else "wim_accounts" if target == "wim" else "sdns" ) plugin_name = "" vim = None try: @@ -2087,13 +2087,13 @@ if ( my_task["target_record"] == task["target_record"] and task["action"] == "CREATE" ): # set to finished - db_update["tasks.{}.status".format(index)] = task[ - "status" - ] = "FINISHED" + db_update["tasks.{}.status".format(index)] = task["status"] = ( + "FINISHED" + ) elif task["action"] == "CREATE" and task["status"] not in ( "FINISHED", "SUPERSEDED", ): needed_delete = False @@ -2402,13 +2402,13 @@ raise NsWorkerException(error_text) task_depends[dependency_task_id] = dependency_ro_task[ "vim_info" ]["vim_id"] - task_depends[ - "TASK-{}".format(dependency_task_id) - ] = dependency_ro_task["vim_info"]["vim_id"] + task_depends["TASK-{}".format(dependency_task_id)] = ( + dependency_ro_task["vim_info"]["vim_id"] + ) if dependency_not_completed: self.logger.warning( "DEPENDENCY NOT COMPLETED {}".format( dependency_ro_task["vim_info"]["vim_id"] would reformat /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ns_thread.py --- /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ns.py 2024-01-28 09:52:58.934247+00:00 +++ /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ns.py 2024-01-30 09:51:00.828150+00:00 @@ -724,13 +724,15 @@ ): # Pinning policy "REQUIRE" uses threads as host should support SMT architecture # Pinning policy "ISOLATE" uses cores as host should not support SMT architecture # Pinning policy "PREFER" uses threads in case host supports SMT architecture numa[ - "cores" - if guest_epa_quota.get("cpu-thread-pinning-policy") == "ISOLATE" - else "threads" + ( + "cores" + if guest_epa_quota.get("cpu-thread-pinning-policy") == "ISOLATE" + else "threads" + ) ] = max(vcpu_count, 1) local_epa_vcpu_set = True return numa, local_epa_vcpu_set @@ -876,13 +878,13 @@ """ if not ip_profile: return None ro_ip_profile = { - "ip_version": "IPv4" - if "v4" in ip_profile.get("ip-version", "ipv4") - else "IPv6", + "ip_version": ( + "IPv4" if "v4" in ip_profile.get("ip-version", "ipv4") else "IPv6" + ), "subnet_address": ip_profile.get("subnet-address"), "gateway_address": ip_profile.get("gateway-address"), "dhcp_enabled": ip_profile.get("dhcp-params", {}).get("enabled", False), "dhcp_start_address": ip_profile.get("dhcp-params", {}).get( "start-address", None @@ -2823,13 +2825,13 @@ else: done += 1 return_data = { "status": global_status, - "details": ". ".join(details) - if details - else "progress {}/{}".format(done, total), + "details": ( + ". ".join(details) if details else "progress {}/{}".format(done, total) + ), "nsr_id": nsr_id, "action_id": action_id, "tasks": task_list, } would reformat /home/jenkins/workspace/RO-stage_2-merge_v13.0/NG-RO/osm_ng_ro/ns.py Oh no! 💥 💔 💥 4 files would be reformatted, 10 files would be left unchanged. ERROR: InvocationError for command /tmp/.tox/black/bin/black --check --diff NG-RO (exited with code 1) flake8 create: /tmp/.tox/flake8 flake8 installdeps: flake8==5.0.4, flake8-import-order flake8 installed: flake8==5.0.4,flake8-import-order==0.18.2,mccabe==0.7.0,pycodestyle==2.9.1,pyflakes==2.5.0 flake8 run-test-pre: PYTHONHASHSEED='1222343584' flake8 run-test: commands[0] | flake8 NG-RO/osm_ng_ro/ NG-RO/setup.py flake8 run-test: commands[1] | flake8 RO-plugin/osm_ro_plugin/ RO-plugin/setup.py flake8 run-test: commands[2] | flake8 RO-SDN-arista_cloudvision/osm_rosdn_arista_cloudvision/ RO-SDN-arista_cloudvision/setup.py flake8 run-test: commands[3] | flake8 RO-SDN-dpb/osm_rosdn_dpb/ RO-SDN-dpb/setup.py flake8 run-test: commands[4] | flake8 RO-SDN-dynpac/osm_rosdn_dynpac/ RO-SDN-dynpac/setup.py flake8 run-test: commands[5] | flake8 RO-SDN-floodlight_openflow/osm_rosdn_floodlightof/ RO-SDN-floodlight_openflow/setup.py flake8 run-test: commands[6] | flake8 RO-SDN-ietfl2vpn/osm_rosdn_ietfl2vpn/ RO-SDN-ietfl2vpn/setup.py flake8 run-test: commands[7] | flake8 RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/ RO-SDN-juniper_contrail/setup.py flake8 run-test: commands[8] | flake8 RO-SDN-odl_openflow/osm_rosdn_odlof/ RO-SDN-odl_openflow/setup.py flake8 run-test: commands[9] | flake8 RO-SDN-onos_openflow/osm_rosdn_onosof/ RO-SDN-onos_openflow/setup.py flake8 run-test: commands[10] | flake8 RO-SDN-onos_vpls/osm_rosdn_onos_vpls/ RO-SDN-onos_vpls/setup.py flake8 run-test: commands[11] | flake8 RO-VIM-aws/osm_rovim_aws/ RO-VIM-aws/setup.py flake8 run-test: commands[12] | flake8 RO-VIM-azure/osm_rovim_azure/ RO-VIM-azure/setup.py flake8 run-test: commands[13] | flake8 RO-VIM-openstack/osm_rovim_openstack/ RO-VIM-openstack/setup.py flake8 run-test: commands[14] | flake8 RO-VIM-openvim/osm_rovim_openvim/ RO-VIM-openvim/setup.py flake8 run-test: commands[15] | flake8 RO-VIM-vmware/osm_rovim_vmware/vimconn_vmware.py RO-VIM-vmware/osm_rovim_vmware/tests/test_vimconn_vmware.py RO-VIM-vmware/setup.py flake8 run-test: commands[16] | flake8 RO-VIM-gcp/osm_rovim_gcp/ RO-VIM-gcp/setup.py flake8 run-test: commands[17] | flake8 integration-tests/ safety create: /tmp/.tox/safety safety installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements.txt, safety safety installed: adal==1.2.7,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,click==8.1.7,cliff==3.10.1,cmd2==2.4.1,cryptography==37.0.2,cvprac==1.2.0,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,dparse==0.6.3,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,ruamel.yaml==0.18.5,ruamel.yaml.clib==0.2.8,safety==2.3.5,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tomli==2.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0 safety run-test-pre: PYTHONHASHSEED='1222343584' safety run-test: commands[0] | - safety check --full-report +==============================================================================+ /$$$$$$ /$$ /$$__ $$ | $$ /$$$$$$$ /$$$$$$ | $$ \__//$$$$$$ /$$$$$$ /$$ /$$ /$$_____/ |____ $$| $$$$ /$$__ $$|_ $$_/ | $$ | $$ | $$$$$$ /$$$$$$$| $$_/ | $$$$$$$$ | $$ | $$ | $$ \____ $$ /$$__ $$| $$ | $$_____/ | $$ /$$| $$ | $$ /$$$$$$$/| $$$$$$$| $$ | $$$$$$$ | $$$$/| $$$$$$$ |_______/ \_______/|__/ \_______/ \___/ \____ $$ /$$ | $$ | $$$$$$/ by pyup.io \______/ +==============================================================================+ REPORT  Safety is using PyUp's free open-source vulnerability database. This data is 30 days old and limited.   For real-time enhanced vulnerability data, fix recommendations, severity reporting, cybersecurity support, team and project policy management and more sign up at https://pyup.io or email sales@pyup.io Safety v2.3.5 is scanning for Vulnerabilities...  Scanning dependencies in your environment: -> /tmp/.tox/safety/lib/python3.8/site-packages Using non-commercial database  Found and scanned 129 packages Timestamp 2024-01-30 09:53:22  13 vulnerabilities found  0 vulnerabilities ignored +==============================================================================+ VULNERABILITIES FOUND +==============================================================================+ -> Vulnerability found in pygments version 2.12.0  Vulnerability ID: 58910  Affected spec: <2.15.0  ADVISORY: Pygments 2.15.0 includes a fix for CVE-2022-40896: The regular expressions used when parsing Smithy, SQL/SQL+Jinja, and Java properties files were discovered to be vulnerable. As a result, pygmentizing a maliciously-crafted file of these kinds would have resulted in high resources consumption or crashing of the application.https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in- top-python-packages-part-2  CVE-2022-40896  For more information, please visit https://data.safetycli.com/v/58910/f17 -> Vulnerability found in certifi version 2022.6.15  Vulnerability ID: 52365  Affected spec: <2022.12.07  ADVISORY: Certifi 2022.12.07 includes a fix for CVE-2022-23491: Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion.https://github.com/certifi/python- certifi/security/advisories/GHSA-43fp- rhv2-5gv8https://groups.google.com/a/mozilla.org/g/dev-security- policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ  CVE-2022-23491  For more information, please visit https://data.safetycli.com/v/52365/f17 -> Vulnerability found in certifi version 2022.6.15  Vulnerability ID: 59956  Affected spec: >=2015.04.28,<2023.07.22  ADVISORY: Certifi 2023.07.22 includes a fix for CVE-2023-37920: Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.https://github.com/certifi/python-certifi/security/advisories/GHSA- xqr8-7jwr-rhp7  CVE-2023-37920  For more information, please visit https://data.safetycli.com/v/59956/f17 -> Vulnerability found in cryptography version 37.0.2  Vulnerability ID: 53048  Affected spec: >=1.8,<39.0.1  ADVISORY: Cryptography 39.0.1 includes a fix for CVE-2023-23931: In affected versions 'Cipher.update_into' would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as 'bytes') to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This issue has been present since 'update_into' was originally introduced in cryptography 1.8.https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf- vj6r  CVE-2023-23931  For more information, please visit https://data.safetycli.com/v/53048/f17 -> Vulnerability found in cryptography version 37.0.2  Vulnerability ID: 59473  Affected spec: <41.0.2  ADVISORY: The cryptography package before 41.0.2 for Python mishandles SSH certificates that have critical options.  CVE-2023-38325  For more information, please visit https://data.safetycli.com/v/59473/f17 -> Vulnerability found in cryptography version 37.0.2  Vulnerability ID: 62556  Affected spec: >=3.1,<41.0.6  ADVISORY: Cryptography 41.0.6 includes a fix for CVE-2023-49083: NULL-dereference when loading PKCS7 certificates.https://github.com/advisories/GHSA-jfhm-5ghh-2f97  CVE-2023-49083  For more information, please visit https://data.safetycli.com/v/62556/f17 -> Vulnerability found in lxml version 4.9.0  Vulnerability ID: 50748  Affected spec: <4.9.1  ADVISORY: Lxml 4.9.1 includes a fix for CVE-2022-2309: NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.  CVE-2022-2309  For more information, please visit https://data.safetycli.com/v/50748/f17 -> Vulnerability found in oauthlib version 3.2.0  Vulnerability ID: 50959  Affected spec: >=3.1.1,<3.2.1  ADVISORY: OAuthLib 3.2.1 includes a fix for CVE-2022-36087: In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of 'uri_validate' functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly 'uri_validate' are affected by this issue. There are no known workarounds.https://github.com/oauthlib/oau thlib/security/advisories/GHSA-3pgj-pg6c-r5p7  CVE-2022-36087  For more information, please visit https://data.safetycli.com/v/50959/f17 -> Vulnerability found in protobuf version 4.21.1  Vulnerability ID: 51167  Affected spec: >=4.0.0rc0,<4.21.6  ADVISORY: Protobuf 3.18.3, 3.19.5, 3.20.2 and 4.21.6 include a fix for CVE-2022-1941: A parsing vulnerability for the MessageSet type in the ProtocolBuffers versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 3.21.5 for protobuf-cpp, and versions prior to and including 3.16.1, 3.17.3, 3.18.2, 3.19.4, 3.20.1 and 4.21.5 for protobuf- python can lead to out of memory failures. A specially crafted message with multiple key-value per elements creates parsing issues, and can lead to a Denial of Service against services receiving unsanitized input.https://github .com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf  CVE-2022-1941  For more information, please visit https://data.safetycli.com/v/51167/f17 -> Vulnerability found in pyvcloud version 19.1.1  Vulnerability ID: 36809  Affected spec: <20.0.0  ADVISORY: Pyvcloud 20.0.0 fixes CVE-2017-18342: Replace yaml.load() with yaml.safe_load()  CVE-2017-18342  For more information, please visit https://data.safetycli.com/v/36809/f17 -> Vulnerability found in requests version 2.28.0  Vulnerability ID: 58755  Affected spec: >=2.3.0,<2.31.0  ADVISORY: Requests 2.31.0 includes a fix for CVE-2023-32681: Since Requests 2.3.0, Requests has been leaking Proxy-Authorization headers to destination servers when redirected to an HTTPS endpoint. This is a product of how we use 'rebuild_proxies' to reattach the 'Proxy-Authorization' header to requests. For HTTP connections sent through the tunnel, the proxy will identify the header in the request itself and remove it prior to forwarding to the destination server. However when sent over HTTPS, the 'Proxy- Authorization' header must be sent in the CONNECT request as the proxy has no visibility into the tunneled request. This results in Requests forwarding proxy credentials to the destination server unintentionally, allowing a malicious actor to potentially exfiltrate sensitive information.  CVE-2023-32681  For more information, please visit https://data.safetycli.com/v/58755/f17 -> Vulnerability found in urllib3 version 1.26.9  Vulnerability ID: 61601  Affected spec: <1.26.17  ADVISORY: Urllib3 1.26.17 and 2.0.5 include a fix for CVE-2023-43804: Urllib3 doesn't treat the 'Cookie' HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a 'Cookie' header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.https://github.com/urllib3/urllib3/ security/advisories/GHSA-v845-jxx5-vc9f  CVE-2023-43804  For more information, please visit https://data.safetycli.com/v/61601/f17 -> Vulnerability found in urllib3 version 1.26.9  Vulnerability ID: 61893  Affected spec: <1.26.18  ADVISORY: Urllib3 1.26.18 and 2.0.7 include a fix for CVE-2023-45803: Request body not stripped after redirect from 303 status changes request method to GET.https://github.com/urllib3/urllib3/security/advisories/GHSA-g4m x-q9vg-27p4  CVE-2023-45803  For more information, please visit https://data.safetycli.com/v/61893/f17 Scan was completed. 13 vulnerabilities were found. +==============================================================================+  REMEDIATIONS 13 vulnerabilities were found in 9 packages. For detailed remediation & fix recommendations, upgrade to a commercial license. +==============================================================================+  Safety is using PyUp's free open-source vulnerability database. This data is 30 days old and limited.   For real-time enhanced vulnerability data, fix recommendations, severity reporting, cybersecurity support, team and project policy management and more sign up at https://pyup.io or email sales@pyup.io +==============================================================================+ cover create: /tmp/.tox/cover cover installdeps: -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements-dev.txt, -r/home/jenkins/workspace/RO-stage_2-merge_v13.0/requirements-test.txt cover installed: adal==1.2.7,aiokafka==0.7.2,appdirs==1.4.4,attrs==21.4.0,autopage==0.5.1,azure-common==1.1.28,azure-core==1.24.1,azure-identity==1.10.0,azure-mgmt-compute==27.1.0,azure-mgmt-core==1.3.1,azure-mgmt-network==20.0.0,azure-mgmt-resource==21.1.0,bcrypt==3.2.2,boto==2.49.0,cachetools==5.2.0,certifi==2022.6.15,cffi==1.15.0,charset-normalizer==2.0.12,cheroot==8.6.0,CherryPy==18.1.2,cliff==3.10.1,cmd2==2.4.1,coverage==6.4.1,cryptography==37.0.2,cvprac==1.2.0,dataclasses==0.6,debtcollector==2.5.0,decorator==5.1.1,dogpile.cache==1.1.6,flufl.enum==4.1.1,google-api-core==2.8.2,google-api-python-client==2.51.0,google-auth==2.8.0,google-auth-httplib2==0.1.0,google-cloud==0.34.0,googleapis-common-protos==1.56.3,httplib2==0.20.4,humanfriendly==10.0,idna==3.3,importlib-metadata==4.11.4,ipconflict==0.5.0,iso8601==1.0.2,isodate==0.6.1,jaraco.functools==3.5.0,Jinja2==3.1.2,jmespath==1.0.1,jsonpatch==1.32,jsonpointer==2.3,jsonschema==3.2.0,kafka-python==2.0.2,keystoneauth1==4.6.0,logutils==0.3.5,lxml==4.9.0,MarkupSafe==2.1.1,mock==4.0.3,more-itertools==8.13.0,msal==1.18.0,msal-extensions==1.0.0,msgpack==1.0.4,msrest==0.7.1,msrestazure==0.6.4,munch==4.0.0,netaddr==0.8.0,netifaces==0.11.0,nose2==0.11.0,oauthlib==3.2.0,openstacksdk==0.99.0,os-client-config==2.1.0,os-service-types==1.7.0,osc-lib==2.6.0,oslo.config==8.8.0,oslo.context==4.1.0,oslo.i18n==5.1.0,oslo.log==5.0.0,oslo.serialization==4.3.0,oslo.utils==6.0.0,osm-common @ git+https://osm.etsi.org/gerrit/osm/common.git@303ffe4f33c7a0fcc6b5c267d402c0e7d44e5a57,-e git+https://osm.etsi.org/gerrit/osm/RO.git@8453602c784e1f2458612d70ff40e19c2ff73d6f#egg=osm_ro_plugin&subdirectory=RO-plugin,packaging==21.3,paramiko==2.11.0,pbr==5.9.0,portalocker==2.4.0,portend==3.1.0,prettytable==3.3.0,progressbar==2.5,protobuf==4.21.1,py-radix==0.10.0,pyasn1==0.4.8,pyasn1-modules==0.2.8,pycparser==2.21,pycrypto==2.6.1,Pygments==2.12.0,pyinotify==0.9.6,PyJWT==2.4.0,pymongo==3.12.3,PyNaCl==1.5.0,pyOpenSSL==22.0.0,pyparsing==3.0.9,pyperclip==1.8.2,pyrsistent==0.18.1,python-cinderclient==7.4.1,python-dateutil==2.8.2,python-glanceclient==4.0.0,python-keystoneclient==4.5.0,python-neutronclient==7.8.0,python-novaclient==18.0.0,python-openstackclient==5.8.0,pytz==2022.1,pyvcloud==19.1.1,pyvmomi==7.0.3,PyYAML==5.4.1,requests==2.28.0,requests-oauthlib==1.3.1,requestsexceptions==1.4.0,rfc3986==2.0.0,rsa==4.8,simplejson==3.17.6,six==1.16.0,stevedore==3.5.0,tempora==5.0.1,tqdm==4.64.0,typing_extensions==4.2.0,uritemplate==4.1.1,urllib3==1.26.9,uuid==1.30,warlock==1.3.3,wcwidth==0.2.5,wrapt==1.14.1,zc.lockfile==2.0,zipp==3.8.0 cover run-test-pre: PYTHONHASHSEED='1222343584' cover run-test: commands[0] | sh -c 'rm -f nosetests.xml' cover run-test: commands[1] | coverage erase cover run-test: commands[2] | nose2 -C --coverage NG-RO/osm_ng_ro -s NG-RO/osm_ng_ro WARNING:root:The 'osm_ng_ro' distribution was not found and is required by the application occured while getting the ro version ............ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim' ..ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim' .ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim' .ERROR:ro.workerworker-3:Error updating tasks to enable VM status updates: 'my_target_vim' ...................................................................................................................................................................................................................................................................................................................................... ---------------------------------------------------------------------- Ran 342 tests in 1.209s OK Name Stmts Miss Cover ------------------------------------------------------------- NG-RO/osm_ng_ro/__init__.py 8 0 100% NG-RO/osm_ng_ro/html_out.py 55 55 0% NG-RO/osm_ng_ro/monitor.py 301 3 99% NG-RO/osm_ng_ro/ns.py 1189 672 43% NG-RO/osm_ng_ro/ns_thread.py 1284 894 30% NG-RO/osm_ng_ro/ro_main.py 457 457 0% NG-RO/osm_ng_ro/tests/__init__.py 0 0 100% NG-RO/osm_ng_ro/tests/sample_data.py 40 0 100% NG-RO/osm_ng_ro/tests/test_monitor.py 1421 4 99% NG-RO/osm_ng_ro/tests/test_ns.py 1777 6 99% NG-RO/osm_ng_ro/tests/test_ns_thread.py 624 0 100% NG-RO/osm_ng_ro/validation.py 34 13 62% NG-RO/osm_ng_ro/vim_admin.py 224 187 17% ------------------------------------------------------------- TOTAL 7414 2291 69% cover run-test: commands[3] | sh -c 'mv .coverage .coverage_ng_ro' cover run-test: commands[4] | nose2 -C --coverage RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail -s RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail .... ---------------------------------------------------------------------- Ran 4 tests in 0.007s OK Name Stmts Miss Cover ------------------------------------------------------------------------------------------------------------------- RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/__init__.py 0 0 100% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/tests/test_sdn_asssist_juniper_contrail.py 35 0 100% ------------------------------------------------------------------------------------------------------------------- TOTAL 697 484 31% cover run-test: commands[5] | sh -c 'mv .coverage .coverage_rosdn_juniper_contrail' cover run-test: commands[6] | nose2 -C --coverage RO-VIM-openstack/osm_rovim_openstack -s RO-VIM-openstack/osm_rovim_openstack ...........................................................................................................................................................................................................................................ssssssssssssssssssssssssssssssssssss ---------------------------------------------------------------------- Ran 271 tests in 1.721s OK (skipped=36) Name Stmts Miss Cover ------------------------------------------------------------------------------------------ RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100% RO-VIM-openstack/osm_rovim_openstack/tests/__init__.py 0 0 100% RO-VIM-openstack/osm_rovim_openstack/tests/test_vimconn_openstack.py 3325 184 94% RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1843 1242 33% ------------------------------------------------------------------------------------------ TOTAL 5168 1426 72% cover run-test: commands[7] | sh -c 'mv .coverage .coverage_rovim_openstack' cover run-test: commands[8] | coverage combine .coverage_ng_ro .coverage_rovim_openstack .coverage_rosdn_juniper_contrail Combined data file .coverage_ng_ro Combined data file .coverage_rovim_openstack Combined data file .coverage_rosdn_juniper_contrail cover run-test: commands[9] | coverage report '--omit=*tests*' Name Stmts Miss Cover ------------------------------------------------------------------------------------------------------- NG-RO/osm_ng_ro/__init__.py 8 0 100% NG-RO/osm_ng_ro/html_out.py 55 55 0% NG-RO/osm_ng_ro/monitor.py 301 3 99% NG-RO/osm_ng_ro/ns.py 1189 672 43% NG-RO/osm_ng_ro/ns_thread.py 1284 894 30% NG-RO/osm_ng_ro/ro_main.py 457 457 0% NG-RO/osm_ng_ro/validation.py 34 13 62% NG-RO/osm_ng_ro/vim_admin.py 224 187 17% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/__init__.py 0 0 100% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/rest_lib.py 126 90 29% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_api.py 154 83 46% RO-SDN-juniper_contrail/osm_rosdn_juniper_contrail/sdn_assist_juniper_contrail.py 382 311 19% RO-VIM-openstack/osm_rovim_openstack/__init__.py 0 0 100% RO-VIM-openstack/osm_rovim_openstack/vimconn_openstack.py 1843 1242 33% ------------------------------------------------------------------------------------------------------- TOTAL 6057 4007 34% cover run-test: commands[10] | coverage html -d ./cover '--omit=*tests*' Wrote HTML report to ./cover/index.html cover run-test: commands[11] | coverage xml -o coverage.xml '--omit=*tests*' Wrote XML report to coverage.xml ___________________________________ summary ____________________________________ ERROR: black: commands failed flake8: commands succeeded safety: commands succeeded cover: commands succeeded [Pipeline] } [Pipeline] // stage [Pipeline] } $ docker stop --time=1 a3b073eb2b081ca10ed14de8237a594cbfb7403451253985d27fbbfd1884f2d4 $ docker rm -f a3b073eb2b081ca10ed14de8237a594cbfb7403451253985d27fbbfd1884f2d4 [Pipeline] // withDockerContainer [Pipeline] } [Pipeline] // node [Pipeline] End of Pipeline ERROR: script returned exit code 1 Finished: FAILURE