Started by timer Running as SYSTEM [EnvInject] - Loading node environment variables. Building remotely on prd-ubuntu1804-docker-4c-4g-1430 (ubuntu1804-docker-4c-4g) in workspace /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script [ssh-agent] Looking for ssh-agent implementation... $ ssh-agent SSH_AUTH_SOCK=/tmp/ssh-4hQrjSTJjNWO/agent.2087 SSH_AGENT_PID=2089 [ssh-agent] Started. Running ssh-add (command line suppressed) Identity added: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script@tmp/private_key_1933479812455012530.key (jenkins-ssh) [ssh-agent] Using credentials jenkins (jenkins) The recommended git tool is: NONE using credential jenkins Wiping out workspace first. Cloning the remote Git repository Cloning repository ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw > git init /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script # timeout=10 Fetching upstream changes from ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw > git --version # timeout=10 > git --version # 'git version 2.17.1' using GIT_SSH to set credentials jenkins > git fetch --tags --progress -- ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw +refs/heads/*:refs/remotes/origin/* # timeout=10 > git config remote.origin.url ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw # timeout=10 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 Avoid second fetch > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 Checking out Revision 0231406ea0a153c94382e00927557a88dc81c48a (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f 0231406ea0a153c94382e00927557a88dc81c48a # timeout=10 Commit message: "- Update docs - Formatting docs - Added RMR msg `TS_QOE_PRED_REQ` to handle msg from QP driver - Add license header to _test.go - Added test command to get coverage report" > git rev-list --no-walk 0231406ea0a153c94382e00927557a88dc81c48a # timeout=10 provisioning config files... copy managed file [npmrc] to file:/home/jenkins/.npmrc copy managed file [pipconf] to file:/home/jenkins/.config/pip/pip.conf [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins1328625471231509166.sh ---> python-tools-install.sh Setup pyenv: * system (set by /opt/pyenv/version) * 3.8.13 (set by /opt/pyenv/version) * 3.9.13 (set by /opt/pyenv/version) * 3.10.6 (set by /opt/pyenv/version) lf-activate-venv(): INFO: Creating python3 venv at /tmp/venv-RuUK lf-activate-venv(): INFO: Save venv in file: /tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-RuUK/bin to PATH Generating Requirements File ERROR: pip's dependency resolver does not currently take into account all the packages that are installed. This behaviour is the source of the following dependency conflicts. lftools 0.37.12 requires requests<2.32.0, but you have requests 2.32.3 which is incompatible. Python 3.10.6 pip 25.1.1 from /tmp/venv-RuUK/lib/python3.10/site-packages/pip (python 3.10) appdirs==1.4.4 argcomplete==3.6.2 aspy.yaml==1.3.0 attrs==25.3.0 autopage==0.5.2 beautifulsoup4==4.13.4 boto3==1.38.22 botocore==1.38.22 bs4==0.0.2 cachetools==5.5.2 certifi==2025.4.26 cffi==1.17.1 cfgv==3.4.0 chardet==5.2.0 charset-normalizer==3.4.2 click==8.2.1 cliff==4.10.0 cmd2==2.5.11 cryptography==3.3.2 debtcollector==3.0.0 decorator==5.2.1 defusedxml==0.7.1 Deprecated==1.2.18 distlib==0.3.9 dnspython==2.7.0 docker==4.2.2 dogpile.cache==1.4.0 durationpy==0.10 email_validator==2.2.0 filelock==3.18.0 future==1.0.0 gitdb==4.0.12 GitPython==3.1.44 google-auth==2.40.2 httplib2==0.22.0 identify==2.6.10 idna==3.10 importlib-resources==1.5.0 iso8601==2.1.0 Jinja2==3.1.6 jmespath==1.0.1 jsonpatch==1.33 jsonpointer==3.0.0 jsonschema==4.23.0 jsonschema-specifications==2025.4.1 keystoneauth1==5.11.0 kubernetes==32.0.1 lftools==0.37.12 lxml==5.4.0 MarkupSafe==3.0.2 msgpack==1.1.0 multi_key_dict==2.0.3 munch==4.0.0 netaddr==1.3.0 niet==1.4.2 nodeenv==1.9.1 oauth2client==4.1.3 oauthlib==3.2.2 openstacksdk==4.5.0 os-client-config==2.1.0 os-service-types==1.7.0 osc-lib==4.0.0 oslo.config==9.8.0 oslo.context==6.0.0 oslo.i18n==6.5.1 oslo.log==7.1.0 oslo.serialization==5.7.0 oslo.utils==9.0.0 packaging==25.0 pbr==6.1.1 platformdirs==4.3.8 prettytable==3.16.0 psutil==7.0.0 pyasn1==0.6.1 pyasn1_modules==0.4.2 pycparser==2.22 pygerrit2==2.0.15 PyGithub==2.6.1 PyJWT==2.10.1 PyNaCl==1.5.0 pyparsing==2.4.7 pyperclip==1.9.0 pyrsistent==0.20.0 python-cinderclient==9.7.0 python-dateutil==2.9.0.post0 python-heatclient==4.2.0 python-jenkins==1.8.2 python-keystoneclient==5.6.0 python-magnumclient==4.8.1 python-openstackclient==8.0.0 python-swiftclient==4.7.0 PyYAML==6.0.2 referencing==0.36.2 requests==2.32.3 requests-oauthlib==2.0.0 requestsexceptions==1.4.0 rfc3986==2.0.0 rpds-py==0.25.1 rsa==4.9.1 ruamel.yaml==0.18.10 ruamel.yaml.clib==0.2.12 s3transfer==0.13.0 simplejson==3.20.1 six==1.17.0 smmap==5.0.2 soupsieve==2.7 stevedore==5.4.1 tabulate==0.9.0 toml==0.10.2 tomlkit==0.13.2 tqdm==4.67.1 typing_extensions==4.13.2 tzdata==2025.2 urllib3==1.26.20 virtualenv==20.31.2 wcwidth==0.2.13 websocket-client==1.8.0 wrapt==1.17.2 xdg==6.0.0 xmltodict==0.14.2 yq==3.4.3 [EnvInject] - Injecting environment variables from a build step. [EnvInject] - Injecting as environment variables the properties content SET_JDK_VERSION=openjdk17 GIT_URL="ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418" [EnvInject] - Variables injected successfully. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/sh /tmp/jenkins13808751931255121853.sh ---> update-java-alternatives.sh ---> Updating Java version ---> Ubuntu/Debian system detected update-alternatives: using /usr/lib/jvm/java-17-openjdk-amd64/bin/java to provide /usr/bin/java (java) in manual mode update-alternatives: using /usr/lib/jvm/java-17-openjdk-amd64/bin/javac to provide /usr/bin/javac (javac) in manual mode update-alternatives: using /usr/lib/jvm/java-17-openjdk-amd64 to provide /usr/lib/jvm/java-openjdk (java_sdk_openjdk) in manual mode openjdk version "17.0.7" 2023-04-18 OpenJDK Runtime Environment (build 17.0.7+7-Ubuntu-0ubuntu118.04) OpenJDK 64-Bit Server VM (build 17.0.7+7-Ubuntu-0ubuntu118.04, mixed mode, sharing) JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 [EnvInject] - Injecting environment variables from a build step. [EnvInject] - Injecting as environment variables the properties file path '/tmp/java.env' [EnvInject] - Variables injected successfully. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/sh /tmp/jenkins15661197681541782547.sh --> prescan-ric-app-qp-aimlfw-ubuntu.sh Docker version 24.0.2, build cb74dfc Unit Test #1 [internal] load .dockerignore #1 transferring context: 2B done #1 DONE 0.1s #2 [internal] load build definition from Dockerfile #2 transferring dockerfile: 2.51kB done #2 DONE 0.1s ERROR: failed to solve: target stage qpaimlfwbuild could not be found Unable to find image 'tmpimg:latest' locally Error response from daemon: pull access denied for tmpimg, repository does not exist or may require 'docker login': denied: requested access to the resource is denied must specify at least one container source Container name cannot be empty --> prescan-ric-app-qp-aimlfw.sh ends Unpacking https://repo1.maven.org/maven2/org/sonarsource/scanner/cli/sonar-scanner-cli/4.6.2.2472/sonar-scanner-cli-4.6.2.2472.zip to /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner on prd-ubuntu1804-docker-4c-4g-1430 [ric-app-qp-aimlfw-sonar-prescan-script] $ /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner/bin/sonar-scanner -Dsonar.host.url=https://sonarcloud.io/ ******** -Dsonar.projectKey=o-ran-sc_ric-app-qp-aimlfw -Dsonar.projectName=ric-app-qp-aimlfw -Dsonar.language=go -Dsonar.login=d9e23c28dc39b6d7531d2ecabf122ce84e6253ef -Dsonar.go.coverage.reportPaths=**/cover.out -Dsonar.organization=o-ran-sc -Dsonar.sources=. -Dsonar.inclusions=**/*.go -Dsonar.build.sourceEncoding=UTF-8 -Dsonar.exclusions=**/*_test.go -Dsonar.projectBaseDir=/w/workspace/ric-app-qp-aimlfw-sonar-prescan-script INFO: Scanner configuration file: /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner/conf/sonar-scanner.properties INFO: Project root configuration file: NONE INFO: SonarScanner 4.6.2.2472 INFO: Java 17.0.7 Private Build (64-bit) INFO: Linux 4.15.0-213-generic amd64 INFO: User cache: /home/jenkins/.sonar/cache INFO: Scanner configuration file: /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner/conf/sonar-scanner.properties INFO: Project root configuration file: NONE INFO: Analyzing on SonarCloud INFO: Default locale: "en", source code encoding: "UTF-8" (analysis is platform dependent) INFO: Load global settings INFO: Load global settings (done) | time=401ms INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu INFO: Loading required plugins INFO: Load plugins index INFO: Load plugins index (done) | time=267ms INFO: Load/download plugins INFO: Load/download plugins (done) | time=557ms INFO: Found an active CI vendor: 'Jenkins' INFO: Load project settings for component key: 'o-ran-sc_ric-app-qp-aimlfw' INFO: Load project settings for component key: 'o-ran-sc_ric-app-qp-aimlfw' (done) | time=306ms INFO: Process project properties INFO: Project key: o-ran-sc_ric-app-qp-aimlfw INFO: Base dir: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script INFO: Working dir: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork INFO: Load project branches INFO: Load project branches (done) | time=228ms INFO: Check ALM binding of project 'o-ran-sc_ric-app-qp-aimlfw' INFO: Detected project binding: NOT_BOUND INFO: Check ALM binding of project 'o-ran-sc_ric-app-qp-aimlfw' (done) | time=183ms INFO: Load project pull requests INFO: Load project pull requests (done) | time=189ms INFO: Load branch configuration INFO: Load branch configuration (done) | time=2ms INFO: Load quality profiles INFO: Load quality profiles (done) | time=408ms INFO: Load active rules INFO: Load active rules (done) | time=10361ms INFO: Organization key: o-ran-sc WARN: The property 'sonar.login' is deprecated and will be removed in the future. Please use the 'sonar.token' property instead when passing a token. INFO: Preprocessing files... INFO: 1 language detected in 8 preprocessed files INFO: 20 files ignored because of inclusion/exclusion patterns INFO: 0 files ignored because of scm ignore settings INFO: Loading plugins for detected languages INFO: Load/download plugins INFO: Load/download plugins (done) | time=347ms INFO: Load project repositories INFO: Load project repositories (done) | time=253ms INFO: Indexing files... INFO: Project configuration: INFO: Included sources: **/*.go INFO: Excluded sources: **/build-wrapper-dump.json, **/*_test.go INFO: 8 files indexed INFO: Quality profile for go: Sonar way INFO: ------------- Run sensors on module ric-app-qp-aimlfw INFO: Load metrics repository INFO: Load metrics repository (done) | time=570ms INFO: Sensor cache enabled INFO: Resolved api base url 'https://api.sonarcloud.io/' from host url 'https://sonarcloud.io/'. INFO: Load sensor cache INFO: Load sensor cache (37 KB) | time=2310ms INFO: Resolved api base url 'https://api.sonarcloud.io/' from host url 'https://sonarcloud.io/'. INFO: Sensor JaCoCo XML Report Importer [jacoco] INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=2ms INFO: Sensor Code Quality and Security for Go [go] INFO: 8 source files to be analyzed INFO: 8/8 source files have been analyzed INFO: Sensor Code Quality and Security for Go [go] (done) | time=525ms INFO: Sensor Go Cover sensor for Go coverage [go] WARN: Coverage report can't be loaded, file(s) not found for pattern: '**/cover.out', ignoring this file. INFO: Sensor Go Cover sensor for Go coverage [go] (done) | time=9ms INFO: Sensor Java Config Sensor [iac] INFO: 0 source files to be analyzed INFO: 0/0 source files have been analyzed INFO: Sensor Java Config Sensor [iac] (done) | time=16ms INFO: Sensor IaC Docker Sensor [iac] INFO: 0 source files to be analyzed INFO: 0/0 source files have been analyzed INFO: Sensor IaC Docker Sensor [iac] (done) | time=67ms INFO: Sensor Serverless configuration file sensor [security] INFO: 0 Serverless function entries were found in the project INFO: 0 Serverless function handlers were kept as entrypoints INFO: Sensor Serverless configuration file sensor [security] (done) | time=7ms INFO: Sensor AWS SAM template file sensor [security] INFO: Sensor AWS SAM template file sensor [security] (done) | time=0ms INFO: Sensor AWS SAM Inline template file sensor [security] INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=0ms INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise] INFO: Available processors: 4 INFO: Using 4 threads for analysis. INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true: * The filename starts with "test" * The filename contains "test." or "tests." * Any directory in the file path is named: "doc", "docs", "test" or "tests" * Any directory in the file path has a name ending in "test" or "tests" INFO: Start fetching files for the text and secrets analysis INFO: Using Git CLI to retrieve untracked files INFO: Retrieving language associated files and files included via "sonar.text.inclusions" that are tracked by git INFO: Starting the text and secrets analysis INFO: 8 source files to be analyzed for the text and secrets analysis INFO: 8/8 source files have been analyzed for the text and secrets analysis INFO: Start fetching files for the binary file analysis INFO: There are no files to be analyzed for the binary file analysis INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=653ms INFO: Sensor JavaSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S6096 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/java INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.004 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.004 INFO: No UCFGs have been included for analysis. INFO: java security sensor: Time spent was 00:00:00.051 INFO: java security sensor: Begin: 2025-05-23T00:27:54.344739098Z, End: 2025-05-23T00:27:54.396447170Z, Duration: 00:00:00.051 Load type hierarchy and UCFGs: Begin: 2025-05-23T00:27:54.354408099Z, End: 2025-05-23T00:27:54.359400179Z, Duration: 00:00:00.004 Load type hierarchy: Begin: 2025-05-23T00:27:54.354496626Z, End: 2025-05-23T00:27:54.358737462Z, Duration: 00:00:00.004 Load UCFGs: Begin: 2025-05-23T00:27:54.359185707Z, End: 2025-05-23T00:27:54.359257273Z, Duration: 00:00:00.000 INFO: java security sensor peak memory: 105 MB INFO: Sensor JavaSecuritySensor [security] (done) | time=64ms INFO: Sensor CSharpSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6547, S6549, S6639, S6641, S6680, S6776, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/ucfg2/cs INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: csharp security sensor: Time spent was 00:00:00.001 INFO: csharp security sensor: Begin: 2025-05-23T00:27:54.402337517Z, End: 2025-05-23T00:27:54.404203160Z, Duration: 00:00:00.001 Load type hierarchy and UCFGs: Begin: 2025-05-23T00:27:54.403132608Z, End: 2025-05-23T00:27:54.403723877Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-05-23T00:27:54.403183616Z, End: 2025-05-23T00:27:54.403471506Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-05-23T00:27:54.403566052Z, End: 2025-05-23T00:27:54.403633550Z, Duration: 00:00:00.000 INFO: csharp security sensor peak memory: 105 MB INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms INFO: Sensor PhpSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/php INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001 INFO: No UCFGs have been included for analysis. INFO: php security sensor: Time spent was 00:00:00.001 INFO: php security sensor: Begin: 2025-05-23T00:27:54.405013510Z, End: 2025-05-23T00:27:54.406859393Z, Duration: 00:00:00.001 Load type hierarchy and UCFGs: Begin: 2025-05-23T00:27:54.405413046Z, End: 2025-05-23T00:27:54.406591674Z, Duration: 00:00:00.001 Load type hierarchy: Begin: 2025-05-23T00:27:54.405462074Z, End: 2025-05-23T00:27:54.406374291Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-05-23T00:27:54.406455938Z, End: 2025-05-23T00:27:54.406513646Z, Duration: 00:00:00.000 INFO: php security sensor peak memory: 105 MB INFO: Sensor PhpSecuritySensor [security] (done) | time=3ms INFO: Sensor PythonSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/python INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: python security sensor: Time spent was 00:00:00.001 INFO: python security sensor: Begin: 2025-05-23T00:27:54.409293086Z, End: 2025-05-23T00:27:54.410417825Z, Duration: 00:00:00.001 Load type hierarchy and UCFGs: Begin: 2025-05-23T00:27:54.409658272Z, End: 2025-05-23T00:27:54.410120706Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-05-23T00:27:54.409717870Z, End: 2025-05-23T00:27:54.409896324Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-05-23T00:27:54.409985081Z, End: 2025-05-23T00:27:54.410036979Z, Duration: 00:00:00.000 INFO: python security sensor peak memory: 105 MB INFO: Sensor PythonSecuritySensor [security] (done) | time=5ms INFO: Sensor JsSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/js INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001 INFO: No UCFGs have been included for analysis. INFO: js security sensor: Time spent was 00:00:00.003 INFO: js security sensor: Begin: 2025-05-23T00:27:54.414578674Z, End: 2025-05-23T00:27:54.417636244Z, Duration: 00:00:00.003 Load type hierarchy and UCFGs: Begin: 2025-05-23T00:27:54.415668165Z, End: 2025-05-23T00:27:54.417020226Z, Duration: 00:00:00.001 Load type hierarchy: Begin: 2025-05-23T00:27:54.415769751Z, End: 2025-05-23T00:27:54.416153457Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-05-23T00:27:54.416340171Z, End: 2025-05-23T00:27:54.416834873Z, Duration: 00:00:00.000 INFO: js security sensor peak memory: 105 MB INFO: Sensor JsSecuritySensor [security] (done) | time=4ms INFO: Sensor KotlinSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6287, S6350, S6390, S6398, S6399, S6547, S6549, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/kotlin INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: kotlin security sensor: Time spent was 00:00:00.002 INFO: kotlin security sensor: Begin: 2025-05-23T00:27:54.420420964Z, End: 2025-05-23T00:27:54.422700611Z, Duration: 00:00:00.002 Load type hierarchy and UCFGs: Begin: 2025-05-23T00:27:54.421906660Z, End: 2025-05-23T00:27:54.422427751Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-05-23T00:27:54.422008476Z, End: 2025-05-23T00:27:54.422219949Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-05-23T00:27:54.422308945Z, End: 2025-05-23T00:27:54.422359423Z, Duration: 00:00:00.000 INFO: kotlin security sensor peak memory: 105 MB INFO: Sensor KotlinSecuritySensor [security] (done) | time=3ms INFO: Sensor GoSecuritySensor [security] INFO: No taint analysis rules have been enabled, will not execute taint analysis. INFO: go security sensor: Time spent was 00:00:00.000 INFO: go security sensor: Begin: 2025-05-23T00:27:54.423806321Z, End: 2025-05-23T00:27:54.424037463Z, Duration: 00:00:00.000 INFO: go security sensor peak memory: 105 MB INFO: Sensor GoSecuritySensor [security] (done) | time=1ms INFO: ------------- Run sensors on project INFO: Sensor Zero Coverage Sensor INFO: Sensor Zero Coverage Sensor (done) | time=13ms INFO: CPD Executor Calculating CPD for 8 files INFO: CPD Executor CPD calculation finished (done) | time=12ms INFO: Analysis report generated in 187ms, dir size=331 KB INFO: Analysis report compressed in 28ms, zip size=76 KB INFO: Analysis report uploaded in 572ms INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=o-ran-sc_ric-app-qp-aimlfw INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZb6ihPWaIgnJMyzyQcf INFO: Sensor cache published successfully INFO: Analysis total time: 19.920 s INFO: ------------------------------------------------------------------------ INFO: EXECUTION SUCCESS INFO: ------------------------------------------------------------------------ INFO: Total time: 24.617s INFO: Final Memory: 28M/100M INFO: ------------------------------------------------------------------------ $ ssh-agent -k unset SSH_AUTH_SOCK; unset SSH_AGENT_PID; echo Agent pid 2089 killed; [ssh-agent] Stopped. [PostBuildScript] - [INFO] Executing post build scripts. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins8314280922805589953.sh ---> sysstat.sh [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins6389338969178914618.sh ---> package-listing.sh ++ tr '[:upper:]' '[:lower:]' ++ facter osfamily + OS_FAMILY=debian + workspace=/w/workspace/ric-app-qp-aimlfw-sonar-prescan-script + START_PACKAGES=/tmp/packages_start.txt + END_PACKAGES=/tmp/packages_end.txt + DIFF_PACKAGES=/tmp/packages_diff.txt + PACKAGES=/tmp/packages_start.txt + '[' /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script ']' + PACKAGES=/tmp/packages_end.txt + case "${OS_FAMILY}" in + grep '^ii' + dpkg -l + '[' -f /tmp/packages_start.txt ']' + '[' -f /tmp/packages_end.txt ']' + diff /tmp/packages_start.txt /tmp/packages_end.txt + '[' /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script ']' + mkdir -p /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/archives/ + cp -f /tmp/packages_diff.txt /tmp/packages_end.txt /tmp/packages_start.txt /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/archives/ [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins17459414025799999405.sh ---> capture-instance-metadata.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-RuUK from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-RuUK/bin to PATH INFO: Running in OpenStack, capturing instance metadata [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins5860434363993268694.sh provisioning config files... copy managed file [jenkins-log-archives-settings] to file:/w/workspace/ric-app-qp-aimlfw-sonar-prescan-script@tmp/config3699597123649761499tmp Regular expression run condition: Expression=[^.*logs-s3.*], Label=[] Run condition [Regular expression match] preventing perform for step [Provide Configuration files] [EnvInject] - Injecting environment variables from a build step. [EnvInject] - Injecting as environment variables the properties content SERVER_ID=logs [EnvInject] - Variables injected successfully. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins5166212372985475999.sh ---> create-netrc.sh [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins2178643086250723790.sh ---> python-tools-install.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-RuUK from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-RuUK/bin to PATH [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins3961295254957127777.sh ---> sudo-logs.sh Archiving 'sudo' log.. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins13357477352788814783.sh ---> job-cost.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-RuUK from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: zipp==1.1.0 python-openstackclient urllib3~=1.26.15 ERROR: pip's dependency resolver does not currently take into account all the packages that are installed. This behaviour is the source of the following dependency conflicts. lftools 0.37.12 requires requests<2.32.0, but you have requests 2.32.3 which is incompatible. lf-activate-venv(): INFO: Adding /tmp/venv-RuUK/bin to PATH INFO: No Stack... INFO: Retrieving Pricing Info for: v2-highcpu-4 INFO: Archiving Costs [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash -l /tmp/jenkins5142227442303467663.sh ---> logs-deploy.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-RuUK from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-RuUK/bin to PATH INFO: Nexus URL https://nexus.o-ran-sc.org path production/vex-sjc-oran-jenkins-prod-1/ric-app-qp-aimlfw-sonar-prescan-script/895 INFO: archiving workspace using pattern(s): -p **/*.log Archives upload complete. INFO: archiving logs to Nexus ---> uname -a: Linux prd-ubuntu1804-docker-4c-4g-1430 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux ---> lscpu: Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 1 Socket(s): 4 NUMA node(s): 1 Vendor ID: AuthenticAMD CPU family: 23 Model: 49 Model name: AMD EPYC-Rome Processor Stepping: 0 CPU MHz: 2799.972 BogoMIPS: 5599.94 Virtualization: AMD-V Hypervisor vendor: KVM Virtualization type: full L1d cache: 32K L1i cache: 32K L2 cache: 512K L3 cache: 16384K NUMA node0 CPU(s): 0-3 Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm rep_good nopl xtopology cpuid extd_apicid tsc_known_freq pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm cmp_legacy svm cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw topoext perfctr_core ssbd ibrs ibpb stibp vmmcall fsgsbase tsc_adjust bmi1 avx2 smep bmi2 rdseed adx smap clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves clzero xsaveerptr arat npt nrip_save umip rdpid arch_capabilities ---> nproc: 4 ---> df -h: Filesystem Size Used Avail Use% Mounted on udev 2.0G 0 2.0G 0% /dev tmpfs 395M 696K 394M 1% /run /dev/vda1 20G 9.0G 11G 47% / tmpfs 2.0G 0 2.0G 0% /dev/shm tmpfs 5.0M 0 5.0M 0% /run/lock tmpfs 2.0G 0 2.0G 0% /sys/fs/cgroup /dev/vda15 105M 5.3M 100M 5% /boot/efi tmpfs 395M 0 395M 0% /run/user/1001 ---> free -m: total used free shared buff/cache available Mem: 3943 455 1260 0 2228 3230 Swap: 1023 0 1023 ---> ip addr: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: ens3: mtu 1450 qdisc fq_codel state UP group default qlen 1000 link/ether fa:16:3e:85:ef:58 brd ff:ff:ff:ff:ff:ff inet 10.32.7.186/23 brd 10.32.7.255 scope global dynamic ens3 valid_lft 86212sec preferred_lft 86212sec inet6 fe80::f816:3eff:fe85:ef58/64 scope link valid_lft forever preferred_lft forever 3: docker0: mtu 1500 qdisc noqueue state DOWN group default link/ether 02:42:a1:98:51:8a brd ff:ff:ff:ff:ff:ff inet 10.250.0.254/24 brd 10.250.0.255 scope global docker0 valid_lft forever preferred_lft forever ---> sar -b -r -n DEV: Linux 4.15.0-213-generic (prd-ubuntu1804-docker-4c-4g-1430) 05/23/25 _x86_64_ (4 CPU) 00:25:43 LINUX RESTART (4 CPU) 00:26:01 tps rtps wtps bread/s bwrtn/s 00:27:01 171.11 69.13 101.98 5605.20 41196.68 00:28:01 118.46 50.99 67.47 4431.13 12529.38 Average: 144.79 60.06 84.73 5018.21 26864.23 00:26:01 kbmemfree kbavail kbmemused %memused kbbuffers kbcached kbcommit %commit kbactive kbinact kbdirty 00:27:01 1592544 3283116 2446108 60.57 47968 1799048 961088 18.89 645540 1622452 179980 00:28:01 1327632 3331520 2711020 67.13 59796 2091400 896828 17.63 672748 1841612 44164 Average: 1460088 3307318 2578564 63.85 53882 1945224 928958 18.26 659144 1732032 112072 00:26:01 IFACE rxpck/s txpck/s rxkB/s txkB/s rxcmp/s txcmp/s rxmcst/s %ifutil 00:27:01 lo 1.07 1.07 0.10 0.10 0.00 0.00 0.00 0.00 00:27:01 docker0 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 00:27:01 ens3 355.38 244.40 1453.73 66.79 0.00 0.00 0.00 0.00 00:28:01 lo 2.13 2.13 0.21 0.21 0.00 0.00 0.00 0.00 00:28:01 docker0 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 00:28:01 ens3 263.54 178.47 1770.91 25.60 0.00 0.00 0.00 0.00 Average: lo 1.60 1.60 0.16 0.16 0.00 0.00 0.00 0.00 Average: docker0 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 Average: ens3 309.46 211.44 1612.31 46.20 0.00 0.00 0.00 0.00 ---> sar -P ALL: Linux 4.15.0-213-generic (prd-ubuntu1804-docker-4c-4g-1430) 05/23/25 _x86_64_ (4 CPU) 00:25:43 LINUX RESTART (4 CPU) 00:26:01 CPU %user %nice %system %iowait %steal %idle 00:27:01 all 16.99 0.00 2.18 5.19 0.05 75.59 00:27:01 0 30.00 0.00 3.48 7.37 0.05 59.10 00:27:01 1 13.23 0.00 1.66 3.14 0.07 81.91 00:27:01 2 14.06 0.00 1.59 1.39 0.07 82.90 00:27:01 3 10.71 0.00 1.96 8.88 0.05 78.40 00:28:01 all 19.34 0.00 1.41 2.64 0.05 76.56 00:28:01 0 22.38 0.00 1.30 0.65 0.05 75.62 00:28:01 1 22.64 0.00 1.65 1.57 0.05 74.09 00:28:01 2 19.84 0.00 1.35 4.98 0.05 73.78 00:28:01 3 12.55 0.00 1.35 3.33 0.03 82.74 Average: all 18.17 0.00 1.79 3.91 0.05 76.07 Average: 0 26.17 0.00 2.38 4.00 0.05 67.39 Average: 1 17.94 0.00 1.65 2.36 0.06 77.99 Average: 2 16.95 0.00 1.47 3.18 0.06 78.34 Average: 3 11.63 0.00 1.66 6.10 0.04 80.58