Started by timer Running as SYSTEM [EnvInject] - Loading node environment variables. Building remotely on prd-ubuntu1804-docker-4c-4g-2001 (ubuntu1804-docker-4c-4g) in workspace /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script [ssh-agent] Looking for ssh-agent implementation... $ ssh-agent SSH_AUTH_SOCK=/tmp/ssh-R4RqNVmdKpOm/agent.2125 SSH_AGENT_PID=2127 [ssh-agent] Started. Running ssh-add (command line suppressed) Identity added: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script@tmp/private_key_18408829125549688999.key (jenkins-ssh) [ssh-agent] Using credentials jenkins (jenkins) The recommended git tool is: NONE using credential jenkins Wiping out workspace first. Cloning the remote Git repository Cloning repository ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw > git init /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script # timeout=10 Fetching upstream changes from ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw > git --version # timeout=10 > git --version # 'git version 2.17.1' using GIT_SSH to set credentials jenkins > git fetch --tags --progress -- ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw +refs/heads/*:refs/remotes/origin/* # timeout=10 > git config remote.origin.url ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418/ric-app/qp-aimlfw # timeout=10 > git config --add remote.origin.fetch +refs/heads/*:refs/remotes/origin/* # timeout=10 Avoid second fetch > git rev-parse refs/remotes/origin/master^{commit} # timeout=10 Checking out Revision 0231406ea0a153c94382e00927557a88dc81c48a (refs/remotes/origin/master) > git config core.sparsecheckout # timeout=10 > git checkout -f 0231406ea0a153c94382e00927557a88dc81c48a # timeout=10 Commit message: "- Update docs - Formatting docs - Added RMR msg `TS_QOE_PRED_REQ` to handle msg from QP driver - Add license header to _test.go - Added test command to get coverage report" > git rev-list --no-walk 0231406ea0a153c94382e00927557a88dc81c48a # timeout=10 provisioning config files... copy managed file [npmrc] to file:/home/jenkins/.npmrc copy managed file [pipconf] to file:/home/jenkins/.config/pip/pip.conf [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins959754432957218912.sh ---> python-tools-install.sh Setup pyenv: * system (set by /opt/pyenv/version) * 3.8.13 (set by /opt/pyenv/version) * 3.9.13 (set by /opt/pyenv/version) * 3.10.6 (set by /opt/pyenv/version) lf-activate-venv(): INFO: Creating python3 venv at /tmp/venv-f7AU lf-activate-venv(): INFO: Save venv in file: /tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-f7AU/bin to PATH Generating Requirements File ERROR: pip's dependency resolver does not currently take into account all the packages that are installed. This behaviour is the source of the following dependency conflicts. lftools 0.37.12 requires requests<2.32.0, but you have requests 2.32.3 which is incompatible. Python 3.10.6 pip 25.1.1 from /tmp/venv-f7AU/lib/python3.10/site-packages/pip (python 3.10) appdirs==1.4.4 argcomplete==3.6.2 aspy.yaml==1.3.0 attrs==25.3.0 autopage==0.5.2 beautifulsoup4==4.13.4 boto3==1.38.27 botocore==1.38.27 bs4==0.0.2 cachetools==5.5.2 certifi==2025.4.26 cffi==1.17.1 cfgv==3.4.0 chardet==5.2.0 charset-normalizer==3.4.2 click==8.2.1 cliff==4.10.0 cmd2==2.5.11 cryptography==3.3.2 debtcollector==3.0.0 decorator==5.2.1 defusedxml==0.7.1 Deprecated==1.2.18 distlib==0.3.9 dnspython==2.7.0 docker==4.2.2 dogpile.cache==1.4.0 durationpy==0.10 email_validator==2.2.0 filelock==3.18.0 future==1.0.0 gitdb==4.0.12 GitPython==3.1.44 google-auth==2.40.2 httplib2==0.22.0 identify==2.6.12 idna==3.10 importlib-resources==1.5.0 iso8601==2.1.0 Jinja2==3.1.6 jmespath==1.0.1 jsonpatch==1.33 jsonpointer==3.0.0 jsonschema==4.24.0 jsonschema-specifications==2025.4.1 keystoneauth1==5.11.0 kubernetes==32.0.1 lftools==0.37.12 lxml==5.4.0 MarkupSafe==3.0.2 msgpack==1.1.0 multi_key_dict==2.0.3 munch==4.0.0 netaddr==1.3.0 niet==1.4.2 nodeenv==1.9.1 oauth2client==4.1.3 oauthlib==3.2.2 openstacksdk==4.5.0 os-client-config==2.1.0 os-service-types==1.7.0 osc-lib==4.0.2 oslo.config==9.8.0 oslo.context==6.0.0 oslo.i18n==6.5.1 oslo.log==7.1.0 oslo.serialization==5.7.0 oslo.utils==9.0.0 packaging==25.0 pbr==6.1.1 platformdirs==4.3.8 prettytable==3.16.0 psutil==7.0.0 pyasn1==0.6.1 pyasn1_modules==0.4.2 pycparser==2.22 pygerrit2==2.0.15 PyGithub==2.6.1 PyJWT==2.10.1 PyNaCl==1.5.0 pyparsing==2.4.7 pyperclip==1.9.0 pyrsistent==0.20.0 python-cinderclient==9.7.0 python-dateutil==2.9.0.post0 python-heatclient==4.2.0 python-jenkins==1.8.2 python-keystoneclient==5.6.0 python-magnumclient==4.8.1 python-openstackclient==8.1.0 python-swiftclient==4.8.0 PyYAML==6.0.2 referencing==0.36.2 requests==2.32.3 requests-oauthlib==2.0.0 requestsexceptions==1.4.0 rfc3986==2.0.0 rpds-py==0.25.1 rsa==4.9.1 ruamel.yaml==0.18.12 ruamel.yaml.clib==0.2.12 s3transfer==0.13.0 simplejson==3.20.1 six==1.17.0 smmap==5.0.2 soupsieve==2.7 stevedore==5.4.1 tabulate==0.9.0 toml==0.10.2 tomlkit==0.13.2 tqdm==4.67.1 typing_extensions==4.13.2 tzdata==2025.2 urllib3==1.26.20 virtualenv==20.31.2 wcwidth==0.2.13 websocket-client==1.8.0 wrapt==1.17.2 xdg==6.0.0 xmltodict==0.14.2 yq==3.4.3 [EnvInject] - Injecting environment variables from a build step. [EnvInject] - Injecting as environment variables the properties content SET_JDK_VERSION=openjdk17 GIT_URL="ssh://oran-jobbuilder@gerrit.o-ran-sc.org:29418" [EnvInject] - Variables injected successfully. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/sh /tmp/jenkins7104695367384792804.sh ---> update-java-alternatives.sh ---> Updating Java version ---> Ubuntu/Debian system detected update-alternatives: using /usr/lib/jvm/java-17-openjdk-amd64/bin/java to provide /usr/bin/java (java) in manual mode update-alternatives: using /usr/lib/jvm/java-17-openjdk-amd64/bin/javac to provide /usr/bin/javac (javac) in manual mode update-alternatives: using /usr/lib/jvm/java-17-openjdk-amd64 to provide /usr/lib/jvm/java-openjdk (java_sdk_openjdk) in manual mode openjdk version "17.0.7" 2023-04-18 OpenJDK Runtime Environment (build 17.0.7+7-Ubuntu-0ubuntu118.04) OpenJDK 64-Bit Server VM (build 17.0.7+7-Ubuntu-0ubuntu118.04, mixed mode, sharing) JAVA_HOME=/usr/lib/jvm/java-17-openjdk-amd64 [EnvInject] - Injecting environment variables from a build step. [EnvInject] - Injecting as environment variables the properties file path '/tmp/java.env' [EnvInject] - Variables injected successfully. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/sh /tmp/jenkins8135574950684104267.sh --> prescan-ric-app-qp-aimlfw-ubuntu.sh Docker version 24.0.2, build cb74dfc Unit Test #1 [internal] load .dockerignore #1 transferring context: 2B done #1 DONE 0.1s #2 [internal] load build definition from Dockerfile #2 transferring dockerfile: 2.51kB done #2 DONE 0.1s ERROR: failed to solve: target stage qpaimlfwbuild could not be found Unable to find image 'tmpimg:latest' locally Error response from daemon: pull access denied for tmpimg, repository does not exist or may require 'docker login': denied: requested access to the resource is denied must specify at least one container source Container name cannot be empty --> prescan-ric-app-qp-aimlfw.sh ends Unpacking https://repo1.maven.org/maven2/org/sonarsource/scanner/cli/sonar-scanner-cli/4.6.2.2472/sonar-scanner-cli-4.6.2.2472.zip to /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner on prd-ubuntu1804-docker-4c-4g-2001 [ric-app-qp-aimlfw-sonar-prescan-script] $ /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner/bin/sonar-scanner -Dsonar.host.url=https://sonarcloud.io/ ******** -Dsonar.projectKey=o-ran-sc_ric-app-qp-aimlfw -Dsonar.projectName=ric-app-qp-aimlfw -Dsonar.language=go -Dsonar.login=d9e23c28dc39b6d7531d2ecabf122ce84e6253ef -Dsonar.go.coverage.reportPaths=**/cover.out -Dsonar.organization=o-ran-sc -Dsonar.sources=. -Dsonar.inclusions=**/*.go -Dsonar.build.sourceEncoding=UTF-8 -Dsonar.exclusions=**/*_test.go -Dsonar.projectBaseDir=/w/workspace/ric-app-qp-aimlfw-sonar-prescan-script INFO: Scanner configuration file: /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner/conf/sonar-scanner.properties INFO: Project root configuration file: NONE INFO: SonarScanner 4.6.2.2472 INFO: Java 17.0.7 Private Build (64-bit) INFO: Linux 4.15.0-213-generic amd64 INFO: User cache: /home/jenkins/.sonar/cache INFO: Scanner configuration file: /w/tools/hudson.plugins.sonar.SonarRunnerInstallation/SonarQube_Scanner/conf/sonar-scanner.properties INFO: Project root configuration file: NONE INFO: Analyzing on SonarCloud INFO: Default locale: "en", source code encoding: "UTF-8" (analysis is platform dependent) INFO: Load global settings INFO: Load global settings (done) | time=684ms INFO: Server id: 1BD809FA-AWHW8ct9-T_TB3XqouNu INFO: Loading required plugins INFO: Load plugins index INFO: Load plugins index (done) | time=214ms INFO: Load/download plugins INFO: Load/download plugins (done) | time=539ms INFO: Found an active CI vendor: 'Jenkins' INFO: Load project settings for component key: 'o-ran-sc_ric-app-qp-aimlfw' INFO: Load project settings for component key: 'o-ran-sc_ric-app-qp-aimlfw' (done) | time=355ms INFO: Process project properties INFO: Project key: o-ran-sc_ric-app-qp-aimlfw INFO: Base dir: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script INFO: Working dir: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork INFO: Load project branches INFO: Load project branches (done) | time=231ms INFO: Check ALM binding of project 'o-ran-sc_ric-app-qp-aimlfw' INFO: Detected project binding: NOT_BOUND INFO: Check ALM binding of project 'o-ran-sc_ric-app-qp-aimlfw' (done) | time=176ms INFO: Load project pull requests INFO: Load project pull requests (done) | time=170ms INFO: Load branch configuration INFO: Load branch configuration (done) | time=2ms INFO: Load quality profiles INFO: Load quality profiles (done) | time=429ms INFO: Load active rules INFO: Load active rules (done) | time=8992ms INFO: Organization key: o-ran-sc WARN: The property 'sonar.login' is deprecated and will be removed in the future. Please use the 'sonar.token' property instead when passing a token. INFO: Preprocessing files... INFO: 1 language detected in 8 preprocessed files (done) | time=114ms INFO: 141 files ignored because of inclusion/exclusion patterns INFO: 0 files ignored because of scm ignore settings INFO: Loading plugins for detected languages INFO: Load/download plugins INFO: Load/download plugins (done) | time=371ms INFO: Load project repositories INFO: Load project repositories (done) | time=228ms INFO: Indexing files... INFO: Project configuration: INFO: Included sources: **/*.go INFO: Excluded sources: **/build-wrapper-dump.json, **/*_test.go INFO: 8 files indexed (done) | time=7ms INFO: Quality profile for go: Sonar way INFO: ------------- Run sensors on module ric-app-qp-aimlfw INFO: Load metrics repository INFO: Load metrics repository (done) | time=169ms INFO: Sensor cache enabled INFO: Resolved api base url 'https://api.sonarcloud.io/' from host url 'https://sonarcloud.io/'. INFO: Load sensor cache INFO: Load sensor cache (37 KB) | time=2146ms INFO: Resolved api base url 'https://api.sonarcloud.io/' from host url 'https://sonarcloud.io/'. INFO: Sensor JaCoCo XML Report Importer [jacoco] INFO: 'sonar.coverage.jacoco.xmlReportPaths' is not defined. Using default locations: target/site/jacoco/jacoco.xml,target/site/jacoco-it/jacoco.xml,build/reports/jacoco/test/jacocoTestReport.xml INFO: No report imported, no coverage information will be imported by JaCoCo XML Report Importer INFO: Sensor JaCoCo XML Report Importer [jacoco] (done) | time=1ms INFO: Sensor Code Quality and Security for Go [go] INFO: 8 source files to be analyzed INFO: 8/8 source files have been analyzed INFO: Sensor Code Quality and Security for Go [go] (done) | time=529ms INFO: Sensor Go Cover sensor for Go coverage [go] WARN: Coverage report can't be loaded, file(s) not found for pattern: '**/cover.out', ignoring this file. INFO: Sensor Go Cover sensor for Go coverage [go] (done) | time=5ms INFO: Sensor Java Config Sensor [iac] INFO: 0 source files to be analyzed INFO: 0/0 source files have been analyzed INFO: Sensor Java Config Sensor [iac] (done) | time=17ms INFO: Sensor IaC Docker Sensor [iac] INFO: 0 source files to be analyzed INFO: 0/0 source files have been analyzed INFO: Sensor IaC Docker Sensor [iac] (done) | time=61ms INFO: Sensor Serverless configuration file sensor [security] INFO: 0 Serverless function entries were found in the project INFO: 0 Serverless function handlers were kept as entrypoints INFO: Sensor Serverless configuration file sensor [security] (done) | time=6ms INFO: Sensor AWS SAM template file sensor [security] INFO: Sensor AWS SAM template file sensor [security] (done) | time=0ms INFO: Sensor AWS SAM Inline template file sensor [security] INFO: Sensor AWS SAM Inline template file sensor [security] (done) | time=0ms INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise] INFO: Available processors: 4 INFO: Using 4 threads for analysis. INFO: The property "sonar.tests" is not set. To improve the analysis accuracy, we categorize a file as a test file if any of the following is true: * The filename starts with "test" * The filename contains "test." or "tests." * Any directory in the file path is named: "doc", "docs", "test" or "tests" * Any directory in the file path has a name ending in "test" or "tests" INFO: Start fetching files for the text and secrets analysis INFO: Using Git CLI to retrieve untracked files INFO: Retrieving language associated files and files included via "sonar.text.inclusions" that are tracked by git INFO: Starting the text and secrets analysis INFO: 8 source files to be analyzed for the text and secrets analysis INFO: 8/8 source files have been analyzed for the text and secrets analysis INFO: Start fetching files for the binary file analysis INFO: There are no files to be analyzed for the binary file analysis INFO: Sensor EnterpriseTextAndSecretsSensor [textenterprise] (done) | time=704ms INFO: Sensor JavaSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S6096 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/java INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.001 INFO: No UCFGs have been included for analysis. INFO: java security sensor: Time spent was 00:00:00.038 INFO: java security sensor: Begin: 2025-06-01T00:27:50.105192711Z, End: 2025-06-01T00:27:50.144091586Z, Duration: 00:00:00.038 Load type hierarchy and UCFGs: Begin: 2025-06-01T00:27:50.110213343Z, End: 2025-06-01T00:27:50.111601631Z, Duration: 00:00:00.001 Load type hierarchy: Begin: 2025-06-01T00:27:50.110264694Z, End: 2025-06-01T00:27:50.111116435Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-06-01T00:27:50.111449709Z, End: 2025-06-01T00:27:50.111524750Z, Duration: 00:00:00.000 INFO: java security sensor peak memory: 107 MB INFO: Sensor JavaSecuritySensor [security] (done) | time=42ms INFO: Sensor CSharpSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5883, S6096, S6173, S6287, S6350, S6399, S6547, S6549, S6639, S6641, S6680, S6776, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/ucfg2/cs INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: csharp security sensor: Time spent was 00:00:00.001 INFO: csharp security sensor: Begin: 2025-06-01T00:27:50.145419663Z, End: 2025-06-01T00:27:50.146789550Z, Duration: 00:00:00.001 Load type hierarchy and UCFGs: Begin: 2025-06-01T00:27:50.145872428Z, End: 2025-06-01T00:27:50.146564457Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-06-01T00:27:50.145895249Z, End: 2025-06-01T00:27:50.146407375Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-06-01T00:27:50.146473866Z, End: 2025-06-01T00:27:50.146508676Z, Duration: 00:00:00.000 INFO: csharp security sensor peak memory: 107 MB INFO: Sensor CSharpSecuritySensor [security] (done) | time=2ms INFO: Sensor PhpSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5334, S5335, S5883, S6173, S6287, S6350, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/php INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: php security sensor: Time spent was 00:00:00.000 INFO: php security sensor: Begin: 2025-06-01T00:27:50.147429638Z, End: 2025-06-01T00:27:50.148204507Z, Duration: 00:00:00.000 Load type hierarchy and UCFGs: Begin: 2025-06-01T00:27:50.147684361Z, End: 2025-06-01T00:27:50.147990595Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-06-01T00:27:50.147707661Z, End: 2025-06-01T00:27:50.147849293Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-06-01T00:27:50.147910854Z, End: 2025-06-01T00:27:50.147938684Z, Duration: 00:00:00.000 INFO: php security sensor peak memory: 107 MB INFO: Sensor PhpSecuritySensor [security] (done) | time=1ms INFO: Sensor PythonSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S6287, S6350, S6639, S6680, S6776, S6839, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/python INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: python security sensor: Time spent was 00:00:00.000 INFO: python security sensor: Begin: 2025-06-01T00:27:50.148765274Z, End: 2025-06-01T00:27:50.149431883Z, Duration: 00:00:00.000 Load type hierarchy and UCFGs: Begin: 2025-06-01T00:27:50.148969207Z, End: 2025-06-01T00:27:50.149222780Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-06-01T00:27:50.148990697Z, End: 2025-06-01T00:27:50.149087798Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-06-01T00:27:50.149145659Z, End: 2025-06-01T00:27:50.149171059Z, Duration: 00:00:00.000 INFO: python security sensor peak memory: 107 MB INFO: Sensor PythonSecuritySensor [security] (done) | time=1ms INFO: Sensor JsSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2083, S2631, S3649, S5131, S5144, S5146, S5147, S5334, S5696, S5883, S6096, S6105, S6287, S6350 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/js INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: js security sensor: Time spent was 00:00:00.000 INFO: js security sensor: Begin: 2025-06-01T00:27:50.149957189Z, End: 2025-06-01T00:27:50.150885571Z, Duration: 00:00:00.000 Load type hierarchy and UCFGs: Begin: 2025-06-01T00:27:50.150377584Z, End: 2025-06-01T00:27:50.150638808Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-06-01T00:27:50.150400855Z, End: 2025-06-01T00:27:50.150486576Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-06-01T00:27:50.150557536Z, End: 2025-06-01T00:27:50.150588617Z, Duration: 00:00:00.000 INFO: js security sensor peak memory: 107 MB INFO: Sensor JsSecuritySensor [security] (done) | time=2ms INFO: Sensor KotlinSecuritySensor [security] INFO: Enabled taint analysis rules: S2076, S2078, S2083, S2091, S2631, S3649, S5131, S5135, S5144, S5145, S5146, S5147, S5334, S5496, S5883, S6096, S6287, S6350, S6390, S6398, S6399, S6547, S6549, S7044 INFO: Load type hierarchy and UCFGs: Starting INFO: Load type hierarchy: Starting INFO: Reading type hierarchy from: /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.scannerwork/ucfg2/kotlin INFO: Read 0 type definitions INFO: Load type hierarchy: Time spent was 00:00:00.000 INFO: Load UCFGs: Starting INFO: Load UCFGs: Time spent was 00:00:00.000 INFO: Load type hierarchy and UCFGs: Time spent was 00:00:00.000 INFO: No UCFGs have been included for analysis. INFO: kotlin security sensor: Time spent was 00:00:00.000 INFO: kotlin security sensor: Begin: 2025-06-01T00:27:50.151400287Z, End: 2025-06-01T00:27:50.152093976Z, Duration: 00:00:00.000 Load type hierarchy and UCFGs: Begin: 2025-06-01T00:27:50.151613330Z, End: 2025-06-01T00:27:50.151892433Z, Duration: 00:00:00.000 Load type hierarchy: Begin: 2025-06-01T00:27:50.151633710Z, End: 2025-06-01T00:27:50.151717801Z, Duration: 00:00:00.000 Load UCFGs: Begin: 2025-06-01T00:27:50.151806812Z, End: 2025-06-01T00:27:50.151832002Z, Duration: 00:00:00.000 INFO: kotlin security sensor peak memory: 107 MB INFO: Sensor KotlinSecuritySensor [security] (done) | time=1ms INFO: Sensor GoSecuritySensor [security] INFO: No taint analysis rules have been enabled, will not execute taint analysis. INFO: go security sensor: Time spent was 00:00:00.000 INFO: go security sensor: Begin: 2025-06-01T00:27:50.152555601Z, End: 2025-06-01T00:27:50.152741334Z, Duration: 00:00:00.000 INFO: go security sensor peak memory: 107 MB INFO: Sensor GoSecuritySensor [security] (done) | time=0ms INFO: ------------- Run sensors on project INFO: Sensor Zero Coverage Sensor INFO: Sensor Zero Coverage Sensor (done) | time=9ms INFO: CPD Executor Calculating CPD for 8 files INFO: CPD Executor CPD calculation finished (done) | time=9ms INFO: Analysis report generated in 216ms, dir size=331 KB INFO: Analysis report compressed in 23ms, zip size=76 KB INFO: Analysis report uploaded in 720ms INFO: ANALYSIS SUCCESSFUL, you can find the results at: https://sonarcloud.io/dashboard?id=o-ran-sc_ric-app-qp-aimlfw INFO: Note that you will be able to access the updated dashboard once the server has processed the submitted analysis report INFO: More about the report processing at https://sonarcloud.io/api/ce/task?id=AZco4z-Zac-UCG9lhbni INFO: Sensor cache published successfully INFO: Analysis total time: 17.723 s INFO: ------------------------------------------------------------------------ INFO: EXECUTION SUCCESS INFO: ------------------------------------------------------------------------ INFO: Total time: 24.614s INFO: Final Memory: 28M/100M INFO: ------------------------------------------------------------------------ $ ssh-agent -k unset SSH_AUTH_SOCK; unset SSH_AGENT_PID; echo Agent pid 2127 killed; [ssh-agent] Stopped. [PostBuildScript] - [INFO] Executing post build scripts. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins7021980407534687328.sh ---> sysstat.sh [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins15344671114910554884.sh ---> package-listing.sh ++ facter osfamily ++ tr '[:upper:]' '[:lower:]' + OS_FAMILY=debian + workspace=/w/workspace/ric-app-qp-aimlfw-sonar-prescan-script + START_PACKAGES=/tmp/packages_start.txt + END_PACKAGES=/tmp/packages_end.txt + DIFF_PACKAGES=/tmp/packages_diff.txt + PACKAGES=/tmp/packages_start.txt + '[' /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script ']' + PACKAGES=/tmp/packages_end.txt + case "${OS_FAMILY}" in + dpkg -l + grep '^ii' + '[' -f /tmp/packages_start.txt ']' + '[' -f /tmp/packages_end.txt ']' + diff /tmp/packages_start.txt /tmp/packages_end.txt + '[' /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script ']' + mkdir -p /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/archives/ + cp -f /tmp/packages_diff.txt /tmp/packages_end.txt /tmp/packages_start.txt /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/archives/ [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins519322837284876034.sh ---> capture-instance-metadata.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-f7AU from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-f7AU/bin to PATH INFO: Running in OpenStack, capturing instance metadata [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins15607511847137506246.sh provisioning config files... copy managed file [jenkins-log-archives-settings] to file:/w/workspace/ric-app-qp-aimlfw-sonar-prescan-script@tmp/config5892388101638840737tmp Regular expression run condition: Expression=[^.*logs-s3.*], Label=[] Run condition [Regular expression match] preventing perform for step [Provide Configuration files] [EnvInject] - Injecting environment variables from a build step. [EnvInject] - Injecting as environment variables the properties content SERVER_ID=logs [EnvInject] - Variables injected successfully. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins8869435815197495523.sh ---> create-netrc.sh [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins8247391643653399954.sh ---> python-tools-install.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-f7AU from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-f7AU/bin to PATH [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins7753729814470985838.sh ---> sudo-logs.sh Archiving 'sudo' log.. [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash /tmp/jenkins3173977507177062037.sh ---> job-cost.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-f7AU from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: zipp==1.1.0 python-openstackclient urllib3~=1.26.15 ERROR: pip's dependency resolver does not currently take into account all the packages that are installed. This behaviour is the source of the following dependency conflicts. lftools 0.37.12 requires requests<2.32.0, but you have requests 2.32.3 which is incompatible. lf-activate-venv(): INFO: Adding /tmp/venv-f7AU/bin to PATH INFO: No Stack... INFO: Retrieving Pricing Info for: v2-highcpu-4 INFO: Archiving Costs [ric-app-qp-aimlfw-sonar-prescan-script] $ /bin/bash -l /tmp/jenkins6797899827122801374.sh ---> logs-deploy.sh Setup pyenv: system 3.8.13 3.9.13 * 3.10.6 (set by /w/workspace/ric-app-qp-aimlfw-sonar-prescan-script/.python-version) lf-activate-venv(): INFO: Reuse venv:/tmp/venv-f7AU from file:/tmp/.os_lf_venv lf-activate-venv(): INFO: Installing: lftools lf-activate-venv(): INFO: Adding /tmp/venv-f7AU/bin to PATH INFO: Nexus URL https://nexus.o-ran-sc.org path production/vex-sjc-oran-jenkins-prod-1/ric-app-qp-aimlfw-sonar-prescan-script/904 INFO: archiving workspace using pattern(s): -p **/*.log Archives upload complete. INFO: archiving logs to Nexus ---> uname -a: Linux prd-ubuntu1804-docker-4c-4g-2001 4.15.0-213-generic #224-Ubuntu SMP Mon Jun 19 13:30:12 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux ---> lscpu: Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order: Little Endian CPU(s): 4 On-line CPU(s) list: 0-3 Thread(s) per core: 1 Core(s) per socket: 1 Socket(s): 4 NUMA node(s): 1 Vendor ID: AuthenticAMD CPU family: 23 Model: 49 Model name: AMD EPYC-Rome Processor Stepping: 0 CPU MHz: 2800.000 BogoMIPS: 5600.00 Virtualization: AMD-V Hypervisor vendor: KVM Virtualization type: full L1d cache: 32K L1i cache: 32K L2 cache: 512K L3 cache: 16384K NUMA node0 CPU(s): 0-3 Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 syscall nx mmxext fxsr_opt pdpe1gb rdtscp lm rep_good nopl xtopology cpuid extd_apicid tsc_known_freq pni pclmulqdq ssse3 fma cx16 sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand hypervisor lahf_lm cmp_legacy svm cr8_legacy abm sse4a misalignsse 3dnowprefetch osvw topoext perfctr_core ssbd ibrs ibpb stibp vmmcall fsgsbase tsc_adjust bmi1 avx2 smep bmi2 rdseed adx smap clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves clzero xsaveerptr arat npt nrip_save umip rdpid arch_capabilities ---> nproc: 4 ---> df -h: Filesystem Size Used Avail Use% Mounted on udev 2.0G 0 2.0G 0% /dev tmpfs 395M 696K 394M 1% /run /dev/vda1 20G 9.0G 11G 47% / tmpfs 2.0G 0 2.0G 0% /dev/shm tmpfs 5.0M 0 5.0M 0% /run/lock tmpfs 2.0G 0 2.0G 0% /sys/fs/cgroup /dev/vda15 105M 5.3M 100M 5% /boot/efi tmpfs 395M 0 395M 0% /run/user/1001 ---> free -m: total used free shared buff/cache available Mem: 3944 466 1245 0 2232 3219 Swap: 1023 0 1023 ---> ip addr: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet 127.0.0.1/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: ens3: mtu 1450 qdisc fq_codel state UP group default qlen 1000 link/ether fa:16:3e:2e:aa:a7 brd ff:ff:ff:ff:ff:ff inet 10.32.6.81/23 brd 10.32.7.255 scope global dynamic ens3 valid_lft 86213sec preferred_lft 86213sec inet6 fe80::f816:3eff:fe2e:aaa7/64 scope link valid_lft forever preferred_lft forever 3: docker0: mtu 1500 qdisc noqueue state DOWN group default link/ether 02:42:15:ac:4b:92 brd ff:ff:ff:ff:ff:ff inet 10.250.0.254/24 brd 10.250.0.255 scope global docker0 valid_lft forever preferred_lft forever ---> sar -b -r -n DEV: Linux 4.15.0-213-generic (prd-ubuntu1804-docker-4c-4g-2001) 06/01/25 _x86_64_ (4 CPU) 00:25:39 LINUX RESTART (4 CPU) 00:26:01 tps rtps wtps bread/s bwrtn/s 00:27:02 169.68 68.50 101.18 5562.02 41393.05 00:28:01 122.37 51.89 70.48 4508.39 12555.16 Average: 146.23 60.27 85.96 5039.72 27097.66 00:26:01 kbmemfree kbavail kbmemused %memused kbbuffers kbcached kbcommit %commit kbactive kbinact kbdirty 00:27:02 1688980 3366884 2349680 58.18 51436 1780656 857580 16.86 528280 1637932 163352 00:28:01 1275540 3288960 2763120 68.42 60224 2100592 928928 18.26 714376 1851648 48080 Average: 1482260 3327922 2556400 63.30 55830 1940624 893254 17.56 621328 1744790 105716 00:26:01 IFACE rxpck/s txpck/s rxkB/s txkB/s rxcmp/s txcmp/s rxmcst/s %ifutil 00:27:02 lo 1.13 1.13 0.10 0.10 0.00 0.00 0.00 0.00 00:27:02 ens3 344.93 233.32 1454.17 65.18 0.00 0.00 0.00 0.00 00:27:02 docker0 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 00:28:01 lo 2.10 2.10 0.21 0.21 0.00 0.00 0.00 0.00 00:28:01 ens3 268.45 189.21 1801.59 27.05 0.00 0.00 0.00 0.00 00:28:01 docker0 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 Average: lo 1.61 1.61 0.16 0.16 0.00 0.00 0.00 0.00 Average: ens3 307.01 211.45 1626.39 46.28 0.00 0.00 0.00 0.00 Average: docker0 0.00 0.00 0.00 0.00 0.00 0.00 0.00 0.00 ---> sar -P ALL: Linux 4.15.0-213-generic (prd-ubuntu1804-docker-4c-4g-2001) 06/01/25 _x86_64_ (4 CPU) 00:25:39 LINUX RESTART (4 CPU) 00:26:01 CPU %user %nice %system %iowait %steal %idle 00:27:02 all 17.56 0.00 2.15 5.14 0.06 75.09 00:27:02 0 5.73 0.00 1.45 3.73 0.05 89.03 00:27:02 1 10.13 0.00 2.74 6.63 0.07 80.43 00:27:02 2 29.60 0.00 2.55 8.68 0.08 59.10 00:27:02 3 24.72 0.00 1.87 1.55 0.05 71.81 00:28:01 all 19.51 0.00 1.37 2.56 0.06 76.50 00:28:01 0 20.80 0.00 0.98 1.41 0.05 76.76 00:28:01 1 27.65 0.00 1.85 3.40 0.09 67.01 00:28:01 2 9.47 0.00 1.27 3.69 0.05 85.52 00:28:01 3 20.15 0.00 1.34 1.77 0.05 76.69 Average: all 18.53 0.00 1.76 3.86 0.06 75.79 Average: 0 13.21 0.00 1.22 2.58 0.05 82.94 Average: 1 18.84 0.00 2.30 5.02 0.08 73.76 Average: 2 19.61 0.00 1.91 6.20 0.07 72.21 Average: 3 22.46 0.00 1.61 1.66 0.05 74.23