report.html

Report generated on 28-Jul-2023 at 14:16:00 by pytest-html v3.1.1

Environment

Packages {"pluggy": "1.0.0", "pytest": "7.1.2"}
Platform Linux-3.10.0-1160.81.1.el7.x86_64-x86_64-with-glibc2.17
Plugins {"html": "3.1.1", "metadata": "2.0.4", "testinfra": "5.0.0"}
Python 3.10.9

Summary

240 tests ran in 8296.20 seconds.

235 passed, 2 skipped, 3 failed, 5 errors, 2 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py 0 20 0 0
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 3 17 2 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 11 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 8 0 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 18 0 5
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 44 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 8 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 2 0 0
test_vulnerability_detector/test_providers/test_os.py 0 22 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 6 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 7 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 13 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 5 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 5 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py 0 1 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
Error 2023-07-28 14:16:00.643842 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.19 2
metadata = {'decompressed_file': '/tmp/rhel5.xml', 'description': 'Red Hat Enterprise Linux provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:111:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/file.py:283: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!doctype html>\n<html class="no-js" lang="en">\n <head>\n <meta charset="utf-8">\n <meta http-equi...class="img-fluid" alt="Red Hat Summit"></a>\n </div>\n </div>\n </div>\n</footer>\n\n\n </body>\n</html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/local/python-3.10/lib/python3.10/bz2.py:333: OSError
Error 2023-07-28 14:16:00.644895 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Focal]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.30 2
metadata = {'decompressed_file': '/tmp/focal.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:111:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/file.py:283: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/local/python-3.10/lib/python3.10/bz2.py:333: OSError
Error 2023-07-28 14:16:00.645452 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Bionic]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.24 2
metadata = {'decompressed_file': '/tmp/bionic.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:111:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/file.py:283: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/local/python-3.10/lib/python3.10/bz2.py:333: OSError
Error 2023-07-28 14:16:00.646700 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Xenial]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.24 2
metadata = {'decompressed_file': '/tmp/xenial.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:111:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/file.py:283: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/local/python-3.10/lib/python3.10/bz2.py:333: OSError
Error 2023-07-28 14:16:00.647272 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Trusty]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.23 2
metadata = {'decompressed_file': '/tmp/trusty.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:111:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/file.py:283: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/local/python-3.10/lib/python3.10/bz2.py:333: OSError
Failed 2023-07-28 14:16:00.635574 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 364.46 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Server 12', 'provider_name': 'SUSE Linux Enterprise Server 12', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:139:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f63d153bb80>
timeout = 360
callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f63d15d89d0>
accum_results = 1, update_position = True, timeout_extra = 0
error_message = 'Could not find SUSE Linux Enterprise Server 12 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Server 12 feed finished log

/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:29:23 wazuh-modulesd[28876] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:29:23 wazuh-modulesd[28876] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:29:23 wazuh-modulesd[28876] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:35:24,906 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 feed finished log 2023-07-28 12:35:24,906 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:35:24,906 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 12 feed finished log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Failed 2023-07-28 14:16:00.637666 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 365.13 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Server 15', 'provider_name': 'SUSE Linux Enterprise Server 15', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:139:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f63d153ac80>
timeout = 360
callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f63d0ca0790>
accum_results = 1, update_position = True, timeout_extra = 0
error_message = 'Could not find SUSE Linux Enterprise Server 15 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Server 15 feed finished log

/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:35:28 wazuh-modulesd[28971] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:35:28 wazuh-modulesd[28971] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:35:28 wazuh-modulesd[28971] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:41:29,899 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 feed finished log 2023-07-28 12:41:29,900 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:41:29,900 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 15 feed finished log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Failed 2023-07-28 14:16:00.640002 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 365.47 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Desktop 15', 'provider_name': 'SUSE Linux Enterprise Desktop 15', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:139:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f63d1a76c80>
timeout = 360
callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f63d0ca13f0>
accum_results = 1, update_position = True, timeout_extra = 0
error_message = 'Could not find SUSE Linux Enterprise Desktop 15 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Desktop 15 feed finished log

/usr/local/python-3.10/lib/python3.10/site-packages/wazuh_testing-4.5.0-py3.10.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:47:08 wazuh-modulesd[29239] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:47:08 wazuh-modulesd[29239] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:47:08 wazuh-modulesd[29239] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:53:10,238 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 feed finished log 2023-07-28 12:53:10,238 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:53:10,238 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 15 feed finished log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
XFailed 2023-07-28 14:16:00.630460 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 18.16 2
configuration = {'metadata': {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_json_name': 'JSON Red Hat Enterprise Linux', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

# Check that the timestamp of the feed metadata does not exceed the established threshold limit.
if metadata['update_treshold_weeks'] != 'None':
try:
> assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
E AssertionError: The RHEL5 feed has not been recently updated
E assert False
E + where False = <function feed_is_recently_updated at 0x7f63d1db3400>(provider_name='Red Hat Enterprise Linux 5', provider_os='RHEL5', threshold_weeks=2)
E + where <function feed_is_recently_updated at 0x7f63d1db3400> = vd.feed_is_recently_updated

test_vulnerability_detector/test_feeds/test_download_feeds.py:150: AssertionError

During handling of the above exception, another exception occurred:

configuration = {'metadata': {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_json_name': 'JSON Red Hat Enterprise Linux', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

# Check that the timestamp of the feed metadata does not exceed the established threshold limit.
if metadata['update_treshold_weeks'] != 'None':
try:
assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
except AssertionError:
> pytest.xfail(reason="The vendor didn't update its feed, so the test fails. But this is not a Wazuh defect.")
E _pytest.outcomes.XFailed: The vendor didn't update its feed, so the test fails. But this is not a Wazuh defect.

test_vulnerability_detector/test_feeds/test_download_feeds.py:155: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:14:18 wazuh-modulesd[27009] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:14:18 wazuh-modulesd[27009] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:14:18 wazuh-modulesd[27009] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2023-07-28 14:16:00.631857 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 4.19 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:134: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:16:50 wazuh-modulesd[27745] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:16:50 wazuh-modulesd[27745] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:16:50 wazuh-modulesd[27745] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Skipped 2023-07-28 14:16:00.663863 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.78 server 1
('/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py', 144, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:08:48 wazuh-modulesd[9208] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:08:48 wazuh-modulesd[9208] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:08:48 wazuh-modulesd[9208] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:08:48 wazuh-modulesd[9208] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Skipped 2023-07-28 14:16:00.664680 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 9.01 server 1
('/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py', 143, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:10:01 wazuh-modulesd[9864] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:10:01 wazuh-modulesd[9864] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:10:01 wazuh-modulesd[9864] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:10:01 wazuh-modulesd[9864] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.622857 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Indexing CPE helper with wrong source vendor fields] description: Check for invalid tags in the cpe_helper.json file. 9.85 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 11:57:55 wazuh-modulesd[6197] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 11:57:55 wazuh-modulesd[6197] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 11:57:55 wazuh-modulesd[6197] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 11:57:55 wazuh-modulesd[6197] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.623083 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Indexing CPE helper with wrong translation product fields] description: Check for invalid tags in the cpe_helper.json file. 10.01 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 11:58:05 wazuh-modulesd[6302] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 11:58:05 wazuh-modulesd[6302] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 11:58:05 wazuh-modulesd[6302] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 11:58:05 wazuh-modulesd[6302] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.623216 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Indexing CPE helper with wrong version field] description: Check for invalid tags in the cpe_helper.json file. 21.54 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 11:58:15 wazuh-modulesd[6407] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 11:58:15 wazuh-modulesd[6407] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 11:58:15 wazuh-modulesd[6407] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 11:58:15 wazuh-modulesd[6407] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.623409 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Indexing CPE helper with wrong format_version fields] description: Check for invalid tags in the cpe_helper.json file. 9.97 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 11:58:37 wazuh-modulesd[6516] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 11:58:37 wazuh-modulesd[6516] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 11:58:37 wazuh-modulesd[6516] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 11:58:37 wazuh-modulesd[6516] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.623532 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Indexing CPE helper with wrong update_date fields] description: Check for invalid tags in the cpe_helper.json file. 9.98 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 11:58:47 wazuh-modulesd[6621] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 11:58:47 wazuh-modulesd[6621] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 11:58:47 wazuh-modulesd[6621] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 11:58:47 wazuh-modulesd[6621] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.623678 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Indexing CPE helper with wrong target field] description: Check for invalid tags in the cpe_helper.json file. 109.09 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 11:58:57 wazuh-modulesd[6727] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 11:58:57 wazuh-modulesd[6727] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 11:58:57 wazuh-modulesd[6727] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 11:58:57 wazuh-modulesd[6727] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 11:59:17,235 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 11:59:17,236 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 11:59:17,236 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 11:59:37,262 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 11:59:37,262 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 11:59:37,262 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 11:59:57,290 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 11:59:57,290 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 11:59:57,290 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:00:17,318 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 12:00:17,318 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:00:17,318 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:00:37,344 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 12:00:37,345 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:00:37,345 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.623797 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong version value] description: Check for invalid values in the cpe_helper.json file. 23.06 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:00:46 wazuh-modulesd[6834] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:00:46 wazuh-modulesd[6834] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:00:46 wazuh-modulesd[6834] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:00:46 wazuh-modulesd[6834] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.623913 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong update_date value] description: Check for invalid values in the cpe_helper.json file. 22.19 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:01:09 wazuh-modulesd[6957] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:01:09 wazuh-modulesd[6957] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:01:09 wazuh-modulesd[6957] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:01:09 wazuh-modulesd[6957] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.624030 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong target value] description: Check for invalid values in the cpe_helper.json file. 21.56 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:01:31 wazuh-modulesd[7067] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:01:31 wazuh-modulesd[7067] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:01:31 wazuh-modulesd[7067] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:01:31 wazuh-modulesd[7067] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.624145 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong format_version value] description: Check for invalid values in the cpe_helper.json file. 9.99 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:01:53 wazuh-modulesd[7176] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:01:53 wazuh-modulesd[7176] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:01:53 wazuh-modulesd[7176] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:01:53 wazuh-modulesd[7176] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.624309 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong source vendor value] description: Check for invalid values in the cpe_helper.json file. 111.47 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:02:02 wazuh-modulesd[7281] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:02:02 wazuh-modulesd[7281] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:02:02 wazuh-modulesd[7281] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:02:02 wazuh-modulesd[7281] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:02:23,002 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 12:02:23,002 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:02:23,002 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:02:43,030 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 12:02:43,030 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:02:43,030 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:03:03,050 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 12:03:03,051 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:03:03,051 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:03:23,079 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 12:03:23,079 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:03:23,079 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:03:43,107 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 12:03:43,107 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:03:43,107 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.624640 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong source product value] description: Check for invalid values in the cpe_helper.json file. 111.69 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:03:54 wazuh-modulesd[7391] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:03:54 wazuh-modulesd[7391] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:03:54 wazuh-modulesd[7391] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:03:54 wazuh-modulesd[7391] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:04:14,697 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 12:04:14,698 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:04:14,698 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:04:34,727 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 12:04:34,728 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:04:34,728 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:04:54,748 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 12:04:54,748 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:04:54,748 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:05:14,776 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 12:05:14,777 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:05:14,777 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:05:34,805 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 12:05:34,805 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:05:34,805 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.624763 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Indexing CPE helper with wrong action value] description: Check for invalid values in the cpe_helper.json file. 10.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:05:46 wazuh-modulesd[7501] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:05:46 wazuh-modulesd[7501] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:05:46 wazuh-modulesd[7501] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:05:46 wazuh-modulesd[7501] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.624879 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing version field] description: Check for log when there is a missing field in the cpe_helper.json file. 22.19 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:05:56 wazuh-modulesd[7606] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:05:56 wazuh-modulesd[7606] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:05:56 wazuh-modulesd[7606] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:05:56 wazuh-modulesd[7606] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.624994 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing format_version field] description: Check for log when there is a missing field in the cpe_helper.json file. 21.36 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:06:18 wazuh-modulesd[7716] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:06:18 wazuh-modulesd[7716] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:06:18 wazuh-modulesd[7716] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:06:18 wazuh-modulesd[7716] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.625109 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing update_date field] description: Check for log when there is a missing field in the cpe_helper.json file. 20.86 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:06:39 wazuh-modulesd[7821] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:06:39 wazuh-modulesd[7821] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:06:39 wazuh-modulesd[7821] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:06:39 wazuh-modulesd[7821] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.625269 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing target field] description: Check for log when there is a missing field in the cpe_helper.json file. 109.11 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:07:00 wazuh-modulesd[7926] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:07:00 wazuh-modulesd[7926] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:07:00 wazuh-modulesd[7926] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:07:00 wazuh-modulesd[7926] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:07:20,801 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 12:07:20,801 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:07:20,801 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:07:40,823 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 12:07:40,823 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:07:40,823 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:08:00,850 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 12:08:00,851 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:08:00,851 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:08:20,878 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 12:08:20,878 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:08:20,878 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:08:40,906 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 12:08:40,906 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:08:40,906 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.625420 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing action field] description: Check for log when there is a missing field in the cpe_helper.json file. 111.65 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:08:49 wazuh-modulesd[8035] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:08:49 wazuh-modulesd[8035] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:08:49 wazuh-modulesd[8035] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:08:49 wazuh-modulesd[8035] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 12:09:09,917 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 12:09:09,917 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:09:09,917 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:09:29,945 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 12:09:29,945 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:09:29,946 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:09:49,965 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 12:09:49,966 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:09:49,966 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:10:09,994 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 12:10:09,994 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:10:09,994 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 12:10:30,022 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 12:10:30,022 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 12:10:30,022 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1 ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.625541 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing vendor field] description: Check for log when there is a missing field in the cpe_helper.json file. 21.54 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:10:41 wazuh-modulesd[8145] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:10:41 wazuh-modulesd[8145] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:10:41 wazuh-modulesd[8145] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:10:41 wazuh-modulesd[8145] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.625659 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Indexing CPE helper with missing product field] description: Check for log when there is a missing field in the cpe_helper.json file. 21.55 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:11:03 wazuh-modulesd[8250] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:11:03 wazuh-modulesd[8250] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:11:03 wazuh-modulesd[8250] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:11:03 wazuh-modulesd[8250] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.625828 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 10.49 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:11:24 wazuh-modulesd[8355] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:11:24 wazuh-modulesd[8355] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:11:24 wazuh-modulesd[8355] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.625953 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.14 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:11:35 wazuh-modulesd[8462] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:11:35 wazuh-modulesd[8462] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:11:35 wazuh-modulesd[8462] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:11:35 wazuh-modulesd[8462] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626072 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.68 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:11:44 wazuh-modulesd[8565] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:11:44 wazuh-modulesd[8565] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:11:44 wazuh-modulesd[8565] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:11:44 wazuh-modulesd[8565] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626190 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.81 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:11:53 wazuh-modulesd[8668] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:11:53 wazuh-modulesd[8668] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:11:53 wazuh-modulesd[8668] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:11:53 wazuh-modulesd[8668] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626331 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 10.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:12:03 wazuh-modulesd[8771] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:12:03 wazuh-modulesd[8771] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:12:03 wazuh-modulesd[8771] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:12:03 wazuh-modulesd[8771] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626452 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.96 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:12:13 wazuh-modulesd[8874] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:12:13 wazuh-modulesd[8874] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:12:13 wazuh-modulesd[8874] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:12:13 wazuh-modulesd[8874] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626568 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.96 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:12:23 wazuh-modulesd[8977] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:12:23 wazuh-modulesd[8977] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:12:23 wazuh-modulesd[8977] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:12:23 wazuh-modulesd[8977] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626684 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 10.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:12:33 wazuh-modulesd[9080] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:12:33 wazuh-modulesd[9080] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:12:33 wazuh-modulesd[9080] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:12:33 wazuh-modulesd[9080] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626801 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 10.03 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:12:43 wazuh-modulesd[9183] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:12:43 wazuh-modulesd[9183] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:12:43 wazuh-modulesd[9183] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:12:43 wazuh-modulesd[9183] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.626919 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 10.03 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:12:53 wazuh-modulesd[9286] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:12:53 wazuh-modulesd[9286] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:12:53 wazuh-modulesd[9286] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:12:53 wazuh-modulesd[9286] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627036 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.97 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:13:03 wazuh-modulesd[9455] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:13:03 wazuh-modulesd[9455] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:13:03 wazuh-modulesd[9455] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:13:03 wazuh-modulesd[9455] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627205 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.96 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:13:13 wazuh-modulesd[20444] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:13:13 wazuh-modulesd[20444] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:13:13 wazuh-modulesd[20444] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:13:13 wazuh-modulesd[20444] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627349 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.71 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:13:23 wazuh-modulesd[26406] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:13:23 wazuh-modulesd[26406] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:13:23 wazuh-modulesd[26406] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:13:23 wazuh-modulesd[26406] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627472 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.72 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:13:33 wazuh-modulesd[26509] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:13:33 wazuh-modulesd[26509] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:13:33 wazuh-modulesd[26509] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:13:33 wazuh-modulesd[26509] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627591 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.93 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:13:43 wazuh-modulesd[26612] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:13:43 wazuh-modulesd[26612] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:13:43 wazuh-modulesd[26612] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:13:43 wazuh-modulesd[26612] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627708 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.90 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:13:53 wazuh-modulesd[26715] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:13:53 wazuh-modulesd[26715] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:13:53 wazuh-modulesd[26715] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:13:53 wazuh-modulesd[26715] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627823 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 10.02 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:14:03 wazuh-modulesd[26818] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:14:03 wazuh-modulesd[26818] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:14:03 wazuh-modulesd[26818] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:14:03 wazuh-modulesd[26818] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.627943 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 10.02 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:14:13 wazuh-modulesd[26921] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:14:13 wazuh-modulesd[26921] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:14:13 wazuh-modulesd[26921] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 12:14:13 wazuh-modulesd[26921] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.630612 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 26.70 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:14:35 wazuh-modulesd[27134] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:14:35 wazuh-modulesd[27134] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:14:35 wazuh-modulesd[27134] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.630741 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 30.21 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:15:03 wazuh-modulesd[27271] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:15:03 wazuh-modulesd[27271] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:15:03 wazuh-modulesd[27271] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.630862 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 29.08 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:15:32 wazuh-modulesd[27396] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:15:32 wazuh-modulesd[27396] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:15:32 wazuh-modulesd[27396] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.630982 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 23.52 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:16:02 wazuh-modulesd[27533] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:16:02 wazuh-modulesd[27533] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:16:02 wazuh-modulesd[27533] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.631099 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 24.18 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:16:26 wazuh-modulesd[27640] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:16:26 wazuh-modulesd[27640] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:16:26 wazuh-modulesd[27640] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.631993 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 25.09 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:16:54 wazuh-modulesd[27833] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:16:54 wazuh-modulesd[27833] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:16:54 wazuh-modulesd[27833] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.632118 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[JAMMY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 18.27 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:17:19 wazuh-modulesd[27938] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:17:19 wazuh-modulesd[27938] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:17:19 wazuh-modulesd[27938] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.632239 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 15.95 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:17:37 wazuh-modulesd[28043] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:17:37 wazuh-modulesd[28043] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:17:37 wazuh-modulesd[28043] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.632383 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 13.38 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:17:53 wazuh-modulesd[28149] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:17:53 wazuh-modulesd[28149] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:17:53 wazuh-modulesd[28149] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.632504 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 7.62 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:18:07 wazuh-modulesd[28255] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:18:07 wazuh-modulesd[28255] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:18:07 wazuh-modulesd[28255] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 12:18:07 wazuh-modulesd[28255] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.632622 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 8.91 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:18:14 wazuh-modulesd[28360] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:18:14 wazuh-modulesd[28360] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:18:14 wazuh-modulesd[28360] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.632777 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 8.25 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:18:23 wazuh-modulesd[28466] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:18:23 wazuh-modulesd[28466] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:18:23 wazuh-modulesd[28466] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.632903 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 289.33 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:18:32 wazuh-modulesd[28572] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:18:32 wazuh-modulesd[28572] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:18:32 wazuh-modulesd[28572] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 12:18:32 wazuh-modulesd[28572] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.633026 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 21.40 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:23:20 wazuh-modulesd[28690] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:23:20 wazuh-modulesd[28690] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:23:20 wazuh-modulesd[28690] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 12:23:20 wazuh-modulesd[28690] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.633144 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 341.67 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:23:42 wazuh-modulesd[28796] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:23:42 wazuh-modulesd[28796] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:23:42 wazuh-modulesd[28796] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.637815 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 72.76 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:41:34 wazuh-modulesd[29064] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:41:34 wazuh-modulesd[29064] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:41:34 wazuh-modulesd[29064] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.637942 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 261.88 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:42:45 wazuh-modulesd[29144] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:42:45 wazuh-modulesd[29144] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:42:45 wazuh-modulesd[29144] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.640150 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 17.19 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:53:14 wazuh-modulesd[29358] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:53:14 wazuh-modulesd[29358] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:53:14 wazuh-modulesd[29358] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 12:53:14 wazuh-modulesd[29358] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-07-28 14:16:00.640309 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.69 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:53:31 wazuh-modulesd[29479] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:53:31 wazuh-modulesd[29479] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:53:31 wazuh-modulesd[29479] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.640469 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Trusty] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.45 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:53:48 wazuh-modulesd[29598] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:53:48 wazuh-modulesd[29598] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:53:48 wazuh-modulesd[29598] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.640597 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Xenial] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 17.23 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:54:04 wazuh-modulesd[29717] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:54:04 wazuh-modulesd[29717] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:54:04 wazuh-modulesd[29717] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.640720 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Bionic] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.49 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:54:21 wazuh-modulesd[29836] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:54:21 wazuh-modulesd[29836] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:54:21 wazuh-modulesd[29836] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.640842 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Focal] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.45 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:54:38 wazuh-modulesd[29955] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:54:38 wazuh-modulesd[29955] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:54:38 wazuh-modulesd[29955] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.640962 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Jammy] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 17.19 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:54:54 wazuh-modulesd[30074] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:54:54 wazuh-modulesd[30074] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:54:54 wazuh-modulesd[30074] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.641080 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.45 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:55:12 wazuh-modulesd[30193] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:55:12 wazuh-modulesd[30193] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:55:12 wazuh-modulesd[30193] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.641200 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.57 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:55:28 wazuh-modulesd[30312] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:55:28 wazuh-modulesd[30312] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:55:28 wazuh-modulesd[30312] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 12:55:28 wazuh-modulesd[30312] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.641375 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 17.19 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:55:45 wazuh-modulesd[30431] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:55:45 wazuh-modulesd[30431] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:55:45 wazuh-modulesd[30431] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 12:55:45 wazuh-modulesd[30431] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.641498 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.53 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:02 wazuh-modulesd[30550] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:02 wazuh-modulesd[30550] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:02 wazuh-modulesd[30550] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.641620 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.21 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:18 wazuh-modulesd[30669] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:18 wazuh-modulesd[30669] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:18 wazuh-modulesd[30669] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2023/07/28 12:56:18 wazuh-modulesd[30669] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2023-07-28 14:16:00.641739 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.62 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:25 wazuh-modulesd[30776] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:25 wazuh-modulesd[30776] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:25 wazuh-modulesd[30776] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-28 14:16:00.641898 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.50 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:31 wazuh-modulesd[30881] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:31 wazuh-modulesd[30881] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:31 wazuh-modulesd[30881] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2023-07-28 14:16:00.642016 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.19 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:38 wazuh-modulesd[30986] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:38 wazuh-modulesd[30986] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:38 wazuh-modulesd[30986] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2023-07-28 14:16:00.642136 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.42 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:44 wazuh-modulesd[31091] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:44 wazuh-modulesd[31091] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:44 wazuh-modulesd[31091] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.642286 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.42 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:50 wazuh-modulesd[31196] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:50 wazuh-modulesd[31196] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:50 wazuh-modulesd[31196] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.642434 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.42 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:56:57 wazuh-modulesd[31302] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:56:57 wazuh-modulesd[31302] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:56:57 wazuh-modulesd[31302] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.642554 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.26 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 12:57:03 wazuh-modulesd[31407] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 12:57:03 wazuh-modulesd[31407] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 12:57:03 wazuh-modulesd[31407] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-28 14:16:00.642664 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.83 2
No log output captured.
Passed 2023-07-28 14:16:00.642771 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.02 2
No log output captured.
Passed 2023-07-28 14:16:00.642875 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.84 2
No log output captured.
Passed 2023-07-28 14:16:00.642980 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.13 2
No log output captured.
Passed 2023-07-28 14:16:00.643085 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.46 2
No log output captured.
Passed 2023-07-28 14:16:00.643231 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 39.35 2
No log output captured.
Passed 2023-07-28 14:16:00.643965 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.66 2
No log output captured.
Passed 2023-07-28 14:16:00.644076 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.62 2
No log output captured.
Passed 2023-07-28 14:16:00.644182 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.23 2
No log output captured.
Passed 2023-07-28 14:16:00.644319 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Jammy] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.25 2
No log output captured.
Passed 2023-07-28 14:16:00.647402 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.41 2
No log output captured.
Passed 2023-07-28 14:16:00.647513 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.38 2
No log output captured.
Passed 2023-07-28 14:16:00.647622 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 47.13 2
No log output captured.
Passed 2023-07-28 14:16:00.647728 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 214.97 2
No log output captured.
Passed 2023-07-28 14:16:00.647832 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1081.26 2
No log output captured.
Passed 2023-07-28 14:16:00.647937 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 149.38 2
No log output captured.
Passed 2023-07-28 14:16:00.648078 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 739.30 2
No log output captured.
Passed 2023-07-28 14:16:00.648184 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1200.35 2
No log output captured.
Passed 2023-07-28 14:16:00.648343 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.11 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:55:35 wazuh-modulesd[31590] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:55:35 wazuh-modulesd[31590] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:55:45,032 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2023-07-28 13:55:45,032 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:55:45,032 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.648464 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 1.05 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:55:45 wazuh-modulesd[31619] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:55:45 wazuh-modulesd[31619] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
Passed 2023-07-28 14:16:00.648581 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 3.15 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:55:48 wazuh-modulesd[31677] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:55:48 wazuh-modulesd[31677] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
Passed 2023-07-28 14:16:00.648697 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.06 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:55:49 wazuh-modulesd[31705] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:55:49 wazuh-modulesd[31705] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
Passed 2023-07-28 14:16:00.648818 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.06 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:55:50 wazuh-modulesd[31733] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:55:50 wazuh-modulesd[31733] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
Passed 2023-07-28 14:16:00.648934 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 3.14 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:55:51 wazuh-modulesd[31761] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:55:51 wazuh-modulesd[31761] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
Passed 2023-07-28 14:16:00.649057 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 29.67 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:56:01 wazuh-modulesd[31864] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:56:01 wazuh-modulesd[31864] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:56:01 wazuh-modulesd[31864] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 13:56:01 wazuh-modulesd[31864] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 13:56:01 wazuh-modulesd[31864] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.649180 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 15.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:56:31 wazuh-modulesd[31984] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:56:31 wazuh-modulesd[31984] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:56:31 wazuh-modulesd[31984] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 13:56:31 wazuh-modulesd[31984] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 13:56:31 wazuh-modulesd[31984] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.649360 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 30.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:56:46 wazuh-modulesd[32088] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:56:46 wazuh-modulesd[32088] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:56:46 wazuh-modulesd[32088] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 13:56:46 wazuh-modulesd[32088] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 13:56:46 wazuh-modulesd[32088] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.649485 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 5.15 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:11 wazuh-modulesd[32177] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:11 wazuh-modulesd[32177] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:11 wazuh-modulesd[32177] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.649624 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 14.16 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:16 wazuh-modulesd[32265] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:16 wazuh-modulesd[32265] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:16 wazuh-modulesd[32265] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 13:57:26,526 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2023-07-28 13:57:26,526 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:57:26,526 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.649744 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:28 wazuh-modulesd[32323] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:28 wazuh-modulesd[32323] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:28 wazuh-modulesd[32323] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.649860 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.10 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:29 wazuh-modulesd[32353] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:29 wazuh-modulesd[32353] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:29 wazuh-modulesd[32353] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.649978 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:30 wazuh-modulesd[32383] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:30 wazuh-modulesd[32383] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:30 wazuh-modulesd[32383] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650094 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:31 wazuh-modulesd[32412] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:31 wazuh-modulesd[32412] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:31 wazuh-modulesd[32412] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650210 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:32 wazuh-modulesd[32441] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:32 wazuh-modulesd[32441] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:32 wazuh-modulesd[32441] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650350 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:34 wazuh-modulesd[32470] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:34 wazuh-modulesd[32470] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:34 wazuh-modulesd[32470] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650468 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Jammy] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.10 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:35 wazuh-modulesd[32499] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:35 wazuh-modulesd[32499] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:35 wazuh-modulesd[32499] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650622 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:36 wazuh-modulesd[32528] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:36 wazuh-modulesd[32528] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:36 wazuh-modulesd[32528] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650741 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.15 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:37 wazuh-modulesd[32557] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:37 wazuh-modulesd[32557] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:37 wazuh-modulesd[32557] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650858 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.18 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:38 wazuh-modulesd[32586] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:38 wazuh-modulesd[32586] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:38 wazuh-modulesd[32586] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.650974 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:39 wazuh-modulesd[32615] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:39 wazuh-modulesd[32615] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:39 wazuh-modulesd[32615] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.651092 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.15 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:40 wazuh-modulesd[32645] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:40 wazuh-modulesd[32645] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:40 wazuh-modulesd[32645] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.651210 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:41 wazuh-modulesd[32674] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:41 wazuh-modulesd[32674] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:41 wazuh-modulesd[32674] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.651352 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:43 wazuh-modulesd[32703] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:43 wazuh-modulesd[32703] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:43 wazuh-modulesd[32703] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 13:57:43 wazuh-modulesd[32703] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.651474 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.60 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:44 wazuh-modulesd[32732] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:44 wazuh-modulesd[32732] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:44 wazuh-modulesd[32732] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 13:57:44 wazuh-modulesd[32732] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.651595 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.65 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:44 wazuh-modulesd[32762] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:44 wazuh-modulesd[32762] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:44 wazuh-modulesd[32762] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 13:57:44 wazuh-modulesd[32762] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.651717 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.35 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:46 wazuh-modulesd[324] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:46 wazuh-modulesd[324] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:46 wazuh-modulesd[324] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.651872 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:47 wazuh-modulesd[353] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:47 wazuh-modulesd[353] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:47 wazuh-modulesd[353] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.651994 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:48 wazuh-modulesd[382] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:48 wazuh-modulesd[382] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:48 wazuh-modulesd[382] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.652111 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:49 wazuh-modulesd[412] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:49 wazuh-modulesd[412] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:49 wazuh-modulesd[412] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.652228 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:50 wazuh-modulesd[442] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:50 wazuh-modulesd[442] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:50 wazuh-modulesd[442] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.652368 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:51 wazuh-modulesd[471] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:51 wazuh-modulesd[471] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 13:57:51 wazuh-modulesd[471] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.652503 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:53 wazuh-modulesd[503] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:53 wazuh-modulesd[503] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:57:58,055 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2023-07-28 13:57:58,055 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:57:58,055 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Amazon Linux 1 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.652635 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:57:58 wazuh-modulesd[532] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:57:58 wazuh-modulesd[532] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:03,123 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2023-07-28 13:58:03,123 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:03,123 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Amazon Linux 2 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.652768 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:03 wazuh-modulesd[571] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:03 wazuh-modulesd[571] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:08,190 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2023-07-28 13:58:08,190 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:08,190 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Ubuntu Focal update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.652899 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:08 wazuh-modulesd[605] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:08 wazuh-modulesd[605] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:13,257 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2023-07-28 13:58:13,257 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:13,257 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Ubuntu Bionic update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653067 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:13 wazuh-modulesd[633] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:13 wazuh-modulesd[633] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:18,325 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2023-07-28 13:58:18,325 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:18,325 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Ubuntu Xenial update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653201 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:18 wazuh-modulesd[661] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:18 wazuh-modulesd[661] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:23,391 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2023-07-28 13:58:23,391 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:23,391 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Ubuntu Trusty update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653357 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Jammy] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:23 wazuh-modulesd[689] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:23 wazuh-modulesd[689] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:28,457 - wazuh_testing - ERROR - Could not find Ubuntu Jammy update starting log 2023-07-28 13:58:28,457 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:28,458 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Ubuntu Jammy update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653490 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:28 wazuh-modulesd[717] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:28 wazuh-modulesd[717] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:33,523 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2023-07-28 13:58:33,523 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:33,523 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 8 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653623 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:33 wazuh-modulesd[745] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:33 wazuh-modulesd[745] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:38,589 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2023-07-28 13:58:38,590 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:38,590 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 7 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653755 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:38 wazuh-modulesd[773] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:38 wazuh-modulesd[773] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:43,656 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2023-07-28 13:58:43,656 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:43,656 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 6 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.653884 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:43 wazuh-modulesd[801] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:43 wazuh-modulesd[801] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:48,724 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2023-07-28 13:58:48,724 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:48,724 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 5 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654014 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:48 wazuh-modulesd[829] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:48 wazuh-modulesd[829] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:53,790 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2023-07-28 13:58:53,790 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:53,790 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Debian Bullseye update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654180 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:53 wazuh-modulesd[857] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:53 wazuh-modulesd[857] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:58:58,857 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2023-07-28 13:58:58,857 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:58:58,857 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Debian Buster update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654334 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:58:58 wazuh-modulesd[886] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:58:58 wazuh-modulesd[886] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:03,924 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2023-07-28 13:59:03,924 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:03,924 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Arch Linux update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654471 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:03 wazuh-modulesd[914] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:03 wazuh-modulesd[914] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:08,992 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2023-07-28 13:59:08,992 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:08,992 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find National Vulnerability Database update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654602 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:09 wazuh-modulesd[943] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:09 wazuh-modulesd[943] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:14,059 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2023-07-28 13:59:14,059 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:14,060 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find Microsoft Security Update update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654736 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:14 wazuh-modulesd[971] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:14 wazuh-modulesd[971] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:19,126 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2023-07-28 13:59:19,126 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:19,126 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.654868 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:19 wazuh-modulesd[1001] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:19 wazuh-modulesd[1001] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:24,192 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2023-07-28 13:59:24,192 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:24,192 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.655000 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:24 wazuh-modulesd[1031] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:24 wazuh-modulesd[1031] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:29,258 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2023-07-28 13:59:29,258 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:29,258 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.655133 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:29 wazuh-modulesd[1060] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:29 wazuh-modulesd[1060] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:34,327 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2023-07-28 13:59:34,327 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:34,327 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.655318 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:34 wazuh-modulesd[1089] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:34 wazuh-modulesd[1089] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:39,394 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2023-07-28 13:59:39,394 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:39,394 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.655457 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.06 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 13:59:39 wazuh-modulesd[1117] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 13:59:39 wazuh-modulesd[1117] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec
------------------------------Captured stderr call------------------------------
2023-07-28 13:59:44,459 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2023-07-28 13:59:44,460 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 13:59:44,460 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.655586 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 8.51 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2023-07-28 14:16:00.655712 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 6.12 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2023-07-28 14:16:00.655837 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 6.13 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2023-07-28 14:16:00.655954 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 22.99 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2023-07-28 14:16:00.656070 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 20.11 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2023-07-28 14:16:00.656186 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 36.16 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2023-07-28 14:16:00.656322 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 22.77 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2023-07-28 14:16:00.656495 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 22.57 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
----------------------------Captured stdout teardown----------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2023-07-28 14:16:00.656622 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 8.21 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:12 wazuh-modulesd[4244] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:12 wazuh-modulesd[4244] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:12 wazuh-modulesd[4244] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:02:12 wazuh-modulesd[4244] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-07-28 14:16:00.656742 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 8.53 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:20 wazuh-modulesd[4368] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:20 wazuh-modulesd[4368] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:20 wazuh-modulesd[4368] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.656860 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 5.33 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:28 wazuh-modulesd[4489] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:28 wazuh-modulesd[4489] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:28 wazuh-modulesd[4489] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.656977 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 5.32 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:34 wazuh-modulesd[4579] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:34 wazuh-modulesd[4579] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:34 wazuh-modulesd[4579] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657096 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:39 wazuh-modulesd[4669] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:39 wazuh-modulesd[4669] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:39 wazuh-modulesd[4669] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657214 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:44 wazuh-modulesd[4758] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:44 wazuh-modulesd[4758] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:44 wazuh-modulesd[4758] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657353 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:49 wazuh-modulesd[4847] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:49 wazuh-modulesd[4847] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:49 wazuh-modulesd[4847] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657473 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:02:55 wazuh-modulesd[4936] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:02:55 wazuh-modulesd[4936] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:02:55 wazuh-modulesd[4936] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657594 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Jammy] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:00 wazuh-modulesd[5025] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:00 wazuh-modulesd[5025] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:00 wazuh-modulesd[5025] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657714 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:05 wazuh-modulesd[5114] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:05 wazuh-modulesd[5114] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:05 wazuh-modulesd[5114] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657874 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 5.18 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:10 wazuh-modulesd[5203] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:10 wazuh-modulesd[5203] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:10 wazuh-modulesd[5203] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.657996 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:15 wazuh-modulesd[5292] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:15 wazuh-modulesd[5292] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:15 wazuh-modulesd[5292] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.658114 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 5.13 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:21 wazuh-modulesd[5382] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:21 wazuh-modulesd[5382] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:21 wazuh-modulesd[5382] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.658233 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 5.17 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:26 wazuh-modulesd[5471] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:26 wazuh-modulesd[5471] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:26 wazuh-modulesd[5471] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.658374 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 5.13 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:31 wazuh-modulesd[5560] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:31 wazuh-modulesd[5560] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:31 wazuh-modulesd[5560] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.658495 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 5.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:36 wazuh-modulesd[5649] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:36 wazuh-modulesd[5649] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:36 wazuh-modulesd[5649] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 14:03:36 wazuh-modulesd[5649] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.658618 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 4.53 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:41 wazuh-modulesd[5738] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:41 wazuh-modulesd[5738] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:41 wazuh-modulesd[5738] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 14:03:41 wazuh-modulesd[5738] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.658743 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 4.49 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:46 wazuh-modulesd[5829] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:46 wazuh-modulesd[5829] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:46 wazuh-modulesd[5829] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 14:03:46 wazuh-modulesd[5829] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.658863 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 5.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:50 wazuh-modulesd[5918] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:50 wazuh-modulesd[5918] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:50 wazuh-modulesd[5918] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.658982 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 5.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:03:55 wazuh-modulesd[6007] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:03:55 wazuh-modulesd[6007] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:03:55 wazuh-modulesd[6007] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659139 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 5.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:01 wazuh-modulesd[6096] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:01 wazuh-modulesd[6096] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:01 wazuh-modulesd[6096] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659278 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 5.20 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:06 wazuh-modulesd[6185] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:06 wazuh-modulesd[6185] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:06 wazuh-modulesd[6185] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659400 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 5.15 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:11 wazuh-modulesd[6274] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:11 wazuh-modulesd[6274] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:11 wazuh-modulesd[6274] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659520 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 5.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:16 wazuh-modulesd[6363] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:16 wazuh-modulesd[6363] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:16 wazuh-modulesd[6363] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659642 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[RedHat] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:21 wazuh-modulesd[6452] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:21 wazuh-modulesd[6452] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:21 wazuh-modulesd[6452] wmodules-vuln-detector.c:982 at wm_vuldet_read_provider_content(): INFO: 'update_from_year' option at module 'vulnerability-detector' is deprecated. Use 'os' instead. 2023/07/28 14:04:21 wazuh-modulesd[6452] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659762 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.49 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:26 wazuh-modulesd[6541] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:26 wazuh-modulesd[6541] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:26 wazuh-modulesd[6541] wmodules-vuln-detector.c:992 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2023/07/28 14:04:26 wazuh-modulesd[6541] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.659884 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.49 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:30 wazuh-modulesd[6630] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:30 wazuh-modulesd[6630] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:30 wazuh-modulesd[6630] wmodules-vuln-detector.c:992 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2023/07/28 14:04:30 wazuh-modulesd[6630] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.660003 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:35 wazuh-modulesd[6719] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:35 wazuh-modulesd[6719] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:35 wazuh-modulesd[6719] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 14:04:35 wazuh-modulesd[6719] wmodules-vuln-detector.c:989 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'nvd' provider. 2023/07/28 14:04:35 wazuh-modulesd[6719] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.660124 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.59 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:39 wazuh-modulesd[6809] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:39 wazuh-modulesd[6809] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:39 wazuh-modulesd[6809] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 14:04:39 wazuh-modulesd[6809] wmodules-vuln-detector.c:989 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2023/07/28 14:04:39 wazuh-modulesd[6809] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.660261 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.49 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:44 wazuh-modulesd[6899] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:44 wazuh-modulesd[6899] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:44 wazuh-modulesd[6899] wmodules-vuln-detector.c:992 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2023/07/28 14:04:44 wazuh-modulesd[6899] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.660423 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.26 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:49 wazuh-modulesd[6988] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:49 wazuh-modulesd[6988] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:49 wazuh-modulesd[6988] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.660545 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.14 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:04:59 wazuh-modulesd[7078] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:04:59 wazuh-modulesd[7078] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:04:59 wazuh-modulesd[7078] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.660663 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Ubuntu Jammy] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 9.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:05:09 wazuh-modulesd[7167] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:05:09 wazuh-modulesd[7167] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:05:09 wazuh-modulesd[7167] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.660783 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.14 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:05:18 wazuh-modulesd[7256] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:05:18 wazuh-modulesd[7256] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:05:18 wazuh-modulesd[7256] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.660903 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.12 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:05:29 wazuh-modulesd[7345] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:05:29 wazuh-modulesd[7345] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:05:29 wazuh-modulesd[7345] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 14:05:29 wazuh-modulesd[7345] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.661024 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.15 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:05:39 wazuh-modulesd[7435] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:05:39 wazuh-modulesd[7435] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:05:39 wazuh-modulesd[7435] wmodules-vuln-detector.c:1041 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 14:05:39 wazuh-modulesd[7435] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.661144 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.15 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:05:49 wazuh-modulesd[7524] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:05:49 wazuh-modulesd[7524] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:05:49 wazuh-modulesd[7524] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-28 14:16:00.661281 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 14.10 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:06:04 wazuh-modulesd[7629] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:06:04 wazuh-modulesd[7629] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:06:04 wazuh-modulesd[7629] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.661407 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 12.96 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:06:18 wazuh-modulesd[7741] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:06:18 wazuh-modulesd[7741] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:06:18 wazuh-modulesd[7741] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.661527 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.06 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:06:31 wazuh-modulesd[7853] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:06:31 wazuh-modulesd[7853] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:06:31 wazuh-modulesd[7853] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.662274 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.05 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:06:41 wazuh-modulesd[7956] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:06:41 wazuh-modulesd[7956] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:06:41 wazuh-modulesd[7956] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.662409 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 9.05 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:06:51 wazuh-modulesd[8059] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:06:51 wazuh-modulesd[8059] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:06:51 wazuh-modulesd[8059] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.662531 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.04 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:07:00 wazuh-modulesd[8162] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:07:00 wazuh-modulesd[8162] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:07:00 wazuh-modulesd[8162] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.662651 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.02 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:07:10 wazuh-modulesd[8265] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:07:10 wazuh-modulesd[8265] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:07:10 wazuh-modulesd[8265] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.662771 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.01 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:07:20 wazuh-modulesd[8368] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:07:20 wazuh-modulesd[8368] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:07:20 wazuh-modulesd[8368] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.662890 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.08 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:07:30 wazuh-modulesd[8471] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:07:30 wazuh-modulesd[8471] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:07:30 wazuh-modulesd[8471] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663009 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.04 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:07:40 wazuh-modulesd[8574] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:07:40 wazuh-modulesd[8574] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:07:40 wazuh-modulesd[8574] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663128 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 9.98 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:07:50 wazuh-modulesd[8677] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:07:50 wazuh-modulesd[8677] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:07:50 wazuh-modulesd[8677] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663266 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 9.96 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:08:00 wazuh-modulesd[8780] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:08:00 wazuh-modulesd[8780] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:08:00 wazuh-modulesd[8780] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663393 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:08:10 wazuh-modulesd[8883] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:08:10 wazuh-modulesd[8883] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:08:10 wazuh-modulesd[8883] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663520 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 14.02 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:08:20 wazuh-modulesd[8986] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:08:20 wazuh-modulesd[8986] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:08:20 wazuh-modulesd[8986] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:08:20 wazuh-modulesd[8986] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:08:20 wazuh-modulesd[8986] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663687 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 13.52 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:08:34 wazuh-modulesd[9097] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:08:34 wazuh-modulesd[9097] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:08:34 wazuh-modulesd[9097] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:08:34 wazuh-modulesd[9097] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.663992 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 12.63 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:08:56 wazuh-modulesd[9309] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:08:56 wazuh-modulesd[9309] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:08:56 wazuh-modulesd[9309] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2023/07/28 14:08:56 wazuh-modulesd[9309] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.664115 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 12.74 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:09:09 wazuh-modulesd[9420] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:09:09 wazuh-modulesd[9420] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:09:09 wazuh-modulesd[9420] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 14:09:09 wazuh-modulesd[9420] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.664237 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 13.54 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:09:22 wazuh-modulesd[9531] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:09:22 wazuh-modulesd[9531] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:09:22 wazuh-modulesd[9531] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:09:22 wazuh-modulesd[9531] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.664393 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 12.54 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:09:36 wazuh-modulesd[9642] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:09:36 wazuh-modulesd[9642] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:09:36 wazuh-modulesd[9642] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:09:36 wazuh-modulesd[9642] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:09:36 wazuh-modulesd[9642] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.664516 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 12.68 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:09:48 wazuh-modulesd[9753] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:09:48 wazuh-modulesd[9753] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:09:48 wazuh-modulesd[9753] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:09:48 wazuh-modulesd[9753] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.664808 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 14.05 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:10:10 wazuh-modulesd[9966] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:10:10 wazuh-modulesd[9966] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:10:10 wazuh-modulesd[9966] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2023/07/28 14:10:10 wazuh-modulesd[9966] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.664932 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 12.74 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:10:24 wazuh-modulesd[10077] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:10:24 wazuh-modulesd[10077] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:10:24 wazuh-modulesd[10077] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 14:10:24 wazuh-modulesd[10077] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665094 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 11.72 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:10:36 wazuh-modulesd[10188] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:10:36 wazuh-modulesd[10188] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:10:36 wazuh-modulesd[10188] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:10:36 wazuh-modulesd[10188] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665219 test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py::test_scan_triaged_null_vulnerabilities[RHEL] description: Check if a vulnerable package with triaged NULL, is detected with the partial scan. 14.99 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:10:48 wazuh-modulesd[10299] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:10:48 wazuh-modulesd[10299] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:10:48 wazuh-modulesd[10299] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:10:48 wazuh-modulesd[10299] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:10:48 wazuh-modulesd[10299] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665370 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 21.06 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:11:03 wazuh-modulesd[10402] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:11:03 wazuh-modulesd[10402] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:11:03 wazuh-modulesd[10402] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:11:03 wazuh-modulesd[10402] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:11:03 wazuh-modulesd[10402] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665496 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 26.11 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:11:25 wazuh-modulesd[10526] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:11:25 wazuh-modulesd[10526] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:11:25 wazuh-modulesd[10526] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:11:25 wazuh-modulesd[10526] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665620 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 25.13 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:11:51 wazuh-modulesd[10649] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:11:51 wazuh-modulesd[10649] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:11:51 wazuh-modulesd[10649] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:11:51 wazuh-modulesd[10649] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:11:51 wazuh-modulesd[10649] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665743 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 25.06 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:12:16 wazuh-modulesd[10771] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:12:16 wazuh-modulesd[10771] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:12:16 wazuh-modulesd[10771] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:12:16 wazuh-modulesd[10771] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665866 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 9.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:12:41 wazuh-modulesd[10893] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:12:41 wazuh-modulesd[10893] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:12:41 wazuh-modulesd[10893] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:12:41 wazuh-modulesd[10893] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:12:41 wazuh-modulesd[10893] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.665990 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 10.70 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:12:50 wazuh-modulesd[10996] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:12:50 wazuh-modulesd[10996] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:12:50 wazuh-modulesd[10996] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:12:50 wazuh-modulesd[10996] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:12:50 wazuh-modulesd[10996] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.666111 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 9.97 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:13:01 wazuh-modulesd[11101] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:13:01 wazuh-modulesd[11101] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:13:01 wazuh-modulesd[11101] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:13:01 wazuh-modulesd[11101] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:13:01 wazuh-modulesd[11101] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.666267 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 21.74 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:13:11 wazuh-modulesd[11204] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:13:11 wazuh-modulesd[11204] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:13:11 wazuh-modulesd[11204] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:13:11 wazuh-modulesd[11204] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:13:11 wazuh-modulesd[11204] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 14:13:24,284 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-07-28 14:13:24,284 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 14:13:24,284 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.666435 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 15.54 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:13:33 wazuh-modulesd[11324] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:13:33 wazuh-modulesd[11324] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:13:33 wazuh-modulesd[11324] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:13:33 wazuh-modulesd[11324] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:13:33 wazuh-modulesd[11324] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.666562 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 14.99 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:13:48 wazuh-modulesd[11443] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:13:48 wazuh-modulesd[11443] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:13:48 wazuh-modulesd[11443] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:13:48 wazuh-modulesd[11443] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:13:48 wazuh-modulesd[11443] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.666686 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 9.52 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:14:03 wazuh-modulesd[11563] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:14:03 wazuh-modulesd[11563] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:14:03 wazuh-modulesd[11563] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:14:03 wazuh-modulesd[11563] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:14:03 wazuh-modulesd[11563] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.666825 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 24.99 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:14:13 wazuh-modulesd[11666] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:14:13 wazuh-modulesd[11666] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:14:13 wazuh-modulesd[11666] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:14:13 wazuh-modulesd[11666] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:14:13 wazuh-modulesd[11666] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 14:14:29,359 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-07-28 14:14:29,360 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 14:14:29,360 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:466 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-28 14:16:00.666949 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 20.47 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:14:38 wazuh-modulesd[11771] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:14:38 wazuh-modulesd[11771] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:14:38 wazuh-modulesd[11771] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:14:38 wazuh-modulesd[11771] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:14:38 wazuh-modulesd[11771] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.667071 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 15.46 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:14:58 wazuh-modulesd[11875] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:14:58 wazuh-modulesd[11875] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:14:58 wazuh-modulesd[11875] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:14:58 wazuh-modulesd[11875] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:14:58 wazuh-modulesd[11875] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.667197 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 11.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:15:14 wazuh-modulesd[11980] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:15:14 wazuh-modulesd[11980] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:15:14 wazuh-modulesd[11980] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:15:14 wazuh-modulesd[11980] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:15:14 wazuh-modulesd[11980] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.667345 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 9.63 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:15:25 wazuh-modulesd[12088] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:15:25 wazuh-modulesd[12088] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:15:25 wazuh-modulesd[12088] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:15:25 wazuh-modulesd[12088] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:15:25 wazuh-modulesd[12088] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.667472 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 10.55 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:15:35 wazuh-modulesd[12196] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:15:35 wazuh-modulesd[12196] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:15:35 wazuh-modulesd[12196] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:15:35 wazuh-modulesd[12196] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:15:35 wazuh-modulesd[12196] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.667597 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 11.81 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:15:45 wazuh-modulesd[12300] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:15:45 wazuh-modulesd[12300] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:15:45 wazuh-modulesd[12300] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:15:45 wazuh-modulesd[12300] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:15:45 wazuh-modulesd[12300] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-28 14:16:00.667754 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 10.15 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 14:15:56 wazuh-modulesd[12430] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 14:15:56 wazuh-modulesd[12430] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 14:15:56 wazuh-modulesd[12430] wmodules-vuln-detector.c:655 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 14:15:56 wazuh-modulesd[12430] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 14:15:56 wazuh-modulesd[12430] wmodules-vuln-detector.c:713 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/tmp/Test_integration_B41768_20230728125003/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s