VDT_R2.html

Report generated on 09-Mar-2023 at 19:35:07 by pytest-html v3.1.1

Environment

Packages {"pluggy": "0.13.1", "py": "1.10.0", "pytest": "6.2.3"}
Platform Linux-4.18.0-305.12.1.el8_4.x86_64-x86_64-with-centos-8.4.2105
Plugins {"html": "3.1.1", "metadata": "1.11.0", "testinfra": "5.0.0"}
Python 3.6.8

Summary

279 tests ran in 4287.91 seconds.

273 passed, 2 skipped, 4 failed, 0 errors, 2 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py 0 26 0 0
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 4 18 1 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 11 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 7 1 0
test_vulnerability_detector/test_feeds/test_msu_inventory.py 0 1 0 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 44 0 0
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 46 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 8 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 2 0 0
test_vulnerability_detector/test_providers/test_os.py 0 23 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 6 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 7 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 13 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 5 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 5 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py 0 1 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 6 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
Failed 2023-03-09 19:35:05.620564 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 7.37 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'Amazon Linux provider', 'download_timeout': 120, 'name': 'ALAS', 'provider_name': 'Amazo...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Amazon Linux provider', 'download_timeout': 120, 'name': 'ALAS', 'provider_name': 'Amazon Linux 1', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

if metadata['update_treshold_weeks'] != 'None':
> assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
E AssertionError: The Amazon-Linux feed has not been recently updated
E assert False
E + where False = <function feed_is_recently_updated at 0x7fa42e11f2f0>(provider_name='Amazon Linux 1', provider_os='Amazon-Linux', threshold_weeks=3)
E + where <function feed_is_recently_updated at 0x7fa42e11f2f0> = vd.feed_is_recently_updated

test_vulnerability_detector/test_feeds/test_download_feeds.py:149: AssertionError
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:47:43 wazuh-modulesd[87731] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:47:43 wazuh-modulesd[87731] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:47:43 wazuh-modulesd[87731] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:47:43 wazuh-modulesd[87731] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:47:43 wazuh-modulesd[87731] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Failed 2023-03-09 19:35:05.625681 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 7.57 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'Amazon Linux provider', 'download_timeout': 120, 'name': 'ALAS-2', 'provider_name': 'Ama...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Amazon Linux provider', 'download_timeout': 120, 'name': 'ALAS-2', 'provider_name': 'Amazon Linux 2', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

if metadata['update_treshold_weeks'] != 'None':
> assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
E AssertionError: The Amazon-Linux-2 feed has not been recently updated
E assert False
E + where False = <function feed_is_recently_updated at 0x7fa42e11f2f0>(provider_name='Amazon Linux 2', provider_os='Amazon-Linux-2', threshold_weeks=3)
E + where <function feed_is_recently_updated at 0x7fa42e11f2f0> = vd.feed_is_recently_updated

test_vulnerability_detector/test_feeds/test_download_feeds.py:149: AssertionError
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:47:50 wazuh-modulesd[87825] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:47:50 wazuh-modulesd[87825] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:47:50 wazuh-modulesd[87825] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:47:50 wazuh-modulesd[87825] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:47:50 wazuh-modulesd[87825] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Failed 2023-03-09 19:35:05.718914 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2022] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 4.75 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'Amazon Linux provider', 'download_timeout': 120, 'name': 'ALAS-2022', 'provider_name': '...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Amazon Linux provider', 'download_timeout': 120, 'name': 'ALAS-2022', 'provider_name': 'Amazon Linux 2022', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

if metadata['update_treshold_weeks'] != 'None':
> assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
E AssertionError: The Amazon-Linux-2022 feed has not been recently updated
E assert False
E + where False = <function feed_is_recently_updated at 0x7fa42e11f2f0>(provider_name='Amazon Linux 2022', provider_os='Amazon-Linux-2022', threshold_weeks=3)
E + where <function feed_is_recently_updated at 0x7fa42e11f2f0> = vd.feed_is_recently_updated

test_vulnerability_detector/test_feeds/test_download_feeds.py:149: AssertionError
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:47:57 wazuh-modulesd[87931] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:47:57 wazuh-modulesd[87931] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:47:57 wazuh-modulesd[87931] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:47:57 wazuh-modulesd[87931] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:47:57 wazuh-modulesd[87931] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Failed 2023-03-09 19:35:07.200727 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 15.13 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'Microsoft Security Update provider', 'download_timeout': 120, 'name': 'MSU', 'provider_n...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Microsoft Security Update provider', 'download_timeout': 120, 'name': 'MSU', 'provider_name': 'Microsoft Security Update', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

if metadata['update_treshold_weeks'] != 'None':
> assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
E AssertionError: The MSU feed has not been recently updated
E assert False
E + where False = <function feed_is_recently_updated at 0x7fa42e11f2f0>(provider_name='Microsoft Security Update', provider_os='MSU', threshold_weeks=3)
E + where <function feed_is_recently_updated at 0x7fa42e11f2f0> = vd.feed_is_recently_updated

test_vulnerability_detector/test_feeds/test_download_feeds.py:149: AssertionError
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:57:24 wazuh-modulesd[88179] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:57:24 wazuh-modulesd[88179] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:57:24 wazuh-modulesd[88179] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:57:24 wazuh-modulesd[88179] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:57:24 wazuh-modulesd[88179] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/03/09 18:57:24 wazuh-modulesd[88179] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
XFailed 2023-03-09 19:35:05.612336 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.16 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:135: XFailed
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:45:53 wazuh-modulesd[87110] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:45:53 wazuh-modulesd[87110] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:45:53 wazuh-modulesd[87110] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:45:53 wazuh-modulesd[87110] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:45:53 wazuh-modulesd[87110] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2023-03-09 19:35:07.212545 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.27 server 2
configuration = {'sections': [{'elements': [{'enabled': {'value': 'yes'}}, {'run_on_start': {'value': 'yes'}}, {'provider': {'attribut...check'}, {'attributes': [{'name': 'syscollector'}], 'elements': [{'disabled': {'value': 'yes'}}], 'section': 'wodle'}]}
metadata = {'custom_feed_url': 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3', 'description': 'Ch...and parsing of JPG file as invalid feed in the NVD', 'name': 'NVD - MP3', 'provider_feed_names': ['nvd provider'], ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_import_invalid_feed_type(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check the vulnerability detector behavior when importing unexpected file types as feeds.

test_phases:
- Set a custom Wazuh configuration, with custom URL feeds which refer to files of unexpected type.
- Check the error when updating the provider data.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Configuration loaded from `configuration_template`.
- metadata:
type: dict
brief: Test case metadata.
- set_wazuh_configuration_vdt:
type: fixture
brief: Set wazuh configuration.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all CVE tables.
- restart_modulesd_function:
type: fixture
brief: Restart wazuh-modulesd daemon before starting a test, and stop it after finishing.

assertions:
- Check the error when updating the provider database.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

input_description:
- The `configuration_import_invalid_feed_type.yaml` file provides the module configuration for this test.
- The `cases_import_invalid_feed_type` file provides the test cases.

expected_output:
- r"Failed when updating '{provider_feed_name}' database"
- r"ERROR: .* CVE database could not be updated."
'''
if metadata['target'] == 'nvd':
> pytest.xfail(reason='no error reported when importing invalid NVD feed. '
'https://github.com/wazuh/wazuh/issues/5210')
E _pytest.outcomes.XFailed: no error reported when importing invalid NVD feed. https://github.com/wazuh/wazuh/issues/5210

test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py:144: XFailed
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:28 wazuh-modulesd[90748] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:28 wazuh-modulesd[90748] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:28 wazuh-modulesd[90748] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:28 wazuh-modulesd[90748] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:28 wazuh-modulesd[90748] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 2010 | Timeout: 300s
Skipped 2023-03-09 19:35:07.264659 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 7.72 server 1
('/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py', 145, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:57 wazuh-modulesd[100987] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:57 wazuh-modulesd[100987] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:57 wazuh-modulesd[100987] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:57 wazuh-modulesd[100987] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:57 wazuh-modulesd[100987] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:27:57 wazuh-modulesd[100987] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Skipped 2023-03-09 19:35:07.267163 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 7.90 server 1
('/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py', 144, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:29:00 wazuh-modulesd[101652] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:29:00 wazuh-modulesd[101652] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:29:00 wazuh-modulesd[101652] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:29:00 wazuh-modulesd[101652] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:29:00 wazuh-modulesd[101652] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:29:00 wazuh-modulesd[101652] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.597276 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong source vendor fields] description: Check for invalid tags in the cpe_helper.json file. 9.71 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:23:52 wazuh-modulesd[82052] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:23:52 wazuh-modulesd[82052] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:23:52 wazuh-modulesd[82052] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:23:52 wazuh-modulesd[82052] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:23:52 wazuh-modulesd[82052] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:23:52 wazuh-modulesd[82052] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.597815 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong translation product fields] description: Check for invalid tags in the cpe_helper.json file. 9.39 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:24:01 wazuh-modulesd[82158] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:24:01 wazuh-modulesd[82158] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:24:01 wazuh-modulesd[82158] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:24:01 wazuh-modulesd[82158] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:24:01 wazuh-modulesd[82158] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:24:01 wazuh-modulesd[82158] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.598055 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong version field] description: Check for invalid tags in the cpe_helper.json file. 21.57 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:24:09 wazuh-modulesd[82250] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:24:09 wazuh-modulesd[82250] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:24:09 wazuh-modulesd[82250] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:24:09 wazuh-modulesd[82250] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:24:09 wazuh-modulesd[82250] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:24:09 wazuh-modulesd[82250] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.598271 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong format_version fields] description: Check for invalid tags in the cpe_helper.json file. 7.72 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:24:30 wazuh-modulesd[82348] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:24:30 wazuh-modulesd[82348] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:24:30 wazuh-modulesd[82348] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:24:30 wazuh-modulesd[82348] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:24:30 wazuh-modulesd[82348] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:24:30 wazuh-modulesd[82348] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.598474 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong update_date fields] description: Check for invalid tags in the cpe_helper.json file. 13.53 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:24:40 wazuh-modulesd[82453] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:24:40 wazuh-modulesd[82453] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:24:40 wazuh-modulesd[82453] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:24:40 wazuh-modulesd[82453] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:24:40 wazuh-modulesd[82453] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:24:40 wazuh-modulesd[82453] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.598766 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong target field] description: Check for invalid tags in the cpe_helper.json file. 109.66 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:24:54 wazuh-modulesd[82546] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:24:54 wazuh-modulesd[82546] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:24:54 wazuh-modulesd[82546] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:24:54 wazuh-modulesd[82546] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:24:54 wazuh-modulesd[82546] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:24:54 wazuh-modulesd[82546] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 18:25:14,571 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-03-09 18:25:14,572 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:25:14,573 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:25:34,608 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-03-09 18:25:34,609 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:25:34,609 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:25:54,627 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-03-09 18:25:54,628 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:25:54,628 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:26:14,791 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-03-09 18:26:14,792 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:26:14,792 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:26:34,982 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-03-09 18:26:34,982 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:26:34,982 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:05.598969 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong version value] description: Check for invalid values in the cpe_helper.json file. 18.81 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:26:42 wazuh-modulesd[82650] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:26:42 wazuh-modulesd[82650] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:26:42 wazuh-modulesd[82650] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:26:42 wazuh-modulesd[82650] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:26:42 wazuh-modulesd[82650] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:26:42 wazuh-modulesd[82650] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.599171 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong update_date value] description: Check for invalid values in the cpe_helper.json file. 19.29 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:27:01 wazuh-modulesd[82747] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:27:01 wazuh-modulesd[82747] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:27:01 wazuh-modulesd[82747] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:27:01 wazuh-modulesd[82747] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:27:01 wazuh-modulesd[82747] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:27:01 wazuh-modulesd[82747] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.599371 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong target value] description: Check for invalid values in the cpe_helper.json file. 19.42 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:27:21 wazuh-modulesd[82844] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:27:21 wazuh-modulesd[82844] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:27:21 wazuh-modulesd[82844] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:27:21 wazuh-modulesd[82844] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:27:21 wazuh-modulesd[82844] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:27:21 wazuh-modulesd[82844] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.599658 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong format_version value] description: Check for invalid values in the cpe_helper.json file. 8.54 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:27:40 wazuh-modulesd[82941] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:27:40 wazuh-modulesd[82941] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:27:40 wazuh-modulesd[82941] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:27:40 wazuh-modulesd[82941] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:27:40 wazuh-modulesd[82941] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:27:40 wazuh-modulesd[82941] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.600008 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong source vendor value] description: Check for invalid values in the cpe_helper.json file. 110.95 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:27:49 wazuh-modulesd[83046] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:27:49 wazuh-modulesd[83046] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:27:49 wazuh-modulesd[83046] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:27:49 wazuh-modulesd[83046] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:27:49 wazuh-modulesd[83046] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:27:49 wazuh-modulesd[83046] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 18:28:09,185 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-03-09 18:28:09,186 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:28:09,186 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:28:29,397 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-03-09 18:28:29,397 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:28:29,397 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:28:49,449 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-03-09 18:28:49,449 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:28:49,449 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:29:09,505 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-03-09 18:29:09,505 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:29:09,505 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:29:29,528 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-03-09 18:29:29,529 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:29:29,529 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:05.600568 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong source product value] description: Check for invalid values in the cpe_helper.json file. 112.73 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:29:40 wazuh-modulesd[83165] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:29:40 wazuh-modulesd[83165] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:29:40 wazuh-modulesd[83165] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:29:40 wazuh-modulesd[83165] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:29:40 wazuh-modulesd[83165] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:29:40 wazuh-modulesd[83165] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 18:30:00,789 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-03-09 18:30:00,789 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:30:00,790 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:30:21,440 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-03-09 18:30:21,440 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:30:21,440 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:30:42,047 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-03-09 18:30:42,047 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:30:42,047 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:31:02,079 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-03-09 18:31:02,079 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:31:02,080 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:31:22,265 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-03-09 18:31:22,265 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:31:22,266 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:05.600797 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong action value] description: Check for invalid values in the cpe_helper.json file. 8.83 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:31:32 wazuh-modulesd[83263] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:31:32 wazuh-modulesd[83263] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:31:32 wazuh-modulesd[83263] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:31:32 wazuh-modulesd[83263] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:31:32 wazuh-modulesd[83263] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:31:32 wazuh-modulesd[83263] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.601189 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing version field] description: Check for log when there is a missing field in the cpe_helper.json file. 18.81 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:31:41 wazuh-modulesd[83356] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:31:41 wazuh-modulesd[83356] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:31:41 wazuh-modulesd[83356] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:31:41 wazuh-modulesd[83356] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:31:41 wazuh-modulesd[83356] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:31:41 wazuh-modulesd[83356] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.601453 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing format_version field] description: Check for log when there is a missing field in the cpe_helper.json file. 16.39 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:31:59 wazuh-modulesd[83454] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:31:59 wazuh-modulesd[83454] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:31:59 wazuh-modulesd[83454] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:31:59 wazuh-modulesd[83454] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:31:59 wazuh-modulesd[83454] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:31:59 wazuh-modulesd[83454] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.601659 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing update_date field] description: Check for log when there is a missing field in the cpe_helper.json file. 16.43 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:32:15 wazuh-modulesd[83547] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:32:15 wazuh-modulesd[83547] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:32:15 wazuh-modulesd[83547] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:32:15 wazuh-modulesd[83547] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:32:15 wazuh-modulesd[83547] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:32:15 wazuh-modulesd[83547] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.601958 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing target field] description: Check for log when there is a missing field in the cpe_helper.json file. 107.41 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:32:32 wazuh-modulesd[83628] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:32:32 wazuh-modulesd[83628] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:32:32 wazuh-modulesd[83628] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:32:32 wazuh-modulesd[83628] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:32:32 wazuh-modulesd[83628] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:32:32 wazuh-modulesd[83628] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 18:32:52,223 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-03-09 18:32:52,224 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:32:52,224 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:33:12,285 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-03-09 18:33:12,285 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:33:12,285 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:33:32,416 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-03-09 18:33:32,417 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:33:32,417 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:33:52,579 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-03-09 18:33:52,580 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:33:52,580 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:34:12,725 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-03-09 18:34:12,726 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:34:12,726 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:05.602386 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing action field] description: Check for log when there is a missing field in the cpe_helper.json file. 110.98 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:34:21 wazuh-modulesd[83743] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:34:21 wazuh-modulesd[83743] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:34:21 wazuh-modulesd[83743] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:34:21 wazuh-modulesd[83743] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:34:21 wazuh-modulesd[83743] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:34:21 wazuh-modulesd[83743] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 18:34:41,759 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-03-09 18:34:41,759 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:34:41,759 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:35:01,825 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-03-09 18:35:01,825 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:35:01,825 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:35:21,908 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-03-09 18:35:21,908 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:35:21,909 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:35:41,942 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-03-09 18:35:41,943 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:35:41,943 - wazuh_testing - ERROR - Results expected: 1 2023-03-09 18:36:02,049 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-03-09 18:36:02,050 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 18:36:02,050 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1 ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:05.602737 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing vendor field] description: Check for log when there is a missing field in the cpe_helper.json file. 18.24 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:36:11 wazuh-modulesd[83861] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:36:11 wazuh-modulesd[83861] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:36:11 wazuh-modulesd[83861] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:36:11 wazuh-modulesd[83861] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:36:11 wazuh-modulesd[83861] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:36:11 wazuh-modulesd[83861] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.603087 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing product field] description: Check for log when there is a missing field in the cpe_helper.json file. 18.86 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:36:29 wazuh-modulesd[83954] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:36:29 wazuh-modulesd[83954] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:36:29 wazuh-modulesd[83954] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:36:29 wazuh-modulesd[83954] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:36:29 wazuh-modulesd[83954] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:36:29 wazuh-modulesd[83954] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.603446 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing vendor field] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 19.10 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:36:47 wazuh-modulesd[84047] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:36:47 wazuh-modulesd[84047] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:36:47 wazuh-modulesd[84047] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:36:47 wazuh-modulesd[84047] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:36:47 wazuh-modulesd[84047] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:36:47 wazuh-modulesd[84047] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.603956 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing vendor and version fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 17.72 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:37:06 wazuh-modulesd[84141] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:37:06 wazuh-modulesd[84141] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:37:06 wazuh-modulesd[84141] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:37:06 wazuh-modulesd[84141] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:37:06 wazuh-modulesd[84141] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:37:06 wazuh-modulesd[84141] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.604299 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing set_version_if_product_matches action field] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 19.30 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:37:24 wazuh-modulesd[84236] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:37:24 wazuh-modulesd[84236] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:37:24 wazuh-modulesd[84236] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:37:24 wazuh-modulesd[84236] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:37:24 wazuh-modulesd[84236] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:37:24 wazuh-modulesd[84236] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.604629 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Replace_vendor instead of set_version_if_product_matches action fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 19.86 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:37:44 wazuh-modulesd[84342] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:37:44 wazuh-modulesd[84342] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:37:44 wazuh-modulesd[84342] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:37:44 wazuh-modulesd[84342] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:37:44 wazuh-modulesd[84342] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:37:44 wazuh-modulesd[84342] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.604927 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing all source fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 20.55 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:38:06 wazuh-modulesd[84435] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:38:06 wazuh-modulesd[84435] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:38:06 wazuh-modulesd[84435] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:38:06 wazuh-modulesd[84435] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:38:06 wazuh-modulesd[84435] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:38:06 wazuh-modulesd[84435] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.605568 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_vendor_version[Missing all the source fields and version translation field] description: Check that when vendor and version tags are empty, and the action tag is not the correct to. extract the version field, the package cannot be indexed. 19.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:38:26 wazuh-modulesd[84528] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:38:26 wazuh-modulesd[84528] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:38:26 wazuh-modulesd[84528] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:38:26 wazuh-modulesd[84528] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:38:26 wazuh-modulesd[84528] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:38:26 wazuh-modulesd[84528] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.605814 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 8.23 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:38:44 wazuh-modulesd[84621] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:38:44 wazuh-modulesd[84621] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:38:44 wazuh-modulesd[84621] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:38:44 wazuh-modulesd[84621] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:38:44 wazuh-modulesd[84621] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.606097 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.40 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:38:52 wazuh-modulesd[84705] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:38:52 wazuh-modulesd[84705] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:38:52 wazuh-modulesd[84705] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:38:52 wazuh-modulesd[84705] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:38:52 wazuh-modulesd[84705] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:38:52 wazuh-modulesd[84705] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.606339 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.27 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:00 wazuh-modulesd[84808] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:00 wazuh-modulesd[84808] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:00 wazuh-modulesd[84808] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:00 wazuh-modulesd[84808] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:00 wazuh-modulesd[84808] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:00 wazuh-modulesd[84808] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.606579 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.91 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:08 wazuh-modulesd[84911] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:08 wazuh-modulesd[84911] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:08 wazuh-modulesd[84911] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:08 wazuh-modulesd[84911] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:08 wazuh-modulesd[84911] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:08 wazuh-modulesd[84911] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.606766 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.97 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:16 wazuh-modulesd[85001] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:16 wazuh-modulesd[85001] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:16 wazuh-modulesd[85001] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:16 wazuh-modulesd[85001] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:16 wazuh-modulesd[85001] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:16 wazuh-modulesd[85001] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.607129 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.48 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:26 wazuh-modulesd[85104] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:26 wazuh-modulesd[85104] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:26 wazuh-modulesd[85104] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:26 wazuh-modulesd[85104] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:26 wazuh-modulesd[85104] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:26 wazuh-modulesd[85104] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.607440 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.39 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:34 wazuh-modulesd[85195] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:34 wazuh-modulesd[85195] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:34 wazuh-modulesd[85195] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:34 wazuh-modulesd[85195] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:34 wazuh-modulesd[85195] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:34 wazuh-modulesd[85195] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.607756 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.31 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:41 wazuh-modulesd[85286] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:41 wazuh-modulesd[85286] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:41 wazuh-modulesd[85286] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:41 wazuh-modulesd[85286] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:41 wazuh-modulesd[85286] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:41 wazuh-modulesd[85286] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.608051 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.11 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:49 wazuh-modulesd[85389] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:49 wazuh-modulesd[85389] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:49 wazuh-modulesd[85389] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:49 wazuh-modulesd[85389] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:49 wazuh-modulesd[85389] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:49 wazuh-modulesd[85389] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.608246 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.62 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:39:58 wazuh-modulesd[85492] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:39:58 wazuh-modulesd[85492] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:39:58 wazuh-modulesd[85492] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:39:58 wazuh-modulesd[85492] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:39:58 wazuh-modulesd[85492] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:39:58 wazuh-modulesd[85492] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.608431 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.68 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:05 wazuh-modulesd[85595] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:05 wazuh-modulesd[85595] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:05 wazuh-modulesd[85595] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:05 wazuh-modulesd[85595] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:05 wazuh-modulesd[85595] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:05 wazuh-modulesd[85595] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.608620 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.38 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:12 wazuh-modulesd[85698] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:12 wazuh-modulesd[85698] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:12 wazuh-modulesd[85698] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:12 wazuh-modulesd[85698] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:12 wazuh-modulesd[85698] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:12 wazuh-modulesd[85698] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.608875 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.27 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:20 wazuh-modulesd[85801] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:20 wazuh-modulesd[85801] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:20 wazuh-modulesd[85801] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:20 wazuh-modulesd[85801] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:20 wazuh-modulesd[85801] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:20 wazuh-modulesd[85801] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.609131 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.80 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:27 wazuh-modulesd[85880] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:27 wazuh-modulesd[85880] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:27 wazuh-modulesd[85880] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:27 wazuh-modulesd[85880] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:27 wazuh-modulesd[85880] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:27 wazuh-modulesd[85880] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.609318 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.08 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:35 wazuh-modulesd[85983] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:35 wazuh-modulesd[85983] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:35 wazuh-modulesd[85983] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:35 wazuh-modulesd[85983] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:35 wazuh-modulesd[85983] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:35 wazuh-modulesd[85983] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.609577 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.54 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:42 wazuh-modulesd[86086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:42 wazuh-modulesd[86086] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:42 wazuh-modulesd[86086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:42 wazuh-modulesd[86086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:42 wazuh-modulesd[86086] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:42 wazuh-modulesd[86086] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.609763 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.44 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:51 wazuh-modulesd[86189] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:51 wazuh-modulesd[86189] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:51 wazuh-modulesd[86189] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:51 wazuh-modulesd[86189] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:51 wazuh-modulesd[86189] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:51 wazuh-modulesd[86189] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.609943 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.91 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:40:59 wazuh-modulesd[86280] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:40:59 wazuh-modulesd[86280] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:40:59 wazuh-modulesd[86280] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:40:59 wazuh-modulesd[86280] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:40:59 wazuh-modulesd[86280] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 18:40:59 wazuh-modulesd[86280] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:05.610139 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 29.08 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:41:03 wazuh-modulesd[86356] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:41:03 wazuh-modulesd[86356] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:41:03 wazuh-modulesd[86356] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:41:03 wazuh-modulesd[86356] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:41:03 wazuh-modulesd[86356] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.610311 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 29.96 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:41:33 wazuh-modulesd[86488] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:41:33 wazuh-modulesd[86488] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:41:33 wazuh-modulesd[86488] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:41:33 wazuh-modulesd[86488] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:41:33 wazuh-modulesd[86488] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.610474 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 157.71 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:42:03 wazuh-modulesd[86624] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:42:03 wazuh-modulesd[86624] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:42:03 wazuh-modulesd[86624] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:42:03 wazuh-modulesd[86624] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:42:03 wazuh-modulesd[86624] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.610653 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 28.59 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:44:42 wazuh-modulesd[86773] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:44:42 wazuh-modulesd[86773] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:44:42 wazuh-modulesd[86773] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:44:42 wazuh-modulesd[86773] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:44:42 wazuh-modulesd[86773] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.610813 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 21.45 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:45:09 wazuh-modulesd[86909] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:45:09 wazuh-modulesd[86909] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:45:09 wazuh-modulesd[86909] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:45:09 wazuh-modulesd[86909] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:45:09 wazuh-modulesd[86909] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.610982 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 22.16 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:45:32 wazuh-modulesd[87014] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:45:32 wazuh-modulesd[87014] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:45:32 wazuh-modulesd[87014] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:45:32 wazuh-modulesd[87014] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:45:32 wazuh-modulesd[87014] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.612533 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 22.50 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:45:56 wazuh-modulesd[87208] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:45:56 wazuh-modulesd[87208] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:45:56 wazuh-modulesd[87208] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:45:56 wazuh-modulesd[87208] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:45:56 wazuh-modulesd[87208] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.612697 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[JAMMY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 23.15 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:46:19 wazuh-modulesd[87313] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:46:19 wazuh-modulesd[87313] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:46:19 wazuh-modulesd[87313] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:46:19 wazuh-modulesd[87313] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:46:19 wazuh-modulesd[87313] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.612861 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 21.13 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:46:41 wazuh-modulesd[87406] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:46:41 wazuh-modulesd[87406] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:46:41 wazuh-modulesd[87406] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:46:41 wazuh-modulesd[87406] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:46:41 wazuh-modulesd[87406] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.613044 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 31.56 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:47:03 wazuh-modulesd[87512] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:47:03 wazuh-modulesd[87512] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:47:03 wazuh-modulesd[87512] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:47:03 wazuh-modulesd[87512] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:47:03 wazuh-modulesd[87512] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:05.613213 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 8.73 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:47:33 wazuh-modulesd[87626] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:47:33 wazuh-modulesd[87626] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:47:33 wazuh-modulesd[87626] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:47:33 wazuh-modulesd[87626] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:47:33 wazuh-modulesd[87626] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/03/09 18:47:33 wazuh-modulesd[87626] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:05.719085 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 561.52 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:48:02 wazuh-modulesd[88037] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:48:02 wazuh-modulesd[88037] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:48:02 wazuh-modulesd[88037] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:48:02 wazuh-modulesd[88037] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:48:02 wazuh-modulesd[88037] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/03/09 18:48:02 wazuh-modulesd[88037] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.201342 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 53.58 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:57:40 wazuh-modulesd[88285] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:57:40 wazuh-modulesd[88285] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:57:40 wazuh-modulesd[88285] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:57:40 wazuh-modulesd[88285] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:57:40 wazuh-modulesd[88285] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.201858 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 102.77 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 18:58:32 wazuh-modulesd[88364] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 18:58:32 wazuh-modulesd[88364] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 18:58:32 wazuh-modulesd[88364] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 18:58:32 wazuh-modulesd[88364] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 18:58:32 wazuh-modulesd[88364] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.202267 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 141.64 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:00:14 wazuh-modulesd[88451] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:00:14 wazuh-modulesd[88451] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:00:14 wazuh-modulesd[88451] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:00:14 wazuh-modulesd[88451] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:00:14 wazuh-modulesd[88451] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.202663 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 16.36 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:02:37 wazuh-modulesd[88569] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:02:37 wazuh-modulesd[88569] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:02:37 wazuh-modulesd[88569] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:02:37 wazuh-modulesd[88569] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:02:37 wazuh-modulesd[88569] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.203075 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 42.49 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:02:53 wazuh-modulesd[88647] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:02:53 wazuh-modulesd[88647] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:02:53 wazuh-modulesd[88647] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:02:53 wazuh-modulesd[88647] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:02:53 wazuh-modulesd[88647] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.203481 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 86.54 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:03:34 wazuh-modulesd[88727] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:03:34 wazuh-modulesd[88727] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:03:34 wazuh-modulesd[88727] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:03:34 wazuh-modulesd[88727] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:03:34 wazuh-modulesd[88727] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.203877 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.43 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:05:02 wazuh-modulesd[88833] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:05:02 wazuh-modulesd[88833] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:05:02 wazuh-modulesd[88833] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:05:02 wazuh-modulesd[88833] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:05:02 wazuh-modulesd[88833] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:05:02 wazuh-modulesd[88833] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-03-09 19:35:07.204246 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.79 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:05:17 wazuh-modulesd[88962] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:05:17 wazuh-modulesd[88962] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:05:17 wazuh-modulesd[88962] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:05:17 wazuh-modulesd[88962] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:05:17 wazuh-modulesd[88962] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.204594 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Trusty] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.68 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:05:32 wazuh-modulesd[89081] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:05:32 wazuh-modulesd[89081] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:05:32 wazuh-modulesd[89081] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:05:32 wazuh-modulesd[89081] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:05:32 wazuh-modulesd[89081] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.204948 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Xenial] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.57 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:05:48 wazuh-modulesd[89200] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:05:48 wazuh-modulesd[89200] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:05:48 wazuh-modulesd[89200] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:05:48 wazuh-modulesd[89200] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:05:48 wazuh-modulesd[89200] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.205335 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Bionic] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.72 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:06:02 wazuh-modulesd[89319] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:06:02 wazuh-modulesd[89319] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:06:02 wazuh-modulesd[89319] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:06:02 wazuh-modulesd[89319] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:06:02 wazuh-modulesd[89319] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.205809 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Focal] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.26 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:06:17 wazuh-modulesd[89438] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:06:17 wazuh-modulesd[89438] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:06:17 wazuh-modulesd[89438] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:06:17 wazuh-modulesd[89438] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:06:17 wazuh-modulesd[89438] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.206215 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Jammy] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.94 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:06:34 wazuh-modulesd[89557] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:06:34 wazuh-modulesd[89557] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:06:34 wazuh-modulesd[89557] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:06:34 wazuh-modulesd[89557] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:06:34 wazuh-modulesd[89557] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.206594 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.74 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:06:48 wazuh-modulesd[89676] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:06:48 wazuh-modulesd[89676] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:06:48 wazuh-modulesd[89676] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:06:48 wazuh-modulesd[89676] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:06:48 wazuh-modulesd[89676] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.206972 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.10 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:07:03 wazuh-modulesd[89795] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:07:03 wazuh-modulesd[89795] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:07:03 wazuh-modulesd[89795] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:07:03 wazuh-modulesd[89795] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:07:03 wazuh-modulesd[89795] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/03/09 19:07:03 wazuh-modulesd[89795] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.207365 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.70 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:07:18 wazuh-modulesd[89914] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:07:18 wazuh-modulesd[89914] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:07:18 wazuh-modulesd[89914] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:07:18 wazuh-modulesd[89914] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:07:18 wazuh-modulesd[89914] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/03/09 19:07:18 wazuh-modulesd[89914] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.207762 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.52 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:07:34 wazuh-modulesd[90029] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:07:34 wazuh-modulesd[90029] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:07:34 wazuh-modulesd[90029] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:07:34 wazuh-modulesd[90029] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:07:34 wazuh-modulesd[90029] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.208145 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.33 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:07:49 wazuh-modulesd[90152] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:07:49 wazuh-modulesd[90152] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:07:49 wazuh-modulesd[90152] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:07:49 wazuh-modulesd[90152] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:07:49 wazuh-modulesd[90152] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2023/03/09 19:07:49 wazuh-modulesd[90152] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2023-03-09 19:35:07.208532 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 7.27 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:07:56 wazuh-modulesd[90259] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:07:56 wazuh-modulesd[90259] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:07:56 wazuh-modulesd[90259] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:07:56 wazuh-modulesd[90259] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:07:56 wazuh-modulesd[90259] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-03-09 19:35:07.208931 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.60 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:02 wazuh-modulesd[90364] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:02 wazuh-modulesd[90364] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:02 wazuh-modulesd[90364] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:02 wazuh-modulesd[90364] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:02 wazuh-modulesd[90364] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2023-03-09 19:35:07.209360 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 5.21 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:08 wazuh-modulesd[90457] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:08 wazuh-modulesd[90457] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:08 wazuh-modulesd[90457] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:08 wazuh-modulesd[90457] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:08 wazuh-modulesd[90457] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2023-03-09 19:35:07.209890 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 7.23 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:14 wazuh-modulesd[90550] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:14 wazuh-modulesd[90550] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:14 wazuh-modulesd[90550] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:14 wazuh-modulesd[90550] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:14 wazuh-modulesd[90550] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.210298 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.52 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:22 wazuh-modulesd[90643] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:22 wazuh-modulesd[90643] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:22 wazuh-modulesd[90643] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:22 wazuh-modulesd[90643] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:22 wazuh-modulesd[90643] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.213000 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.36 server 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:31 wazuh-modulesd[90812] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:31 wazuh-modulesd[90812] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:31 wazuh-modulesd[90812] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:31 wazuh-modulesd[90812] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:31 wazuh-modulesd[90812] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-03-09 19:35:07.213388 test_vulnerability_detector/test_feeds/test_msu_inventory.py::test_msu_catalog_patches[Check Patches with no CVE present] description: Check that patch information is added to the feed from the catalog for patches not directly related. to a Vulnerability. 19.67 2
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:08:39 wazuh-modulesd[90929] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:08:39 wazuh-modulesd[90929] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:08:39 wazuh-modulesd[90929] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:08:39 wazuh-modulesd[90929] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:08:39 wazuh-modulesd[90929] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/03/09 19:08:39 wazuh-modulesd[90929] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.213797 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.04 2
No log output captured.
Passed 2023-03-09 19:35:07.214139 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.20 2
No log output captured.
Passed 2023-03-09 19:35:07.214462 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.96 2
No log output captured.
Passed 2023-03-09 19:35:07.214758 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.20 2
No log output captured.
Passed 2023-03-09 19:35:07.215063 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.17 2
No log output captured.
Passed 2023-03-09 19:35:07.215405 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2002] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.67 2
No log output captured.
Passed 2023-03-09 19:35:07.215730 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2003] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.75 2
No log output captured.
Passed 2023-03-09 19:35:07.216360 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2004] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.02 2
No log output captured.
Passed 2023-03-09 19:35:07.216694 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2005] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.68 2
No log output captured.
Passed 2023-03-09 19:35:07.217126 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2006] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.78 2
No log output captured.
Passed 2023-03-09 19:35:07.217481 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2007] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.85 2
No log output captured.
Passed 2023-03-09 19:35:07.217829 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2008] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 68.60 2
No log output captured.
Passed 2023-03-09 19:35:07.218223 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2009] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.49 2
No log output captured.
Passed 2023-03-09 19:35:07.218516 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2010] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.27 2
No log output captured.
Passed 2023-03-09 19:35:07.218810 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2011] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.18 2
No log output captured.
Passed 2023-03-09 19:35:07.219103 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2012] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.49 2
No log output captured.
Passed 2023-03-09 19:35:07.219397 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2013] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.73 2
No log output captured.
Passed 2023-03-09 19:35:07.219695 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2014] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.81 2
No log output captured.
Passed 2023-03-09 19:35:07.219992 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2015] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.34 2
No log output captured.
Passed 2023-03-09 19:35:07.220306 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2016] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.89 2
No log output captured.
Passed 2023-03-09 19:35:07.220605 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2017] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.20 2
No log output captured.
Passed 2023-03-09 19:35:07.221068 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2018] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.81 2
No log output captured.
Passed 2023-03-09 19:35:07.221390 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2019] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 6.10 2
No log output captured.
Passed 2023-03-09 19:35:07.221722 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2020] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.06 2
No log output captured.
Passed 2023-03-09 19:35:07.222178 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2021] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.92 2
No log output captured.
Passed 2023-03-09 19:35:07.222472 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2022] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.41 2
No log output captured.
Passed 2023-03-09 19:35:07.222764 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2023] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.87 2
No log output captured.
Passed 2023-03-09 19:35:07.223069 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.43 2
No log output captured.
Passed 2023-03-09 19:35:07.223718 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.59 2
No log output captured.
Passed 2023-03-09 19:35:07.224032 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.95 2
No log output captured.
Passed 2023-03-09 19:35:07.224333 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.14 2
No log output captured.
Passed 2023-03-09 19:35:07.224639 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Jammy] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.68 2
No log output captured.
Passed 2023-03-09 19:35:07.224938 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Focal] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.42 2
No log output captured.
Passed 2023-03-09 19:35:07.225256 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Bionic] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.92 2
No log output captured.
Passed 2023-03-09 19:35:07.225542 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Xenial] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.15 2
No log output captured.
Passed 2023-03-09 19:35:07.225864 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Trusty] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.04 2
No log output captured.
Passed 2023-03-09 19:35:07.226274 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.09 2
No log output captured.
Passed 2023-03-09 19:35:07.226710 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.17 2
No log output captured.
Passed 2023-03-09 19:35:07.227004 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.56 2
No log output captured.
Passed 2023-03-09 19:35:07.227300 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 23.77 2
No log output captured.
Passed 2023-03-09 19:35:07.227612 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 43.45 2
No log output captured.
Passed 2023-03-09 19:35:07.227921 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 30.79 2
No log output captured.
Passed 2023-03-09 19:35:07.228223 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 44.97 2
No log output captured.
Passed 2023-03-09 19:35:07.228523 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 85.74 2
No log output captured.
Passed 2023-03-09 19:35:07.229088 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.14 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:23 wazuh-modulesd[91089] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:23 wazuh-modulesd[91089] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:23 wazuh-modulesd[91089] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:23 wazuh-modulesd[91089] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:16:33,366 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2023-03-09 19:16:33,367 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:16:33,367 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.229471 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 0.09 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:33 wazuh-modulesd[91118] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:33 wazuh-modulesd[91118] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:33 wazuh-modulesd[91118] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:33 wazuh-modulesd[91118] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-03-09 19:35:07.229807 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 3.18 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:35 wazuh-modulesd[91164] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:35 wazuh-modulesd[91164] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:35 wazuh-modulesd[91164] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:35 wazuh-modulesd[91164] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-03-09 19:35:07.231561 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.10 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:36 wazuh-modulesd[91191] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:36 wazuh-modulesd[91191] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:36 wazuh-modulesd[91191] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:36 wazuh-modulesd[91191] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-03-09 19:35:07.231996 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.13 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:37 wazuh-modulesd[91218] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:37 wazuh-modulesd[91218] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:37 wazuh-modulesd[91218] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:37 wazuh-modulesd[91218] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-03-09 19:35:07.232324 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.16 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:39 wazuh-modulesd[91245] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:39 wazuh-modulesd[91245] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:39 wazuh-modulesd[91245] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:39 wazuh-modulesd[91245] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-03-09 19:35:07.232665 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 28.64 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:16:46 wazuh-modulesd[91347] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:16:46 wazuh-modulesd[91347] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:16:46 wazuh-modulesd[91347] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:16:46 wazuh-modulesd[91347] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:16:46 wazuh-modulesd[91347] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:16:46 wazuh-modulesd[91347] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:16:46 wazuh-modulesd[91347] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.233009 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 14.53 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:17:15 wazuh-modulesd[91475] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:17:15 wazuh-modulesd[91475] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:17:15 wazuh-modulesd[91475] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:17:15 wazuh-modulesd[91475] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:17:15 wazuh-modulesd[91475] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:17:15 wazuh-modulesd[91475] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:17:15 wazuh-modulesd[91475] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.233346 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 29.72 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:17:29 wazuh-modulesd[91579] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:17:29 wazuh-modulesd[91579] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:17:29 wazuh-modulesd[91579] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:17:29 wazuh-modulesd[91579] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:17:29 wazuh-modulesd[91579] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:17:29 wazuh-modulesd[91579] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:17:29 wazuh-modulesd[91579] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.233657 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 4.29 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:17:54 wazuh-modulesd[91668] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:17:54 wazuh-modulesd[91668] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:17:54 wazuh-modulesd[91668] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:17:54 wazuh-modulesd[91668] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:17:54 wazuh-modulesd[91668] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.234039 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 13.25 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:17:58 wazuh-modulesd[91744] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:17:58 wazuh-modulesd[91744] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:17:58 wazuh-modulesd[91744] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:17:58 wazuh-modulesd[91744] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:17:58 wazuh-modulesd[91744] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 19:18:08,528 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2023-03-09 19:18:08,528 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:18:08,529 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.234371 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:10 wazuh-modulesd[91814] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:10 wazuh-modulesd[91814] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:10 wazuh-modulesd[91814] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:10 wazuh-modulesd[91814] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:10 wazuh-modulesd[91814] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.234703 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:11 wazuh-modulesd[91844] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:11 wazuh-modulesd[91844] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:11 wazuh-modulesd[91844] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:11 wazuh-modulesd[91844] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:11 wazuh-modulesd[91844] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.235108 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2022] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:12 wazuh-modulesd[91874] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:12 wazuh-modulesd[91874] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:12 wazuh-modulesd[91874] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:12 wazuh-modulesd[91874] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:12 wazuh-modulesd[91874] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.235419 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:13 wazuh-modulesd[91904] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:13 wazuh-modulesd[91904] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:13 wazuh-modulesd[91904] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:13 wazuh-modulesd[91904] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:13 wazuh-modulesd[91904] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.235738 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.12 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:15 wazuh-modulesd[91933] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:15 wazuh-modulesd[91933] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:15 wazuh-modulesd[91933] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:15 wazuh-modulesd[91933] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:15 wazuh-modulesd[91933] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.236057 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.13 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:16 wazuh-modulesd[91962] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:16 wazuh-modulesd[91962] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:16 wazuh-modulesd[91962] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:16 wazuh-modulesd[91962] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:16 wazuh-modulesd[91962] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.236377 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:17 wazuh-modulesd[91991] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:17 wazuh-modulesd[91991] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:17 wazuh-modulesd[91991] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:17 wazuh-modulesd[91991] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:17 wazuh-modulesd[91991] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.236683 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Jammy] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:18 wazuh-modulesd[92020] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:18 wazuh-modulesd[92020] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:18 wazuh-modulesd[92020] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:18 wazuh-modulesd[92020] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:18 wazuh-modulesd[92020] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.236999 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:19 wazuh-modulesd[92049] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:19 wazuh-modulesd[92049] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:19 wazuh-modulesd[92049] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:19 wazuh-modulesd[92049] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:19 wazuh-modulesd[92049] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.237237 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.15 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:20 wazuh-modulesd[92078] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:20 wazuh-modulesd[92078] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:20 wazuh-modulesd[92078] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:20 wazuh-modulesd[92078] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:20 wazuh-modulesd[92078] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.237534 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.18 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:21 wazuh-modulesd[92107] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:21 wazuh-modulesd[92107] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:21 wazuh-modulesd[92107] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:21 wazuh-modulesd[92107] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:21 wazuh-modulesd[92107] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.237854 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.10 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:23 wazuh-modulesd[92136] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:23 wazuh-modulesd[92136] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:23 wazuh-modulesd[92136] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:23 wazuh-modulesd[92136] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:23 wazuh-modulesd[92136] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.238188 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:24 wazuh-modulesd[92165] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:24 wazuh-modulesd[92165] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:24 wazuh-modulesd[92165] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:24 wazuh-modulesd[92165] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:24 wazuh-modulesd[92165] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.238604 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:25 wazuh-modulesd[92194] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:25 wazuh-modulesd[92194] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:25 wazuh-modulesd[92194] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:25 wazuh-modulesd[92194] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:25 wazuh-modulesd[92194] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.238908 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.09 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:26 wazuh-modulesd[92223] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:26 wazuh-modulesd[92223] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:26 wazuh-modulesd[92223] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:26 wazuh-modulesd[92223] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:26 wazuh-modulesd[92223] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/03/09 19:18:26 wazuh-modulesd[92223] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.239232 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.58 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:26 wazuh-modulesd[92252] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:26 wazuh-modulesd[92252] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:26 wazuh-modulesd[92252] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:26 wazuh-modulesd[92252] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:26 wazuh-modulesd[92252] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/03/09 19:18:26 wazuh-modulesd[92252] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-03-09 19:35:07.239583 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:27 wazuh-modulesd[92280] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:27 wazuh-modulesd[92280] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:27 wazuh-modulesd[92280] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:27 wazuh-modulesd[92280] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:27 wazuh-modulesd[92280] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/03/09 19:18:27 wazuh-modulesd[92280] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.239829 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:28 wazuh-modulesd[92310] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:28 wazuh-modulesd[92310] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:28 wazuh-modulesd[92310] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:28 wazuh-modulesd[92310] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:28 wazuh-modulesd[92310] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.240049 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:29 wazuh-modulesd[92339] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:29 wazuh-modulesd[92339] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:29 wazuh-modulesd[92339] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:29 wazuh-modulesd[92339] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:29 wazuh-modulesd[92339] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.240319 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.10 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:30 wazuh-modulesd[92368] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:30 wazuh-modulesd[92368] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:30 wazuh-modulesd[92368] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:30 wazuh-modulesd[92368] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:30 wazuh-modulesd[92368] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.240548 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:31 wazuh-modulesd[92397] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:31 wazuh-modulesd[92397] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:31 wazuh-modulesd[92397] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:31 wazuh-modulesd[92397] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:31 wazuh-modulesd[92397] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.240744 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.14 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:32 wazuh-modulesd[92426] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:32 wazuh-modulesd[92426] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:32 wazuh-modulesd[92426] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:32 wazuh-modulesd[92426] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:32 wazuh-modulesd[92426] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.240944 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.15 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:33 wazuh-modulesd[92455] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:33 wazuh-modulesd[92455] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:33 wazuh-modulesd[92455] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:33 wazuh-modulesd[92455] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:18:33 wazuh-modulesd[92455] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.241268 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.65 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:34 wazuh-modulesd[92484] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:34 wazuh-modulesd[92484] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:34 wazuh-modulesd[92484] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:34 wazuh-modulesd[92484] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:18:39,964 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2023-03-09 19:18:39,965 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:18:39,965 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 1 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.241493 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.13 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:40 wazuh-modulesd[92512] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:40 wazuh-modulesd[92512] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:40 wazuh-modulesd[92512] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:40 wazuh-modulesd[92512] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:18:45,614 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2023-03-09 19:18:45,615 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:18:45,615 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 2 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.241725 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2022] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:45 wazuh-modulesd[92540] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:45 wazuh-modulesd[92540] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:45 wazuh-modulesd[92540] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:45 wazuh-modulesd[92540] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:18:50,690 - wazuh_testing - ERROR - Could not find Amazon Linux 2022 update starting log 2023-03-09 19:18:50,691 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:18:50,691 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 2022 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.241925 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.14 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:50 wazuh-modulesd[92568] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:50 wazuh-modulesd[92568] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:50 wazuh-modulesd[92568] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:50 wazuh-modulesd[92568] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:18:55,828 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2023-03-09 19:18:55,828 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:18:55,828 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Focal update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.242128 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:18:55 wazuh-modulesd[92596] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:18:55 wazuh-modulesd[92596] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:18:55 wazuh-modulesd[92596] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:18:55 wazuh-modulesd[92596] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:00,952 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2023-03-09 19:19:00,953 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:00,954 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Bionic update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.242330 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.65 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:01 wazuh-modulesd[92624] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:01 wazuh-modulesd[92624] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:01 wazuh-modulesd[92624] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:01 wazuh-modulesd[92624] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:06,125 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2023-03-09 19:19:06,126 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:06,127 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Xenial update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.242573 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.12 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:06 wazuh-modulesd[92652] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:06 wazuh-modulesd[92652] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:06 wazuh-modulesd[92652] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:06 wazuh-modulesd[92652] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:11,763 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2023-03-09 19:19:11,764 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:11,764 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Trusty update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.242834 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Jammy] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.12 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:11 wazuh-modulesd[92680] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:11 wazuh-modulesd[92680] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:11 wazuh-modulesd[92680] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:11 wazuh-modulesd[92680] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:16,896 - wazuh_testing - ERROR - Could not find Ubuntu Jammy update starting log 2023-03-09 19:19:16,897 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:16,897 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Jammy update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.243105 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.13 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:16 wazuh-modulesd[92708] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:16 wazuh-modulesd[92708] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:16 wazuh-modulesd[92708] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:16 wazuh-modulesd[92708] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:22,040 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2023-03-09 19:19:22,041 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:22,041 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 8 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.243330 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.17 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:22 wazuh-modulesd[92736] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:22 wazuh-modulesd[92736] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:22 wazuh-modulesd[92736] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:22 wazuh-modulesd[92736] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:27,167 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2023-03-09 19:19:27,168 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:27,168 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 7 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.243557 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.15 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:27 wazuh-modulesd[92764] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:27 wazuh-modulesd[92764] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:27 wazuh-modulesd[92764] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:27 wazuh-modulesd[92764] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:32,351 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2023-03-09 19:19:32,351 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:32,351 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 6 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.243777 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:32 wazuh-modulesd[92792] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:32 wazuh-modulesd[92792] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:32 wazuh-modulesd[92792] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:32 wazuh-modulesd[92792] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:37,505 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2023-03-09 19:19:37,505 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:37,506 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 5 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.243977 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:37 wazuh-modulesd[92820] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:37 wazuh-modulesd[92820] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:37 wazuh-modulesd[92820] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:37 wazuh-modulesd[92820] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:42,619 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2023-03-09 19:19:42,620 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:42,620 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Bullseye update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.244176 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.62 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:42 wazuh-modulesd[92848] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:42 wazuh-modulesd[92848] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:42 wazuh-modulesd[92848] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:42 wazuh-modulesd[92848] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:47,762 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2023-03-09 19:19:47,763 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:47,763 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Buster update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.244377 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:48 wazuh-modulesd[92876] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:48 wazuh-modulesd[92876] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:48 wazuh-modulesd[92876] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:48 wazuh-modulesd[92876] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:53,355 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2023-03-09 19:19:53,356 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:53,356 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Arch Linux update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.244577 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.61 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:53 wazuh-modulesd[92904] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:53 wazuh-modulesd[92904] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:53 wazuh-modulesd[92904] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:53 wazuh-modulesd[92904] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:19:58,488 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2023-03-09 19:19:58,489 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:19:58,489 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find National Vulnerability Database update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.244838 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:19:59 wazuh-modulesd[92932] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:19:59 wazuh-modulesd[92932] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:19:59 wazuh-modulesd[92932] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:19:59 wazuh-modulesd[92932] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:04,086 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2023-03-09 19:20:04,087 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:04,087 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Microsoft Security Update update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.245093 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:20:04 wazuh-modulesd[92960] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:20:04 wazuh-modulesd[92960] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:20:04 wazuh-modulesd[92960] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:20:04 wazuh-modulesd[92960] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:09,171 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2023-03-09 19:20:09,171 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:09,172 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.245319 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.12 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:20:09 wazuh-modulesd[92988] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:20:09 wazuh-modulesd[92988] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:20:09 wazuh-modulesd[92988] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:20:09 wazuh-modulesd[92988] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:14,293 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2023-03-09 19:20:14,294 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:14,294 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.245568 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.11 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:20:14 wazuh-modulesd[93016] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:20:14 wazuh-modulesd[93016] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:20:14 wazuh-modulesd[93016] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:20:14 wazuh-modulesd[93016] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:19,425 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2023-03-09 19:20:19,425 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:19,425 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.245930 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.17 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:20:19 wazuh-modulesd[93044] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:20:19 wazuh-modulesd[93044] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:20:19 wazuh-modulesd[93044] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:20:19 wazuh-modulesd[93044] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:24,552 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2023-03-09 19:20:24,553 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:24,553 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.246299 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.67 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:20:24 wazuh-modulesd[93072] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:20:24 wazuh-modulesd[93072] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:20:24 wazuh-modulesd[93072] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:20:24 wazuh-modulesd[93072] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:29,794 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2023-03-09 19:20:29,795 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:29,795 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.246852 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.16 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:20:30 wazuh-modulesd[93100] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:20:30 wazuh-modulesd[93100] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:20:30 wazuh-modulesd[93100] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:20:30 wazuh-modulesd[93100] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-03-09 19:20:35,433 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2023-03-09 19:20:35,434 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:20:35,434 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.247197 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 5.11 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2023-03-09 19:35:07.247595 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 4.38 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2023-03-09 19:35:07.247913 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 3.89 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2023-03-09 19:35:07.248219 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 12.77 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service
Passed 2023-03-09 19:35:07.248526 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 17.38 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service
Passed 2023-03-09 19:35:07.248836 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 24.77 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service
Passed 2023-03-09 19:35:07.249162 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 16.82 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service
Passed 2023-03-09 19:35:07.249477 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 16.02 server 0
------------------------------Captured stderr call------------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
----------------------------Captured stderr teardown----------------------------
Redirecting to /bin/systemctl restart wazuh-manager.service
Passed 2023-03-09 19:35:07.249767 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 13.98 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:25 wazuh-modulesd[96158] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:25 wazuh-modulesd[96158] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:25 wazuh-modulesd[96158] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:25 wazuh-modulesd[96158] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:25 wazuh-modulesd[96158] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:22:25 wazuh-modulesd[96158] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-03-09 19:35:07.250055 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 5.75 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:32 wazuh-modulesd[96268] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:32 wazuh-modulesd[96268] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:32 wazuh-modulesd[96268] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:32 wazuh-modulesd[96268] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:32 wazuh-modulesd[96268] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.250337 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 4.62 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:38 wazuh-modulesd[96389] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:38 wazuh-modulesd[96389] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:38 wazuh-modulesd[96389] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:38 wazuh-modulesd[96389] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:38 wazuh-modulesd[96389] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.250731 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 3.52 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:42 wazuh-modulesd[96455] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:42 wazuh-modulesd[96455] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:42 wazuh-modulesd[96455] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:42 wazuh-modulesd[96455] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:42 wazuh-modulesd[96455] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.251015 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2022] description: Check if modulesd downloads the feeds for each os. 4.49 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:46 wazuh-modulesd[96557] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:46 wazuh-modulesd[96557] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:46 wazuh-modulesd[96557] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:46 wazuh-modulesd[96557] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:46 wazuh-modulesd[96557] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.251301 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 3.33 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:50 wazuh-modulesd[96647] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:50 wazuh-modulesd[96647] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:50 wazuh-modulesd[96647] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:50 wazuh-modulesd[96647] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:50 wazuh-modulesd[96647] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.251598 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 4.33 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:53 wazuh-modulesd[96736] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:53 wazuh-modulesd[96736] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:53 wazuh-modulesd[96736] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:53 wazuh-modulesd[96736] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:53 wazuh-modulesd[96736] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.251911 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 3.25 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:22:57 wazuh-modulesd[96813] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:22:57 wazuh-modulesd[96813] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:22:57 wazuh-modulesd[96813] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:22:57 wazuh-modulesd[96813] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:22:57 wazuh-modulesd[96813] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.252197 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 3.22 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:01 wazuh-modulesd[96902] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:01 wazuh-modulesd[96902] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:01 wazuh-modulesd[96902] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:01 wazuh-modulesd[96902] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:01 wazuh-modulesd[96902] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.252489 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Jammy] description: Check if modulesd downloads the feeds for each os. 3.28 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:04 wazuh-modulesd[96979] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:04 wazuh-modulesd[96979] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:04 wazuh-modulesd[96979] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:04 wazuh-modulesd[96979] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:04 wazuh-modulesd[96979] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.252794 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 3.63 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:08 wazuh-modulesd[97068] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:08 wazuh-modulesd[97068] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:08 wazuh-modulesd[97068] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:08 wazuh-modulesd[97068] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:08 wazuh-modulesd[97068] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.253130 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 4.46 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:12 wazuh-modulesd[97157] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:12 wazuh-modulesd[97157] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:12 wazuh-modulesd[97157] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:12 wazuh-modulesd[97157] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:12 wazuh-modulesd[97157] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.253417 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 3.24 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:15 wazuh-modulesd[97246] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:15 wazuh-modulesd[97246] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:15 wazuh-modulesd[97246] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:15 wazuh-modulesd[97246] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:15 wazuh-modulesd[97246] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.253712 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 4.25 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:20 wazuh-modulesd[97335] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:20 wazuh-modulesd[97335] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:20 wazuh-modulesd[97335] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:20 wazuh-modulesd[97335] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:20 wazuh-modulesd[97335] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.254084 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 5.18 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:24 wazuh-modulesd[97424] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:24 wazuh-modulesd[97424] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:24 wazuh-modulesd[97424] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:24 wazuh-modulesd[97424] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:24 wazuh-modulesd[97424] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.254392 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 3.23 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:28 wazuh-modulesd[97500] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:28 wazuh-modulesd[97500] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:28 wazuh-modulesd[97500] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:28 wazuh-modulesd[97500] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:28 wazuh-modulesd[97500] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.254685 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 5.28 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:32 wazuh-modulesd[97577] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:32 wazuh-modulesd[97577] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:32 wazuh-modulesd[97577] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:32 wazuh-modulesd[97577] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:32 wazuh-modulesd[97577] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/03/09 19:23:32 wazuh-modulesd[97577] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.254974 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 4.26 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:38 wazuh-modulesd[97666] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:38 wazuh-modulesd[97666] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:38 wazuh-modulesd[97666] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:38 wazuh-modulesd[97666] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:38 wazuh-modulesd[97666] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/03/09 19:23:38 wazuh-modulesd[97666] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-03-09 19:35:07.255261 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 4.28 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:42 wazuh-modulesd[97756] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:42 wazuh-modulesd[97756] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:42 wazuh-modulesd[97756] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:42 wazuh-modulesd[97756] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:42 wazuh-modulesd[97756] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/03/09 19:23:42 wazuh-modulesd[97756] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.255552 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 4.27 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:45 wazuh-modulesd[97847] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:45 wazuh-modulesd[97847] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:45 wazuh-modulesd[97847] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:45 wazuh-modulesd[97847] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:45 wazuh-modulesd[97847] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.255851 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 5.34 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:51 wazuh-modulesd[97936] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:51 wazuh-modulesd[97936] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:51 wazuh-modulesd[97936] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:51 wazuh-modulesd[97936] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:51 wazuh-modulesd[97936] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.256137 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 4.26 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:56 wazuh-modulesd[98013] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:56 wazuh-modulesd[98013] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:56 wazuh-modulesd[98013] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:56 wazuh-modulesd[98013] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:56 wazuh-modulesd[98013] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.256416 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 3.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:23:59 wazuh-modulesd[98089] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:23:59 wazuh-modulesd[98089] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:23:59 wazuh-modulesd[98089] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:23:59 wazuh-modulesd[98089] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:23:59 wazuh-modulesd[98089] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.256665 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 3.27 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:01 wazuh-modulesd[98154] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:01 wazuh-modulesd[98154] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:01 wazuh-modulesd[98154] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:01 wazuh-modulesd[98154] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:01 wazuh-modulesd[98154] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.257007 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 4.33 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:07 wazuh-modulesd[98243] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:07 wazuh-modulesd[98243] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:07 wazuh-modulesd[98243] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:07 wazuh-modulesd[98243] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:07 wazuh-modulesd[98243] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.257270 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[RedHat] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 5.17 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:11 wazuh-modulesd[98332] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:11 wazuh-modulesd[98332] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:11 wazuh-modulesd[98332] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:11 wazuh-modulesd[98332] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:11 wazuh-modulesd[98332] wmodules-vuln-detector.c:991 at wm_vuldet_read_provider_content(): INFO: 'update_from_year' option at module 'vulnerability-detector' is deprecated. Use 'os' instead. 2023/03/09 19:24:11 wazuh-modulesd[98332] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.257520 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.57 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:15 wazuh-modulesd[98397] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:15 wazuh-modulesd[98397] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:15 wazuh-modulesd[98397] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:15 wazuh-modulesd[98397] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:15 wazuh-modulesd[98397] wmodules-vuln-detector.c:1005 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2023/03/09 19:24:15 wazuh-modulesd[98397] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.257775 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.40 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:20 wazuh-modulesd[98486] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:20 wazuh-modulesd[98486] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:20 wazuh-modulesd[98486] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:20 wazuh-modulesd[98486] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:20 wazuh-modulesd[98486] wmodules-vuln-detector.c:1005 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2023/03/09 19:24:20 wazuh-modulesd[98486] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.258027 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.26 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:23 wazuh-modulesd[98587] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:23 wazuh-modulesd[98587] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:23 wazuh-modulesd[98587] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:23 wazuh-modulesd[98587] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:23 wazuh-modulesd[98587] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/03/09 19:24:23 wazuh-modulesd[98587] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-03-09 19:35:07.258283 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.23 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:27 wazuh-modulesd[98676] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:27 wazuh-modulesd[98676] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:27 wazuh-modulesd[98676] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:27 wazuh-modulesd[98676] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:27 wazuh-modulesd[98676] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/03/09 19:24:27 wazuh-modulesd[98676] wmodules-vuln-detector.c:994 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2023/03/09 19:24:27 wazuh-modulesd[98676] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.258539 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.63 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:31 wazuh-modulesd[98753] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:31 wazuh-modulesd[98753] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:31 wazuh-modulesd[98753] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:31 wazuh-modulesd[98753] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:31 wazuh-modulesd[98753] wmodules-vuln-detector.c:1005 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2023/03/09 19:24:31 wazuh-modulesd[98753] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.258794 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon Linux 2022] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 10.54 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:35 wazuh-modulesd[98842] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:35 wazuh-modulesd[98842] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:35 wazuh-modulesd[98842] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:35 wazuh-modulesd[98842] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:35 wazuh-modulesd[98842] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.259044 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 9.26 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:46 wazuh-modulesd[98932] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:46 wazuh-modulesd[98932] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:46 wazuh-modulesd[98932] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:46 wazuh-modulesd[98932] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:46 wazuh-modulesd[98932] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.259301 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Ubuntu Jammy] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 9.69 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:24:55 wazuh-modulesd[99021] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:24:55 wazuh-modulesd[99021] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:24:55 wazuh-modulesd[99021] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:24:55 wazuh-modulesd[99021] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:24:55 wazuh-modulesd[99021] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.259610 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 9.19 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:25:05 wazuh-modulesd[99110] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:25:05 wazuh-modulesd[99110] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:25:05 wazuh-modulesd[99110] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:25:05 wazuh-modulesd[99110] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:25:05 wazuh-modulesd[99110] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.259890 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.15 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:25:13 wazuh-modulesd[99175] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:25:13 wazuh-modulesd[99175] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:25:13 wazuh-modulesd[99175] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:25:13 wazuh-modulesd[99175] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:25:13 wazuh-modulesd[99175] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/03/09 19:25:13 wazuh-modulesd[99175] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.260147 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 9.25 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:25:21 wazuh-modulesd[99276] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:25:21 wazuh-modulesd[99276] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:25:21 wazuh-modulesd[99276] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:25:21 wazuh-modulesd[99276] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:25:21 wazuh-modulesd[99276] wmodules-vuln-detector.c:1054 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/03/09 19:25:21 wazuh-modulesd[99276] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-03-09 19:35:07.260394 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.60 server 0
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:25:29 wazuh-modulesd[99365] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:25:29 wazuh-modulesd[99365] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:25:29 wazuh-modulesd[99365] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:25:29 wazuh-modulesd[99365] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:25:29 wazuh-modulesd[99365] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-03-09 19:35:07.260657 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 12.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:25:43 wazuh-modulesd[99457] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:25:43 wazuh-modulesd[99457] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:25:43 wazuh-modulesd[99457] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:25:43 wazuh-modulesd[99457] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:25:43 wazuh-modulesd[99457] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.260908 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 11.62 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:25:53 wazuh-modulesd[99557] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:25:53 wazuh-modulesd[99557] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:25:53 wazuh-modulesd[99557] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:25:53 wazuh-modulesd[99557] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:25:53 wazuh-modulesd[99557] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.261183 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.56 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:04 wazuh-modulesd[99657] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:04 wazuh-modulesd[99657] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:04 wazuh-modulesd[99657] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:04 wazuh-modulesd[99657] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:04 wazuh-modulesd[99657] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.261432 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 9.68 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:13 wazuh-modulesd[99760] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:13 wazuh-modulesd[99760] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:13 wazuh-modulesd[99760] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:13 wazuh-modulesd[99760] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:13 wazuh-modulesd[99760] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.261688 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.92 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:21 wazuh-modulesd[99851] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:21 wazuh-modulesd[99851] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:21 wazuh-modulesd[99851] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:21 wazuh-modulesd[99851] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:21 wazuh-modulesd[99851] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.261941 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 8.91 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:31 wazuh-modulesd[99954] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:31 wazuh-modulesd[99954] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:31 wazuh-modulesd[99954] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:31 wazuh-modulesd[99954] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:31 wazuh-modulesd[99954] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.262201 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.88 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:38 wazuh-modulesd[100044] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:38 wazuh-modulesd[100044] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:38 wazuh-modulesd[100044] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:38 wazuh-modulesd[100044] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:38 wazuh-modulesd[100044] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.262730 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.98 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:46 wazuh-modulesd[100147] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:46 wazuh-modulesd[100147] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:46 wazuh-modulesd[100147] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:46 wazuh-modulesd[100147] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:46 wazuh-modulesd[100147] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.263004 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 8.87 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:26:53 wazuh-modulesd[100250] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:26:53 wazuh-modulesd[100250] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:26:53 wazuh-modulesd[100250] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:26:53 wazuh-modulesd[100250] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:26:53 wazuh-modulesd[100250] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.263264 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.90 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:02 wazuh-modulesd[100353] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:02 wazuh-modulesd[100353] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:02 wazuh-modulesd[100353] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:02 wazuh-modulesd[100353] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:02 wazuh-modulesd[100353] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.263493 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 10.04 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:11 wazuh-modulesd[100456] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:11 wazuh-modulesd[100456] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:11 wazuh-modulesd[100456] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:11 wazuh-modulesd[100456] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:11 wazuh-modulesd[100456] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.263706 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.90 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:20 wazuh-modulesd[100559] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:20 wazuh-modulesd[100559] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:20 wazuh-modulesd[100559] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:20 wazuh-modulesd[100559] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:20 wazuh-modulesd[100559] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.263915 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 9.85 server
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:29 wazuh-modulesd[100662] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:29 wazuh-modulesd[100662] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:29 wazuh-modulesd[100662] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:29 wazuh-modulesd[100662] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:29 wazuh-modulesd[100662] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.264149 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.80 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:38 wazuh-modulesd[100765] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:38 wazuh-modulesd[100765] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:38 wazuh-modulesd[100765] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:38 wazuh-modulesd[100765] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:38 wazuh-modulesd[100765] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:27:38 wazuh-modulesd[100765] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:27:38 wazuh-modulesd[100765] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.264362 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.92 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:27:47 wazuh-modulesd[100876] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:27:47 wazuh-modulesd[100876] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:27:47 wazuh-modulesd[100876] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:27:47 wazuh-modulesd[100876] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:27:47 wazuh-modulesd[100876] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:27:47 wazuh-modulesd[100876] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.264890 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 11.21 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:28:04 wazuh-modulesd[101089] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:28:04 wazuh-modulesd[101089] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:28:04 wazuh-modulesd[101089] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:28:04 wazuh-modulesd[101089] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:28:04 wazuh-modulesd[101089] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/03/09 19:28:04 wazuh-modulesd[101089] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.266153 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 11.77 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:28:16 wazuh-modulesd[101208] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:28:16 wazuh-modulesd[101208] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:28:16 wazuh-modulesd[101208] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:28:16 wazuh-modulesd[101208] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:28:16 wazuh-modulesd[101208] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 19:28:16 wazuh-modulesd[101208] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.266404 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.49 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:28:26 wazuh-modulesd[101319] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:28:26 wazuh-modulesd[101319] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:28:26 wazuh-modulesd[101319] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:28:26 wazuh-modulesd[101319] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:28:26 wazuh-modulesd[101319] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:28:26 wazuh-modulesd[101319] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.266630 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 11.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:28:36 wazuh-modulesd[101430] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:28:36 wazuh-modulesd[101430] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:28:36 wazuh-modulesd[101430] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:28:36 wazuh-modulesd[101430] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:28:36 wazuh-modulesd[101430] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:28:36 wazuh-modulesd[101430] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:28:36 wazuh-modulesd[101430] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.266852 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 11.72 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:28:48 wazuh-modulesd[101541] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:28:48 wazuh-modulesd[101541] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:28:48 wazuh-modulesd[101541] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:28:48 wazuh-modulesd[101541] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:28:48 wazuh-modulesd[101541] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:28:48 wazuh-modulesd[101541] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.267385 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 11.11 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:29:07 wazuh-modulesd[101730] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:29:07 wazuh-modulesd[101730] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:29:07 wazuh-modulesd[101730] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:29:07 wazuh-modulesd[101730] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:29:07 wazuh-modulesd[101730] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/03/09 19:29:07 wazuh-modulesd[101730] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.267587 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 9.63 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:29:17 wazuh-modulesd[101829] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:29:17 wazuh-modulesd[101829] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:29:17 wazuh-modulesd[101829] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:29:17 wazuh-modulesd[101829] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:29:17 wazuh-modulesd[101829] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/03/09 19:29:17 wazuh-modulesd[101829] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.267792 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 12.98 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:29:28 wazuh-modulesd[101940] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:29:28 wazuh-modulesd[101940] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:29:28 wazuh-modulesd[101940] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:29:28 wazuh-modulesd[101940] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:29:28 wazuh-modulesd[101940] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:29:28 wazuh-modulesd[101940] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.268010 test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py::test_scan_triaged_null_vulnerabilities[RHEL] description: Check if a vulnerable package with triaged NULL, is detected with the partial scan. 14.97 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:29:41 wazuh-modulesd[102051] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:29:41 wazuh-modulesd[102051] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:29:41 wazuh-modulesd[102051] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:29:41 wazuh-modulesd[102051] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:29:41 wazuh-modulesd[102051] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:29:41 wazuh-modulesd[102051] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:29:41 wazuh-modulesd[102051] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.268219 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 20.07 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:29:55 wazuh-modulesd[102154] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:29:55 wazuh-modulesd[102154] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:29:55 wazuh-modulesd[102154] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:29:55 wazuh-modulesd[102154] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:29:55 wazuh-modulesd[102154] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:29:55 wazuh-modulesd[102154] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:29:55 wazuh-modulesd[102154] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.268488 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - ALAS 2022] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 19.00 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:30:15 wazuh-modulesd[102264] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:30:15 wazuh-modulesd[102264] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:30:15 wazuh-modulesd[102264] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:30:15 wazuh-modulesd[102264] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:30:15 wazuh-modulesd[102264] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/03/09 19:30:15 wazuh-modulesd[102264] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.268700 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 24.57 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:30:35 wazuh-modulesd[102374] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:30:35 wazuh-modulesd[102374] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:30:35 wazuh-modulesd[102374] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:30:35 wazuh-modulesd[102374] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:30:35 wazuh-modulesd[102374] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:30:35 wazuh-modulesd[102374] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.268900 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 23.96 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:31:00 wazuh-modulesd[102485] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:31:00 wazuh-modulesd[102485] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:31:00 wazuh-modulesd[102485] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:31:00 wazuh-modulesd[102485] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:31:00 wazuh-modulesd[102485] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:31:00 wazuh-modulesd[102485] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:31:00 wazuh-modulesd[102485] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.269143 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - ALAS 2022] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 24.04 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:31:23 wazuh-modulesd[102607] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:31:23 wazuh-modulesd[102607] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:31:23 wazuh-modulesd[102607] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:31:23 wazuh-modulesd[102607] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:31:23 wazuh-modulesd[102607] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/03/09 19:31:23 wazuh-modulesd[102607] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.269343 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 25.08 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:31:48 wazuh-modulesd[102729] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:31:48 wazuh-modulesd[102729] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:31:48 wazuh-modulesd[102729] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:31:48 wazuh-modulesd[102729] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:31:48 wazuh-modulesd[102729] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:31:48 wazuh-modulesd[102729] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.269545 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 8.43 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:32:12 wazuh-modulesd[102839] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:32:12 wazuh-modulesd[102839] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:32:12 wazuh-modulesd[102839] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:32:12 wazuh-modulesd[102839] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:32:12 wazuh-modulesd[102839] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:32:12 wazuh-modulesd[102839] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:32:12 wazuh-modulesd[102839] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.269755 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 8.15 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:32:22 wazuh-modulesd[102942] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:32:22 wazuh-modulesd[102942] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:32:22 wazuh-modulesd[102942] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:32:22 wazuh-modulesd[102942] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:32:22 wazuh-modulesd[102942] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:32:22 wazuh-modulesd[102942] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:32:22 wazuh-modulesd[102942] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.269966 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 7.30 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:32:28 wazuh-modulesd[103047] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:32:28 wazuh-modulesd[103047] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:32:28 wazuh-modulesd[103047] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:32:28 wazuh-modulesd[103047] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:32:28 wazuh-modulesd[103047] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:32:28 wazuh-modulesd[103047] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:32:28 wazuh-modulesd[103047] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.270225 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 21.08 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:32:37 wazuh-modulesd[103138] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:32:37 wazuh-modulesd[103138] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:32:37 wazuh-modulesd[103138] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:32:37 wazuh-modulesd[103138] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:32:37 wazuh-modulesd[103138] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:32:37 wazuh-modulesd[103138] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:32:37 wazuh-modulesd[103138] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 19:32:50,728 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-03-09 19:32:50,728 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:32:50,729 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.270435 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 13.41 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:32:57 wazuh-modulesd[103258] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:32:57 wazuh-modulesd[103258] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:32:57 wazuh-modulesd[103258] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:32:57 wazuh-modulesd[103258] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:32:57 wazuh-modulesd[103258] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:32:57 wazuh-modulesd[103258] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:32:57 wazuh-modulesd[103258] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.270664 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 15.12 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:33:11 wazuh-modulesd[103377] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:33:11 wazuh-modulesd[103377] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:33:11 wazuh-modulesd[103377] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:33:11 wazuh-modulesd[103377] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:33:11 wazuh-modulesd[103377] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:33:11 wazuh-modulesd[103377] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:33:11 wazuh-modulesd[103377] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.270839 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 7.96 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:33:25 wazuh-modulesd[103473] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:33:25 wazuh-modulesd[103473] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:33:25 wazuh-modulesd[103473] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:33:25 wazuh-modulesd[103473] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:33:25 wazuh-modulesd[103473] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:33:25 wazuh-modulesd[103473] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:33:25 wazuh-modulesd[103473] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.271062 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 24.08 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:33:35 wazuh-modulesd[103576] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:33:35 wazuh-modulesd[103576] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:33:35 wazuh-modulesd[103576] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:33:35 wazuh-modulesd[103576] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:33:35 wazuh-modulesd[103576] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:33:35 wazuh-modulesd[103576] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:33:35 wazuh-modulesd[103576] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-03-09 19:33:50,951 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-03-09 19:33:50,951 - wazuh_testing - ERROR - Results accumulated: 0 2023-03-09 19:33:50,952 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2023-03-09 19:35:07.271250 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 17.67 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:33:58 wazuh-modulesd[103669] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:33:58 wazuh-modulesd[103669] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:33:58 wazuh-modulesd[103669] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:33:58 wazuh-modulesd[103669] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:33:58 wazuh-modulesd[103669] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:33:58 wazuh-modulesd[103669] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:33:58 wazuh-modulesd[103669] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.271423 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 15.44 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:34:17 wazuh-modulesd[103781] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:34:17 wazuh-modulesd[103781] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:34:17 wazuh-modulesd[103781] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:34:17 wazuh-modulesd[103781] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:34:17 wazuh-modulesd[103781] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:34:17 wazuh-modulesd[103781] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:34:17 wazuh-modulesd[103781] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.271603 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 8.04 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:34:30 wazuh-modulesd[103862] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:34:30 wazuh-modulesd[103862] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:34:30 wazuh-modulesd[103862] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:34:30 wazuh-modulesd[103862] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:34:30 wazuh-modulesd[103862] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:34:30 wazuh-modulesd[103862] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:34:30 wazuh-modulesd[103862] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.271765 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 7.62 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:34:39 wazuh-modulesd[103970] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:34:39 wazuh-modulesd[103970] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:34:39 wazuh-modulesd[103970] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:34:39 wazuh-modulesd[103970] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:34:39 wazuh-modulesd[103970] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:34:39 wazuh-modulesd[103970] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:34:39 wazuh-modulesd[103970] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.271922 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 7.97 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:34:47 wazuh-modulesd[104053] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:34:47 wazuh-modulesd[104053] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:34:47 wazuh-modulesd[104053] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:34:47 wazuh-modulesd[104053] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:34:47 wazuh-modulesd[104053] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:34:47 wazuh-modulesd[104053] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:34:47 wazuh-modulesd[104053] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.272088 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 9.60 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:34:54 wazuh-modulesd[104145] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:34:54 wazuh-modulesd[104145] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:34:54 wazuh-modulesd[104145] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:34:54 wazuh-modulesd[104145] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:34:54 wazuh-modulesd[104145] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:34:54 wazuh-modulesd[104145] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:34:54 wazuh-modulesd[104145] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-03-09 19:35:07.272218 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 6.57 server 1
-----------------------------Captured stderr setup------------------------------
2023/03/09 19:35:03 wazuh-modulesd[104230] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/03/09 19:35:03 wazuh-modulesd[104230] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/03/09 19:35:03 wazuh-modulesd[104230] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/03/09 19:35:03 wazuh-modulesd[104230] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/03/09 19:35:03 wazuh-modulesd[104230] wmodules-vuln-detector.c:668 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/03/09 19:35:03 wazuh-modulesd[104230] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/03/09 19:35:03 wazuh-modulesd[104230] wmodules-vuln-detector.c:726 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s