R1.html

Report generated on 29-Jul-2023 at 00:07:47 by pytest-html v2.0.1

Environment

Packages {'pytest': '6.2.2', 'pluggy': '0.13.1'}
Platform Linux-5.19.0-46-generic-x86_64-with-glibc2.35
Plugins {'metadata': '2.0.4', 'html': '2.0.1', 'testinfra': '5.0.0'}
Python 3.9.17

Summary

296 tests ran in 9852.62 seconds.

288 passed, 2 skipped, 5 failed, 4 errors, 3 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py 0 26 0 0
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 5 18 2 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 12 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 8 1 0
test_vulnerability_detector/test_feeds/test_msu_inventory.py 0 1 0 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 42 0 4
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 50 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 9 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 3 0 0
test_vulnerability_detector/test_providers/test_os.py 0 25 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 7 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 8 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 14 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py 0 1 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 8 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
Error 2023-07-29 01:25:42.096139 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Focal]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.92 2
metadata = {'decompressed_file': '/tmp/focal.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:122:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/file.py:369: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/lib/python3.9/bz2.py:347: OSError
Error 2023-07-29 01:25:42.875998 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Bionic]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.77 2
metadata = {'decompressed_file': '/tmp/bionic.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:122:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/file.py:369: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/lib/python3.9/bz2.py:347: OSError
Error 2023-07-29 01:25:43.667884 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Xenial]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.78 2
metadata = {'decompressed_file': '/tmp/xenial.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:122:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/file.py:369: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/lib/python3.9/bz2.py:347: OSError
Error 2023-07-29 01:25:44.476455 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Trusty]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.80 2
metadata = {'decompressed_file': '/tmp/trusty.xml', 'description': 'Canonical provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:122:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/file.py:369: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">\n<html><head>\n<title>404 Not Found</title>\n</head><body>\n<h1>N...server.</p>\n<hr>\n<address>Apache/2.4.29 (Ubuntu) Server at people.canonical.com Port 443</address>\n</body></html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/lib/python3.9/bz2.py:347: OSError
Failed 2023-07-29 00:53:56.173382 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 361.53 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Server 11', 'provider_name': 'SUSE Linux Enterprise Server 11', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:142:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f46754e82e0>, timeout = 360, callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f467551eca0>, accum_results = 1
update_position = True, timeout_extra = 0, error_message = 'Could not find SUSE Linux Enterprise Server 11 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Server 11 feed finished log

/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:47:54 wazuh-modulesd[28049] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:47:54 wazuh-modulesd[28049] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:47:54 wazuh-modulesd[28049] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:47:54 wazuh-modulesd[28049] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:47:54 wazuh-modulesd[28049] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:53:56,106 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 feed finished log 2023-07-28 21:53:56,106 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:53:56,106 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 11 feed finished log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Failed 2023-07-29 01:00:00.004139 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 361.02 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Server 12', 'provider_name': 'SUSE Linux Enterprise Server 12', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:142:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f46753c34c0>, timeout = 360, callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f46754df0d0>, accum_results = 1
update_position = True, timeout_extra = 0, error_message = 'Could not find SUSE Linux Enterprise Server 12 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Server 12 feed finished log

/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:53:58 wazuh-modulesd[28177] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:53:58 wazuh-modulesd[28177] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:53:58 wazuh-modulesd[28177] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:53:58 wazuh-modulesd[28177] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:53:58 wazuh-modulesd[28177] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:59:59,935 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 feed finished log 2023-07-28 21:59:59,935 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:59:59,935 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 12 feed finished log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Failed 2023-07-29 01:06:04.252414 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 361.02 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Server 15', 'provider_name': 'SUSE Linux Enterprise Server 15', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:142:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f46754aab50>, timeout = 360, callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f4675486a60>, accum_results = 1
update_position = True, timeout_extra = 0, error_message = 'Could not find SUSE Linux Enterprise Server 15 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Server 15 feed finished log

/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:00:03 wazuh-modulesd[28267] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:00:03 wazuh-modulesd[28267] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:00:03 wazuh-modulesd[28267] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:00:03 wazuh-modulesd[28267] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:00:03 wazuh-modulesd[28267] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 22:06:04,184 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 feed finished log 2023-07-28 22:06:04,185 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 22:06:04,185 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 15 feed finished log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Failed 2023-07-29 01:13:47.773409 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 361.53 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Desktop 12', 'provider_name': 'SUSE Linux Enterprise Desktop 12', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:142:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f467540a430>, timeout = 360, callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f46754dff70>, accum_results = 1
update_position = True, timeout_extra = 0, error_message = 'Could not find SUSE Linux Enterprise Desktop 12 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Desktop 12 feed finished log

/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:07:46 wazuh-modulesd[28441] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:07:46 wazuh-modulesd[28441] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:07:46 wazuh-modulesd[28441] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:07:46 wazuh-modulesd[28441] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:07:46 wazuh-modulesd[28441] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 22:13:47,731 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 feed finished log 2023-07-28 22:13:47,731 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 22:13:47,731 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 12 feed finished log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Failed 2023-07-29 01:19:51.813792 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 361.03 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'SUSE Linux Enterprise provider', 'download_timeout': 360, 'name': 'SUSE Linux Enterprise Desktop 15', 'provider_name': 'SUSE Linux Enterprise Desktop 15', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:142:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f46754449d0>, timeout = 360, callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f46753f7ee0>, accum_results = 1
update_position = True, timeout_extra = 0, error_message = 'Could not find SUSE Linux Enterprise Desktop 15 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find SUSE Linux Enterprise Desktop 15 feed finished log

/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:13:50 wazuh-modulesd[28534] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:13:50 wazuh-modulesd[28534] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:13:50 wazuh-modulesd[28534] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:13:50 wazuh-modulesd[28534] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:13:50 wazuh-modulesd[28534] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 22:19:51,742 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 feed finished log 2023-07-28 22:19:51,742 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 22:19:51,742 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 15 feed finished log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
XFailed 2023-07-29 00:39:59.776566 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 15.32 2
configuration = {'metadata': {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_json_name': 'JSON Red Hat Enterprise Linux', ...}, set_wazuh_configuration_vdt = None
truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

if metadata['update_treshold_weeks'] != 'None':
try:
> assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
E AssertionError: The RHEL5 feed has not been recently updated
E assert False
E + where False = <function feed_is_recently_updated at 0x7f46764bcb80>(provider_name='Red Hat Enterprise Linux 5', provider_os='RHEL5', threshold_weeks=2)
E + where <function feed_is_recently_updated at 0x7f46764bcb80> = vd.feed_is_recently_updated

test_vulnerability_detector/test_feeds/test_download_feeds.py:152: AssertionError

During handling of the above exception, another exception occurred:

configuration = {'metadata': {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_json_name': 'JSON Red Hat Enterprise Linux', ...}, set_wazuh_configuration_vdt = None
truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

if 'provider_json_name' in metadata:
evm.check_provider_database_update_start_log(metadata['provider_json_name'])
evm.check_provider_database_update_finish_log(provider_name=metadata['provider_json_name'],
timeout=metadata['download_timeout'])

if metadata['update_treshold_weeks'] != 'None':
try:
assert vd.feed_is_recently_updated(provider_name=metadata['provider_name'],
provider_os=metadata['provider_os'],
threshold_weeks=metadata['update_treshold_weeks']), '' \
f"The {metadata['provider_os']} feed has not been recently updated"
except AssertionError:
> pytest.xfail(reason="The vendor didn't update its feed, so the test fails. But this is not a Wazuh defect.")
E _pytest.outcomes.XFailed: The vendor didn't update its feed, so the test fails. But this is not a Wazuh defect.

test_vulnerability_detector/test_feeds/test_download_feeds.py:157: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:39:44 wazuh-modulesd[24402] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:39:44 wazuh-modulesd[24402] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:39:44 wazuh-modulesd[24402] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:39:44 wazuh-modulesd[24402] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:39:44 wazuh-modulesd[24402] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2023-07-29 00:41:20.362284 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 0.00 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}, set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:137: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:41:20 wazuh-modulesd[25478] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:41:20 wazuh-modulesd[25478] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:41:20 wazuh-modulesd[25478] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:41:20 wazuh-modulesd[25478] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:41:20 wazuh-modulesd[25478] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2023-07-29 01:24:01.927428 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 0.00 server 2
configuration = {'sections': [{'elements': [{'enabled': {'value': 'yes'}}, {'run_on_start': {'value': 'yes'}}, {'provider': {'attribut...check'}, {'attributes': [{'name': 'syscollector'}], 'elements': [{'disabled': {'value': 'yes'}}], 'section': 'wodle'}]}
metadata = {'custom_feed_url': 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3', 'description': 'Ch...and parsing of JPG file as invalid feed in the NVD', 'name': 'NVD - MP3', 'provider_feed_names': ['nvd provider'], ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_import_invalid_feed_type(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check the vulnerability detector behavior when importing unexpected file types as feeds.

test_phases:
- Set a custom Wazuh configuration, with custom URL feeds which refer to files of unexpected type.
- Check the error when updating the provider data.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Configuration loaded from `configuration_template`.
- metadata:
type: dict
brief: Test case metadata.
- set_wazuh_configuration_vdt:
type: fixture
brief: Set wazuh configuration.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all CVE tables.
- restart_modulesd_function:
type: fixture
brief: Restart wazuh-modulesd daemon before starting a test, and stop it after finishing.

assertions:
- Check the error when updating the provider database.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

input_description:
- The `configuration_import_invalid_feed_type.yaml` file provides the module configuration for this test.
- The `cases_import_invalid_feed_type` file provides the test cases.

expected_output:
- r"Failed when updating '{provider_feed_name}' database"
- r"ERROR: .* CVE database could not be updated."
'''
if metadata['target'] == 'nvd':
> pytest.xfail(reason='no error reported when importing invalid NVD feed. '
'https://github.com/wazuh/wazuh/issues/5210')
E _pytest.outcomes.XFailed: no error reported when importing invalid NVD feed. https://github.com/wazuh/wazuh/issues/5210

test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py:145: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:24:01 wazuh-modulesd[30719] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:24:01 wazuh-modulesd[30719] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:24:01 wazuh-modulesd[30719] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:24:01 wazuh-modulesd[30719] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:24:01 wazuh-modulesd[30719] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 2010 | Timeout: 300s
Skipped 2023-07-29 02:58:45.413513 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 0.00 server 1
('/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py', 146, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:58:45 wazuh-modulesd[43941] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:58:45 wazuh-modulesd[43941] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:58:45 wazuh-modulesd[43941] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:58:45 wazuh-modulesd[43941] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:58:45 wazuh-modulesd[43941] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:58:45 wazuh-modulesd[43941] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Skipped 2023-07-29 03:00:09.171949 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 0.00 server 1
('/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py', 145, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:00:09 wazuh-modulesd[45472] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:00:09 wazuh-modulesd[45472] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:00:09 wazuh-modulesd[45472] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:00:09 wazuh-modulesd[45472] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:00:09 wazuh-modulesd[45472] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:00:09 wazuh-modulesd[45472] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:23:44.699334 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong source vendor fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:23:43 wazuh-modulesd[14752] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:23:43 wazuh-modulesd[14752] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:23:43 wazuh-modulesd[14752] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:23:43 wazuh-modulesd[14752] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:23:43 wazuh-modulesd[14752] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:23:43 wazuh-modulesd[14752] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:23:54.024304 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong translation product fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:23:53 wazuh-modulesd[15195] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:23:53 wazuh-modulesd[15195] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:23:53 wazuh-modulesd[15195] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:23:53 wazuh-modulesd[15195] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:23:53 wazuh-modulesd[15195] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:23:53 wazuh-modulesd[15195] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:24:08.540792 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong version field] description: Check for invalid tags in the cpe_helper.json file. 6.52 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:24:02 wazuh-modulesd[15610] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:24:02 wazuh-modulesd[15610] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:24:02 wazuh-modulesd[15610] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:24:02 wazuh-modulesd[15610] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:24:02 wazuh-modulesd[15610] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:24:02 wazuh-modulesd[15610] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:24:17.952607 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong format_version fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:24:16 wazuh-modulesd[16243] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:24:16 wazuh-modulesd[16243] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:24:16 wazuh-modulesd[16243] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:24:16 wazuh-modulesd[16243] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:24:16 wazuh-modulesd[16243] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:24:16 wazuh-modulesd[16243] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:24:26.894944 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong update_date fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:24:25 wazuh-modulesd[16430] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:24:25 wazuh-modulesd[16430] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:24:25 wazuh-modulesd[16430] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:24:25 wazuh-modulesd[16430] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:24:25 wazuh-modulesd[16430] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:24:25 wazuh-modulesd[16430] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:26:16.117043 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong target field] description: Check for invalid tags in the cpe_helper.json file. 100.14 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:24:35 wazuh-modulesd[16587] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:24:35 wazuh-modulesd[16587] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:24:35 wazuh-modulesd[16587] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:24:35 wazuh-modulesd[16587] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:24:35 wazuh-modulesd[16587] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:24:35 wazuh-modulesd[16587] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:24:55,987 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 21:24:55,988 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:24:55,988 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:25:16,015 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 21:25:16,015 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:25:16,015 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:25:36,046 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 21:25:36,046 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:25:36,046 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:25:56,073 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 21:25:56,073 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:25:56,073 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:26:16,099 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 21:26:16,099 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:26:16,099 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 00:26:30.691917 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong version value] description: Check for invalid values in the cpe_helper.json file. 6.52 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:26:24 wazuh-modulesd[19313] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:26:24 wazuh-modulesd[19313] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:26:24 wazuh-modulesd[19313] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:26:24 wazuh-modulesd[19313] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:26:24 wazuh-modulesd[19313] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:26:24 wazuh-modulesd[19313] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:26:45.569666 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong update_date value] description: Check for invalid values in the cpe_helper.json file. 6.52 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:26:39 wazuh-modulesd[19485] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:26:39 wazuh-modulesd[19485] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:26:39 wazuh-modulesd[19485] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:26:39 wazuh-modulesd[19485] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:26:39 wazuh-modulesd[19485] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:26:39 wazuh-modulesd[19485] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:27:00.079827 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong target value] description: Check for invalid values in the cpe_helper.json file. 6.02 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:26:54 wazuh-modulesd[19642] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:26:54 wazuh-modulesd[19642] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:26:54 wazuh-modulesd[19642] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:26:54 wazuh-modulesd[19642] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:26:54 wazuh-modulesd[19642] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:26:54 wazuh-modulesd[19642] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:27:09.337217 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong format_version value] description: Check for invalid values in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:27:08 wazuh-modulesd[19797] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:27:08 wazuh-modulesd[19797] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:27:08 wazuh-modulesd[19797] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:27:08 wazuh-modulesd[19797] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:27:08 wazuh-modulesd[19797] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:27:08 wazuh-modulesd[19797] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:28:57.773679 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong source vendor value] description: Check for invalid values in the cpe_helper.json file. 100.65 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:27:17 wazuh-modulesd[19926] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:27:17 wazuh-modulesd[19926] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:27:17 wazuh-modulesd[19926] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:27:17 wazuh-modulesd[19926] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:27:17 wazuh-modulesd[19926] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:27:17 wazuh-modulesd[19926] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:27:37,135 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 21:27:37,135 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:27:37,149 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:27:57,671 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 21:27:57,672 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:27:57,672 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:28:17,693 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 21:28:17,693 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:28:17,693 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:28:37,724 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 21:28:37,724 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:28:37,724 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:28:57,754 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 21:28:57,754 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:28:57,754 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 00:30:46.715143 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong source product value] description: Check for invalid values in the cpe_helper.json file. 100.65 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:29:06 wazuh-modulesd[20461] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:29:06 wazuh-modulesd[20461] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:29:06 wazuh-modulesd[20461] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:29:06 wazuh-modulesd[20461] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:29:06 wazuh-modulesd[20461] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:29:06 wazuh-modulesd[20461] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:29:26,077 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 21:29:26,078 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:29:26,092 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:29:46,614 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 21:29:46,614 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:29:46,614 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:30:06,634 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 21:30:06,635 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:30:06,635 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:30:26,665 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 21:30:26,665 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:30:26,665 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:30:46,695 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 21:30:46,695 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:30:46,695 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 00:30:56.170109 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong action value] description: Check for invalid values in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:30:55 wazuh-modulesd[21007] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:30:55 wazuh-modulesd[21007] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:30:55 wazuh-modulesd[21007] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:30:55 wazuh-modulesd[21007] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:30:55 wazuh-modulesd[21007] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:30:55 wazuh-modulesd[21007] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:31:08.416780 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing version field] description: Check for log when there is a missing field in the cpe_helper.json file. 5.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:31:03 wazuh-modulesd[21136] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:31:03 wazuh-modulesd[21136] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:31:03 wazuh-modulesd[21136] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:31:03 wazuh-modulesd[21136] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:31:03 wazuh-modulesd[21136] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:31:03 wazuh-modulesd[21136] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:31:21.130497 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing format_version field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:31:17 wazuh-modulesd[21285] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:31:17 wazuh-modulesd[21285] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:31:17 wazuh-modulesd[21285] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:31:17 wazuh-modulesd[21285] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:31:17 wazuh-modulesd[21285] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:31:17 wazuh-modulesd[21285] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:31:33.390306 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing update_date field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:31:29 wazuh-modulesd[21430] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:31:29 wazuh-modulesd[21430] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:31:29 wazuh-modulesd[21430] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:31:29 wazuh-modulesd[21430] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:31:29 wazuh-modulesd[21430] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:31:29 wazuh-modulesd[21430] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:33:21.779251 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing target field] description: Check for log when there is a missing field in the cpe_helper.json file. 100.15 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:31:41 wazuh-modulesd[21574] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:31:41 wazuh-modulesd[21574] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:31:41 wazuh-modulesd[21574] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:31:41 wazuh-modulesd[21574] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:31:41 wazuh-modulesd[21574] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:31:41 wazuh-modulesd[21574] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:32:01,644 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 21:32:01,644 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:32:01,644 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:32:21,669 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 21:32:21,669 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:32:21,669 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:32:41,698 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 21:32:41,698 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:32:41,698 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:33:01,729 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 21:33:01,729 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:33:01,729 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:33:21,759 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 21:33:21,759 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:33:21,759 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 00:35:09.687048 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing action field] description: Check for log when there is a missing field in the cpe_helper.json file. 100.15 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:33:29 wazuh-modulesd[21695] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:33:29 wazuh-modulesd[21695] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:33:29 wazuh-modulesd[21695] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:33:29 wazuh-modulesd[21695] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:33:29 wazuh-modulesd[21695] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:33:29 wazuh-modulesd[21695] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 21:33:49,551 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-28 21:33:49,551 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:33:49,551 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:34:09,587 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-28 21:34:09,587 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:34:09,587 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:34:29,608 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-28 21:34:29,608 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:34:29,608 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:34:49,637 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-28 21:34:49,637 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:34:49,637 - wazuh_testing - ERROR - Results expected: 1 2023-07-28 21:35:09,668 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-28 21:35:09,668 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 21:35:09,668 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 00:35:22.275625 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing vendor field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:35:18 wazuh-modulesd[21804] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:35:18 wazuh-modulesd[21804] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:35:18 wazuh-modulesd[21804] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:35:18 wazuh-modulesd[21804] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:35:18 wazuh-modulesd[21804] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:35:18 wazuh-modulesd[21804] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:35:34.814882 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing product field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:35:30 wazuh-modulesd[21897] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:35:30 wazuh-modulesd[21897] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:35:30 wazuh-modulesd[21897] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:35:30 wazuh-modulesd[21897] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:35:30 wazuh-modulesd[21897] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:35:30 wazuh-modulesd[21897] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:35:48.207582 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing vendor field] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:35:43 wazuh-modulesd[21991] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:35:43 wazuh-modulesd[21991] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:35:43 wazuh-modulesd[21991] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:35:43 wazuh-modulesd[21991] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:35:43 wazuh-modulesd[21991] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:35:43 wazuh-modulesd[21991] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:36:01.499937 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing vendor and version fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:35:56 wazuh-modulesd[22085] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:35:56 wazuh-modulesd[22085] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:35:56 wazuh-modulesd[22085] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:35:56 wazuh-modulesd[22085] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:35:56 wazuh-modulesd[22085] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:35:56 wazuh-modulesd[22085] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:36:15.024175 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing set_version_if_product_matches action field] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:36:10 wazuh-modulesd[22179] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:36:10 wazuh-modulesd[22179] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:36:10 wazuh-modulesd[22179] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:36:10 wazuh-modulesd[22179] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:36:10 wazuh-modulesd[22179] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:36:10 wazuh-modulesd[22179] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:36:27.974194 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Replace_vendor instead of set_version_if_product_matches action fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:36:23 wazuh-modulesd[22273] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:36:23 wazuh-modulesd[22273] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:36:23 wazuh-modulesd[22273] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:36:23 wazuh-modulesd[22273] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:36:23 wazuh-modulesd[22273] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:36:23 wazuh-modulesd[22273] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:36:41.174310 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing all source fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:36:36 wazuh-modulesd[22371] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:36:36 wazuh-modulesd[22371] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:36:36 wazuh-modulesd[22371] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:36:36 wazuh-modulesd[22371] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:36:36 wazuh-modulesd[22371] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:36:36 wazuh-modulesd[22371] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:36:53.634691 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_vendor_version[Missing all the source fields and version translation field] description: Check that when vendor and version tags are empty, and the action tag is not the correct to. extract the version field, the package cannot be indexed. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:36:49 wazuh-modulesd[22467] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:36:49 wazuh-modulesd[22467] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:36:49 wazuh-modulesd[22467] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:36:49 wazuh-modulesd[22467] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:36:49 wazuh-modulesd[22467] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:36:49 wazuh-modulesd[22467] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:04.371192 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 2.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:02 wazuh-modulesd[22560] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:02 wazuh-modulesd[22560] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:02 wazuh-modulesd[22560] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:02 wazuh-modulesd[22560] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:02 wazuh-modulesd[22560] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:13.350451 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:12 wazuh-modulesd[22655] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:12 wazuh-modulesd[22655] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:12 wazuh-modulesd[22655] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:12 wazuh-modulesd[22655] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:12 wazuh-modulesd[22655] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:37:12 wazuh-modulesd[22655] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:22.413822 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:21 wazuh-modulesd[22746] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:21 wazuh-modulesd[22746] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:21 wazuh-modulesd[22746] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:21 wazuh-modulesd[22746] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:21 wazuh-modulesd[22746] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:37:21 wazuh-modulesd[22746] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:31.466249 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:30 wazuh-modulesd[22837] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:30 wazuh-modulesd[22837] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:30 wazuh-modulesd[22837] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:30 wazuh-modulesd[22837] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:30 wazuh-modulesd[22837] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:37:30 wazuh-modulesd[22837] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:40.739676 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:39 wazuh-modulesd[22928] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:39 wazuh-modulesd[22928] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:39 wazuh-modulesd[22928] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:39 wazuh-modulesd[22928] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:39 wazuh-modulesd[22928] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:37:39 wazuh-modulesd[22928] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:50.014220 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:49 wazuh-modulesd[23019] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:49 wazuh-modulesd[23019] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:49 wazuh-modulesd[23019] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:49 wazuh-modulesd[23019] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:49 wazuh-modulesd[23019] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:37:49 wazuh-modulesd[23019] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:37:59.077157 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:37:58 wazuh-modulesd[23110] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:37:58 wazuh-modulesd[23110] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:37:58 wazuh-modulesd[23110] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:37:58 wazuh-modulesd[23110] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:37:58 wazuh-modulesd[23110] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:37:58 wazuh-modulesd[23110] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:38:08.401042 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:38:07 wazuh-modulesd[23201] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:38:07 wazuh-modulesd[23201] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:38:07 wazuh-modulesd[23201] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:38:07 wazuh-modulesd[23201] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:38:07 wazuh-modulesd[23201] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:38:07 wazuh-modulesd[23201] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:38:17.723669 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:38:16 wazuh-modulesd[23292] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:38:16 wazuh-modulesd[23292] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:38:16 wazuh-modulesd[23292] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:38:16 wazuh-modulesd[23292] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:38:16 wazuh-modulesd[23292] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:38:16 wazuh-modulesd[23292] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:38:27.034042 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:38:26 wazuh-modulesd[23383] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:38:26 wazuh-modulesd[23383] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:38:26 wazuh-modulesd[23383] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:38:26 wazuh-modulesd[23383] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:38:26 wazuh-modulesd[23383] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:38:26 wazuh-modulesd[23383] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:38:36.318222 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:38:35 wazuh-modulesd[23474] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:38:35 wazuh-modulesd[23474] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:38:35 wazuh-modulesd[23474] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:38:35 wazuh-modulesd[23474] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:38:35 wazuh-modulesd[23474] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:38:35 wazuh-modulesd[23474] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:38:45.019039 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:38:44 wazuh-modulesd[23565] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:38:44 wazuh-modulesd[23565] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:38:44 wazuh-modulesd[23565] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:38:44 wazuh-modulesd[23565] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:38:44 wazuh-modulesd[23565] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:38:44 wazuh-modulesd[23565] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:38:54.094834 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:38:53 wazuh-modulesd[23656] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:38:53 wazuh-modulesd[23656] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:38:53 wazuh-modulesd[23656] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:38:53 wazuh-modulesd[23656] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:38:53 wazuh-modulesd[23656] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:38:53 wazuh-modulesd[23656] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:39:03.367206 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:39:02 wazuh-modulesd[23747] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:39:02 wazuh-modulesd[23747] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:39:02 wazuh-modulesd[23747] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:39:02 wazuh-modulesd[23747] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:39:02 wazuh-modulesd[23747] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:39:02 wazuh-modulesd[23747] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:39:12.647009 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:39:11 wazuh-modulesd[23838] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:39:11 wazuh-modulesd[23838] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:39:11 wazuh-modulesd[23838] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:39:11 wazuh-modulesd[23838] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:39:11 wazuh-modulesd[23838] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:39:11 wazuh-modulesd[23838] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:39:21.615072 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:39:20 wazuh-modulesd[23929] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:39:20 wazuh-modulesd[23929] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:39:20 wazuh-modulesd[23929] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:39:20 wazuh-modulesd[23929] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:39:20 wazuh-modulesd[23929] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:39:20 wazuh-modulesd[23929] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:39:30.922445 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:39:29 wazuh-modulesd[24162] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:39:29 wazuh-modulesd[24162] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:39:29 wazuh-modulesd[24162] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:39:29 wazuh-modulesd[24162] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:39:29 wazuh-modulesd[24162] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:39:29 wazuh-modulesd[24162] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:39:41.232864 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:39:40 wazuh-modulesd[24306] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:39:40 wazuh-modulesd[24306] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:39:40 wazuh-modulesd[24306] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:39:40 wazuh-modulesd[24306] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:39:40 wazuh-modulesd[24306] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 21:39:40 wazuh-modulesd[24306] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:40:17.140852 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 14.02 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:40:03 wazuh-modulesd[24599] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:40:03 wazuh-modulesd[24599] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:40:03 wazuh-modulesd[24599] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:40:03 wazuh-modulesd[24599] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:40:03 wazuh-modulesd[24599] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:40:34.685155 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 14.02 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:40:20 wazuh-modulesd[24796] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:40:20 wazuh-modulesd[24796] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:40:20 wazuh-modulesd[24796] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:40:20 wazuh-modulesd[24796] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:40:20 wazuh-modulesd[24796] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:40:51.190453 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 13.02 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:40:38 wazuh-modulesd[24989] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:40:38 wazuh-modulesd[24989] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:40:38 wazuh-modulesd[24989] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:40:38 wazuh-modulesd[24989] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:40:38 wazuh-modulesd[24989] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:41:04.114738 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 9.39 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:40:54 wazuh-modulesd[25182] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:40:54 wazuh-modulesd[25182] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:40:54 wazuh-modulesd[25182] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:40:54 wazuh-modulesd[25182] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:40:54 wazuh-modulesd[25182] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:41:16.914741 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 9.39 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:41:07 wazuh-modulesd[25327] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:41:07 wazuh-modulesd[25327] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:41:07 wazuh-modulesd[25327] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:41:07 wazuh-modulesd[25327] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:41:07 wazuh-modulesd[25327] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:41:32.960690 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 9.39 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:41:23 wazuh-modulesd[25570] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:41:23 wazuh-modulesd[25570] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:41:23 wazuh-modulesd[25570] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:41:23 wazuh-modulesd[25570] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:41:23 wazuh-modulesd[25570] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:41:44.356459 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[JAMMY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 8.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:41:36 wazuh-modulesd[25712] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:41:36 wazuh-modulesd[25712] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:41:36 wazuh-modulesd[25712] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:41:36 wazuh-modulesd[25712] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:41:36 wazuh-modulesd[25712] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:42:00.705145 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 13.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:41:47 wazuh-modulesd[25853] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:41:47 wazuh-modulesd[25853] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:41:47 wazuh-modulesd[25853] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:41:47 wazuh-modulesd[25853] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:41:47 wazuh-modulesd[25853] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:42:16.054930 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 12.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:42:03 wazuh-modulesd[26011] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:42:03 wazuh-modulesd[26011] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:42:03 wazuh-modulesd[26011] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:42:03 wazuh-modulesd[26011] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:42:03 wazuh-modulesd[26011] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:42:23.756818 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 4.38 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:42:19 wazuh-modulesd[26169] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:42:19 wazuh-modulesd[26169] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:42:19 wazuh-modulesd[26169] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:42:19 wazuh-modulesd[26169] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:42:19 wazuh-modulesd[26169] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 21:42:19 wazuh-modulesd[26169] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 00:42:29.324754 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.38 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:42:26 wazuh-modulesd[26290] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:42:26 wazuh-modulesd[26290] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:42:26 wazuh-modulesd[26290] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:42:26 wazuh-modulesd[26290] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:42:26 wazuh-modulesd[26290] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:42:34.931206 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:42:32 wazuh-modulesd[26408] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:42:32 wazuh-modulesd[26408] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:42:32 wazuh-modulesd[26408] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:42:32 wazuh-modulesd[26408] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:42:32 wazuh-modulesd[26408] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:42:40.532219 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2022] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.38 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:42:38 wazuh-modulesd[26522] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:42:38 wazuh-modulesd[26522] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:42:38 wazuh-modulesd[26522] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:42:38 wazuh-modulesd[26522] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:42:38 wazuh-modulesd[26522] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 00:47:39.911662 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 296.19 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:42:43 wazuh-modulesd[26640] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:42:43 wazuh-modulesd[26640] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:42:43 wazuh-modulesd[26640] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:42:43 wazuh-modulesd[26640] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:42:43 wazuh-modulesd[26640] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 21:42:43 wazuh-modulesd[26640] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 00:47:50.956235 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 21:47:45 wazuh-modulesd[27955] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 21:47:45 wazuh-modulesd[27955] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 21:47:45 wazuh-modulesd[27955] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 21:47:45 wazuh-modulesd[27955] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 21:47:45 wazuh-modulesd[27955] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 21:47:45 wazuh-modulesd[27955] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 01:07:43.122039 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 95.64 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:06:07 wazuh-modulesd[28362] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:06:07 wazuh-modulesd[28362] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:06:07 wazuh-modulesd[28362] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:06:07 wazuh-modulesd[28362] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:06:07 wazuh-modulesd[28362] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:20:02.383799 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[AlmaLinux 8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 7.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:19:55 wazuh-modulesd[28628] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:19:55 wazuh-modulesd[28628] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:19:55 wazuh-modulesd[28628] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:19:55 wazuh-modulesd[28628] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:19:55 wazuh-modulesd[28628] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:20:10.679571 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[AlmaLinux 9] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.04 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:20:05 wazuh-modulesd[28721] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:20:05 wazuh-modulesd[28721] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:20:05 wazuh-modulesd[28721] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:20:05 wazuh-modulesd[28721] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:20:05 wazuh-modulesd[28721] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (9) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:20:27.201874 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.35 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:20:13 wazuh-modulesd[28814] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:20:13 wazuh-modulesd[28814] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:20:13 wazuh-modulesd[28814] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:20:13 wazuh-modulesd[28814] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:20:13 wazuh-modulesd[28814] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 22:20:13 wazuh-modulesd[28814] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-07-29 01:20:42.709091 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:20:30 wazuh-modulesd[28923] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:20:30 wazuh-modulesd[28923] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:20:30 wazuh-modulesd[28923] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:20:30 wazuh-modulesd[28923] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:20:30 wazuh-modulesd[28923] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:20:57.913163 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Trusty] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:20:45 wazuh-modulesd[29030] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:20:45 wazuh-modulesd[29030] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:20:45 wazuh-modulesd[29030] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:20:45 wazuh-modulesd[29030] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:20:45 wazuh-modulesd[29030] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:21:14.103069 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Xenial] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:21:01 wazuh-modulesd[29137] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:21:01 wazuh-modulesd[29137] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:21:01 wazuh-modulesd[29137] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:21:01 wazuh-modulesd[29137] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:21:01 wazuh-modulesd[29137] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:21:29.332144 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Bionic] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.04 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:21:17 wazuh-modulesd[29244] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:21:17 wazuh-modulesd[29244] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:21:17 wazuh-modulesd[29244] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:21:17 wazuh-modulesd[29244] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:21:17 wazuh-modulesd[29244] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:21:45.534284 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Focal] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:21:32 wazuh-modulesd[29352] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:21:32 wazuh-modulesd[29352] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:21:32 wazuh-modulesd[29352] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:21:32 wazuh-modulesd[29352] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:21:32 wazuh-modulesd[29352] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:22:01.028515 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Jammy] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.35 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:21:48 wazuh-modulesd[29470] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:21:48 wazuh-modulesd[29470] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:21:48 wazuh-modulesd[29470] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:21:48 wazuh-modulesd[29470] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:21:48 wazuh-modulesd[29470] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:22:16.452589 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.26 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:22:04 wazuh-modulesd[29612] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:22:04 wazuh-modulesd[29612] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:22:04 wazuh-modulesd[29612] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:22:04 wazuh-modulesd[29612] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:22:04 wazuh-modulesd[29612] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:22:31.957147 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:22:19 wazuh-modulesd[29719] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:22:19 wazuh-modulesd[29719] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:22:19 wazuh-modulesd[29719] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:22:19 wazuh-modulesd[29719] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:22:19 wazuh-modulesd[29719] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 22:22:19 wazuh-modulesd[29719] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 01:22:47.460145 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:22:35 wazuh-modulesd[29826] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:22:35 wazuh-modulesd[29826] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:22:35 wazuh-modulesd[29826] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:22:35 wazuh-modulesd[29826] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:22:35 wazuh-modulesd[29826] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 22:22:35 wazuh-modulesd[29826] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 01:23:02.967656 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:22:50 wazuh-modulesd[29935] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:22:50 wazuh-modulesd[29935] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:22:50 wazuh-modulesd[29935] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:22:50 wazuh-modulesd[29935] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:22:50 wazuh-modulesd[29935] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:23:19.173740 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[AlmaLinux] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:06 wazuh-modulesd[30042] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:06 wazuh-modulesd[30042] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:06 wazuh-modulesd[30042] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:06 wazuh-modulesd[30042] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:06 wazuh-modulesd[30042] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 01:23:25.723032 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.39 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:22 wazuh-modulesd[30159] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:22 wazuh-modulesd[30159] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:22 wazuh-modulesd[30159] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:22 wazuh-modulesd[30159] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:22 wazuh-modulesd[30159] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2023/07/28 22:23:22 wazuh-modulesd[30159] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2023-07-29 01:23:31.931429 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:28 wazuh-modulesd[30254] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:28 wazuh-modulesd[30254] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:28 wazuh-modulesd[30254] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:28 wazuh-modulesd[30254] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:28 wazuh-modulesd[30254] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-29 01:23:39.139514 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:35 wazuh-modulesd[30347] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:35 wazuh-modulesd[30347] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:35 wazuh-modulesd[30347] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:35 wazuh-modulesd[30347] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:35 wazuh-modulesd[30347] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2023-07-29 01:23:45.347553 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:42 wazuh-modulesd[30440] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:42 wazuh-modulesd[30440] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:42 wazuh-modulesd[30440] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:42 wazuh-modulesd[30440] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:42 wazuh-modulesd[30440] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2023-07-29 01:23:52.558478 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:48 wazuh-modulesd[30533] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:48 wazuh-modulesd[30533] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:48 wazuh-modulesd[30533] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:48 wazuh-modulesd[30533] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:48 wazuh-modulesd[30533] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 01:23:58.766410 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:23:55 wazuh-modulesd[30626] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:23:55 wazuh-modulesd[30626] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:23:55 wazuh-modulesd[30626] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:23:55 wazuh-modulesd[30626] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:23:55 wazuh-modulesd[30626] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 01:24:08.134752 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:24:05 wazuh-modulesd[30795] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:24:05 wazuh-modulesd[30795] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:24:05 wazuh-modulesd[30795] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:24:05 wazuh-modulesd[30795] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:24:05 wazuh-modulesd[30795] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-29 01:24:14.342466 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[AlmaLinux - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:24:11 wazuh-modulesd[30888] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:24:11 wazuh-modulesd[30888] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:24:11 wazuh-modulesd[30888] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:24:11 wazuh-modulesd[30888] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:24:11 wazuh-modulesd[30888] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-29 01:24:28.109194 test_vulnerability_detector/test_feeds/test_msu_inventory.py::test_msu_catalog_patches[check_patches_with_no_cve_present] description: Check that patch information is added to the feed from the catalog for patches not directly related. to a Vulnerability. 10.61 2
-----------------------------Captured stderr setup------------------------------
2023/07/28 22:24:17 wazuh-modulesd[30981] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 22:24:17 wazuh-modulesd[30981] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 22:24:17 wazuh-modulesd[30981] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 22:24:17 wazuh-modulesd[30981] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 22:24:17 wazuh-modulesd[30981] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 22:24:17 wazuh-modulesd[30981] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 01:24:31.333197 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.00 2
No log output captured.
Passed 2023-07-29 01:24:32.048532 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.30 2
No log output captured.
Passed 2023-07-29 01:24:33.728291 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.00 2
No log output captured.
Passed 2023-07-29 01:24:33.874209 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.01 2
No log output captured.
Passed 2023-07-29 01:24:34.728321 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.33 2
No log output captured.
Passed 2023-07-29 01:24:36.697333 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2002] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.20 2
No log output captured.
Passed 2023-07-29 01:24:38.090048 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2003] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.05 2
No log output captured.
Passed 2023-07-29 01:24:39.620703 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2004] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.08 2
No log output captured.
Passed 2023-07-29 01:24:41.468572 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2005] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.18 2
No log output captured.
Passed 2023-07-29 01:24:43.551743 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2006] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.27 2
No log output captured.
Passed 2023-07-29 01:24:45.653274 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2007] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.28 2
No log output captured.
Passed 2023-07-29 01:24:47.823503 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2008] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.32 2
No log output captured.
Passed 2023-07-29 01:24:49.827127 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2009] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.27 2
No log output captured.
Passed 2023-07-29 01:24:51.947212 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2010] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.38 2
No log output captured.
Passed 2023-07-29 01:24:53.936096 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2011] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.31 2
No log output captured.
Passed 2023-07-29 01:24:56.075295 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2012] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.34 2
No log output captured.
Passed 2023-07-29 01:24:58.384158 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2013] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.45 2
No log output captured.
Passed 2023-07-29 01:25:00.661745 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2014] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.43 2
No log output captured.
Passed 2023-07-29 01:25:02.968305 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2015] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.42 2
No log output captured.
Passed 2023-07-29 01:25:05.415515 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2016] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.59 2
No log output captured.
Passed 2023-07-29 01:25:08.558285 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2017] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.86 2
No log output captured.
Passed 2023-07-29 01:25:11.595182 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2018] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.92 2
No log output captured.
Passed 2023-07-29 01:25:14.754286 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2019] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.01 2
No log output captured.
Passed 2023-07-29 01:25:18.495649 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2020] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.36 2
No log output captured.
Passed 2023-07-29 01:25:22.598155 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2021] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.65 2
No log output captured.
Passed 2023-07-29 01:25:26.482536 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2022] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.47 2
No log output captured.
Passed 2023-07-29 01:25:29.093469 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2023] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.74 2
No log output captured.
Passed 2023-07-29 01:25:29.589437 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.17 2
No log output captured.
Passed 2023-07-29 01:25:31.995921 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.37 2
No log output captured.
Passed 2023-07-29 01:25:34.589621 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.45 2
No log output captured.
Passed 2023-07-29 01:25:36.947737 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.33 2
No log output captured.
Passed 2023-07-29 01:25:41.144794 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Jammy] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.69 2
No log output captured.
Passed 2023-07-29 01:25:48.035890 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.09 2
No log output captured.
Passed 2023-07-29 01:25:51.335933 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.07 2
No log output captured.
Passed 2023-07-29 01:27:15.872252 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.21 2
No log output captured.
Passed 2023-07-29 01:33:01.974892 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.89 2
No log output captured.
Passed 2023-07-29 01:53:10.579823 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.63 2
No log output captured.
Passed 2023-07-29 02:00:23.177054 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.14 2
No log output captured.
Passed 2023-07-29 02:16:58.773918 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.34 2
No log output captured.
Passed 2023-07-29 02:46:13.002070 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.47 2
No log output captured.
Passed 2023-07-29 02:46:15.693192 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[AlmaLinux 8] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.24 2
No log output captured.
Passed 2023-07-29 02:46:16.041156 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[AlmaLinux 9] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.04 2
No log output captured.
Passed 2023-07-29 02:46:26.083150 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.02 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:16 wazuh-modulesd[31388] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:16 wazuh-modulesd[31388] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:16 wazuh-modulesd[31388] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:16 wazuh-modulesd[31388] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:46:26,081 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2023-07-28 23:46:26,081 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:46:26,081 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:46:26.637253 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:26 wazuh-modulesd[31415] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:26 wazuh-modulesd[31415] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:26 wazuh-modulesd[31415] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:26 wazuh-modulesd[31415] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-29 02:46:28.252932 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:27 wazuh-modulesd[31472] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:27 wazuh-modulesd[31472] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:27 wazuh-modulesd[31472] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:27 wazuh-modulesd[31472] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-29 02:46:29.334438 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:28 wazuh-modulesd[31500] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:28 wazuh-modulesd[31500] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:28 wazuh-modulesd[31500] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:28 wazuh-modulesd[31500] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-29 02:46:29.889156 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:29 wazuh-modulesd[31528] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:29 wazuh-modulesd[31528] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:29 wazuh-modulesd[31528] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:29 wazuh-modulesd[31528] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-29 02:46:30.945157 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:29 wazuh-modulesd[31556] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:29 wazuh-modulesd[31556] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:29 wazuh-modulesd[31556] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:29 wazuh-modulesd[31556] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-29 02:47:01.193931 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 20.91 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:46:40 wazuh-modulesd[31660] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:46:40 wazuh-modulesd[31660] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:46:40 wazuh-modulesd[31660] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:46:40 wazuh-modulesd[31660] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:46:40 wazuh-modulesd[31660] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:46:40 wazuh-modulesd[31660] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 23:46:40 wazuh-modulesd[31660] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:47:15.594595 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 6.05 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:47:09 wazuh-modulesd[31768] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:47:09 wazuh-modulesd[31768] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:47:09 wazuh-modulesd[31768] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:47:09 wazuh-modulesd[31768] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:47:09 wazuh-modulesd[31768] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:47:09 wazuh-modulesd[31768] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 23:47:09 wazuh-modulesd[31768] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:47:44.993724 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 21.06 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:47:23 wazuh-modulesd[31870] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:47:23 wazuh-modulesd[31870] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:47:23 wazuh-modulesd[31870] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:47:23 wazuh-modulesd[31870] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:47:23 wazuh-modulesd[31870] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:47:23 wazuh-modulesd[31870] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 23:47:23 wazuh-modulesd[31870] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:47:49.238682 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:47:48 wazuh-modulesd[31947] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:47:48 wazuh-modulesd[31947] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:47:48 wazuh-modulesd[31947] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:47:48 wazuh-modulesd[31947] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:47:48 wazuh-modulesd[31947] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:48:02.472051 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 10.02 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:47:52 wazuh-modulesd[32023] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:47:52 wazuh-modulesd[32023] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:47:52 wazuh-modulesd[32023] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:47:52 wazuh-modulesd[32023] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:47:52 wazuh-modulesd[32023] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-28 23:48:02,462 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2023-07-28 23:48:02,462 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:48:02,462 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:48:05.593116 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:04 wazuh-modulesd[32069] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:04 wazuh-modulesd[32069] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:04 wazuh-modulesd[32069] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:04 wazuh-modulesd[32069] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:04 wazuh-modulesd[32069] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:06.635872 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:05 wazuh-modulesd[32098] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:05 wazuh-modulesd[32098] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:05 wazuh-modulesd[32098] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:05 wazuh-modulesd[32098] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:05 wazuh-modulesd[32098] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:07.178389 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2022] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.50 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:06 wazuh-modulesd[32127] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:06 wazuh-modulesd[32127] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:06 wazuh-modulesd[32127] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:06 wazuh-modulesd[32127] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:06 wazuh-modulesd[32127] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:08.221413 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:07 wazuh-modulesd[32156] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:07 wazuh-modulesd[32156] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:07 wazuh-modulesd[32156] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:07 wazuh-modulesd[32156] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:07 wazuh-modulesd[32156] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:09.277046 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:08 wazuh-modulesd[32184] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:08 wazuh-modulesd[32184] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:08 wazuh-modulesd[32184] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:08 wazuh-modulesd[32184] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:08 wazuh-modulesd[32184] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:10.331922 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:09 wazuh-modulesd[32212] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:09 wazuh-modulesd[32212] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:09 wazuh-modulesd[32212] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:09 wazuh-modulesd[32212] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:09 wazuh-modulesd[32212] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:11.387850 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:10 wazuh-modulesd[32240] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:10 wazuh-modulesd[32240] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:10 wazuh-modulesd[32240] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:10 wazuh-modulesd[32240] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:10 wazuh-modulesd[32240] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:12.443845 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Jammy] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:11 wazuh-modulesd[32268] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:11 wazuh-modulesd[32268] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:11 wazuh-modulesd[32268] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:11 wazuh-modulesd[32268] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:11 wazuh-modulesd[32268] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:13.498992 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:12 wazuh-modulesd[32296] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:12 wazuh-modulesd[32296] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:12 wazuh-modulesd[32296] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:12 wazuh-modulesd[32296] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:12 wazuh-modulesd[32296] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:14.554401 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:13 wazuh-modulesd[32324] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:13 wazuh-modulesd[32324] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:13 wazuh-modulesd[32324] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:13 wazuh-modulesd[32324] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:13 wazuh-modulesd[32324] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:15.631214 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:14 wazuh-modulesd[32352] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:14 wazuh-modulesd[32352] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:14 wazuh-modulesd[32352] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:14 wazuh-modulesd[32352] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:14 wazuh-modulesd[32352] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:16.681928 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:15 wazuh-modulesd[32380] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:15 wazuh-modulesd[32380] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:15 wazuh-modulesd[32380] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:15 wazuh-modulesd[32380] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:15 wazuh-modulesd[32380] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:17.726531 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:16 wazuh-modulesd[32408] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:16 wazuh-modulesd[32408] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:16 wazuh-modulesd[32408] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:16 wazuh-modulesd[32408] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:16 wazuh-modulesd[32408] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:18.781204 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:17 wazuh-modulesd[32436] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:17 wazuh-modulesd[32436] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:17 wazuh-modulesd[32436] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:17 wazuh-modulesd[32436] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:17 wazuh-modulesd[32436] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:19.835762 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:18 wazuh-modulesd[32464] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:18 wazuh-modulesd[32464] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:18 wazuh-modulesd[32464] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:18 wazuh-modulesd[32464] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:18 wazuh-modulesd[32464] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 23:48:18 wazuh-modulesd[32464] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 02:48:20.890556 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:19 wazuh-modulesd[32492] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:19 wazuh-modulesd[32492] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:19 wazuh-modulesd[32492] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:19 wazuh-modulesd[32492] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:19 wazuh-modulesd[32492] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 23:48:19 wazuh-modulesd[32492] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-07-29 02:48:21.445062 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.50 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:20 wazuh-modulesd[32521] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:20 wazuh-modulesd[32521] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:20 wazuh-modulesd[32521] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:20 wazuh-modulesd[32521] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:20 wazuh-modulesd[32521] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 23:48:20 wazuh-modulesd[32521] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 02:48:22.516717 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:21 wazuh-modulesd[32550] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:21 wazuh-modulesd[32550] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:21 wazuh-modulesd[32550] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:21 wazuh-modulesd[32550] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:21 wazuh-modulesd[32550] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:23.571256 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:22 wazuh-modulesd[32578] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:22 wazuh-modulesd[32578] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:22 wazuh-modulesd[32578] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:22 wazuh-modulesd[32578] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:22 wazuh-modulesd[32578] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:24.626357 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:23 wazuh-modulesd[32606] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:23 wazuh-modulesd[32606] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:23 wazuh-modulesd[32606] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:23 wazuh-modulesd[32606] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:23 wazuh-modulesd[32606] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:25.681147 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:24 wazuh-modulesd[32634] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:24 wazuh-modulesd[32634] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:24 wazuh-modulesd[32634] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:24 wazuh-modulesd[32634] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:24 wazuh-modulesd[32634] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:26.736432 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:25 wazuh-modulesd[32662] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:25 wazuh-modulesd[32662] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:25 wazuh-modulesd[32662] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:25 wazuh-modulesd[32662] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:25 wazuh-modulesd[32662] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:27.791749 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:26 wazuh-modulesd[32690] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:26 wazuh-modulesd[32690] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:26 wazuh-modulesd[32690] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:26 wazuh-modulesd[32690] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:26 wazuh-modulesd[32690] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:28.846058 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[ALMALINUX 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:27 wazuh-modulesd[32718] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:27 wazuh-modulesd[32718] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:27 wazuh-modulesd[32718] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:27 wazuh-modulesd[32718] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:27 wazuh-modulesd[32718] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:29.899584 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[ALMALINUX 9] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:28 wazuh-modulesd[32746] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:28 wazuh-modulesd[32746] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:28 wazuh-modulesd[32746] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:28 wazuh-modulesd[32746] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:48:28 wazuh-modulesd[32746] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (9) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:48:34.959462 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:29 wazuh-modulesd[32774] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:29 wazuh-modulesd[32774] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:29 wazuh-modulesd[32774] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:29 wazuh-modulesd[32774] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:48:34,957 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2023-07-28 23:48:34,957 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:48:34,957 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Amazon Linux 1 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:48:40.020292 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:35 wazuh-modulesd[32801] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:35 wazuh-modulesd[32801] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:35 wazuh-modulesd[32801] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:35 wazuh-modulesd[32801] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:48:40,018 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2023-07-28 23:48:40,018 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:48:40,018 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Amazon Linux 2 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:48:45.092299 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2022] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:40 wazuh-modulesd[32828] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:40 wazuh-modulesd[32828] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:40 wazuh-modulesd[32828] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:40 wazuh-modulesd[32828] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:48:45,089 - wazuh_testing - ERROR - Could not find Amazon Linux 2022 update starting log 2023-07-28 23:48:45,090 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:48:45,090 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Amazon Linux 2022 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:48:50.163972 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:45 wazuh-modulesd[32855] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:45 wazuh-modulesd[32855] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:45 wazuh-modulesd[32855] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:45 wazuh-modulesd[32855] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:48:50,161 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2023-07-28 23:48:50,161 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:48:50,162 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Focal update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:48:55.224932 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:50 wazuh-modulesd[32882] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:50 wazuh-modulesd[32882] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:50 wazuh-modulesd[32882] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:50 wazuh-modulesd[32882] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:48:55,222 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2023-07-28 23:48:55,222 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:48:55,222 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Bionic update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:00.296087 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:48:55 wazuh-modulesd[32909] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:48:55 wazuh-modulesd[32909] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:48:55 wazuh-modulesd[32909] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:48:55 wazuh-modulesd[32909] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:00,293 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2023-07-28 23:49:00,293 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:00,293 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Xenial update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:05.367303 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:00 wazuh-modulesd[32936] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:00 wazuh-modulesd[32936] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:00 wazuh-modulesd[32936] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:00 wazuh-modulesd[32936] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:05,364 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2023-07-28 23:49:05,365 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:05,365 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Trusty update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:10.425925 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Jammy] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:05 wazuh-modulesd[32963] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:05 wazuh-modulesd[32963] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:05 wazuh-modulesd[32963] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:05 wazuh-modulesd[32963] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:10,423 - wazuh_testing - ERROR - Could not find Ubuntu Jammy update starting log 2023-07-28 23:49:10,423 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:10,423 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Jammy update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:15.484017 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:10 wazuh-modulesd[32990] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:10 wazuh-modulesd[32990] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:10 wazuh-modulesd[32990] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:10 wazuh-modulesd[32990] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:15,481 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2023-07-28 23:49:15,481 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:15,481 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 8 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:20.555521 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:15 wazuh-modulesd[33017] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:15 wazuh-modulesd[33017] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:15 wazuh-modulesd[33017] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:15 wazuh-modulesd[33017] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:20,552 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2023-07-28 23:49:20,552 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:20,553 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 7 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:25.626484 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:20 wazuh-modulesd[33044] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:20 wazuh-modulesd[33044] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:20 wazuh-modulesd[33044] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:20 wazuh-modulesd[33044] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:25,623 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2023-07-28 23:49:25,624 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:25,624 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 6 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:30.698626 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:25 wazuh-modulesd[33071] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:25 wazuh-modulesd[33071] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:25 wazuh-modulesd[33071] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:25 wazuh-modulesd[33071] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:30,695 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2023-07-28 23:49:30,695 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:30,695 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 5 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:35.759252 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:30 wazuh-modulesd[33098] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:30 wazuh-modulesd[33098] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:30 wazuh-modulesd[33098] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:30 wazuh-modulesd[33098] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:35,756 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2023-07-28 23:49:35,756 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:35,756 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Debian Bullseye update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:40.830696 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:35 wazuh-modulesd[33125] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:35 wazuh-modulesd[33125] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:35 wazuh-modulesd[33125] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:35 wazuh-modulesd[33125] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:40,829 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2023-07-28 23:49:40,829 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:40,829 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Debian Buster update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:45.902368 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:40 wazuh-modulesd[33152] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:40 wazuh-modulesd[33152] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:40 wazuh-modulesd[33152] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:40 wazuh-modulesd[33152] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:45,899 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2023-07-28 23:49:45,899 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:45,899 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Arch Linux update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:51.475284 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.52 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:45 wazuh-modulesd[33179] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:45 wazuh-modulesd[33179] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:45 wazuh-modulesd[33179] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:45 wazuh-modulesd[33179] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:50,973 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2023-07-28 23:49:50,973 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:50,973 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find National Vulnerability Database update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:49:56.536722 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:51 wazuh-modulesd[33206] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:51 wazuh-modulesd[33206] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:51 wazuh-modulesd[33206] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:51 wazuh-modulesd[33206] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:49:56,534 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2023-07-28 23:49:56,534 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:49:56,534 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Microsoft Security Update update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:01.597276 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:49:56 wazuh-modulesd[33233] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:49:56 wazuh-modulesd[33233] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:49:56 wazuh-modulesd[33233] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:49:56 wazuh-modulesd[33233] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:01,595 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2023-07-28 23:50:01,595 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:01,595 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:06.668769 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:01 wazuh-modulesd[33260] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:01 wazuh-modulesd[33260] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:01 wazuh-modulesd[33260] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:01 wazuh-modulesd[33260] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:06,666 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2023-07-28 23:50:06,666 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:06,666 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:12.241039 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.52 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:06 wazuh-modulesd[33287] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:06 wazuh-modulesd[33287] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:06 wazuh-modulesd[33287] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:06 wazuh-modulesd[33287] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:11,739 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2023-07-28 23:50:11,739 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:11,739 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:17.301718 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:12 wazuh-modulesd[33314] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:12 wazuh-modulesd[33314] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:12 wazuh-modulesd[33314] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:12 wazuh-modulesd[33314] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:17,299 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2023-07-28 23:50:17,299 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:17,299 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:22.349122 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:17 wazuh-modulesd[33341] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:17 wazuh-modulesd[33341] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:17 wazuh-modulesd[33341] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:17 wazuh-modulesd[33341] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:22,346 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2023-07-28 23:50:22,346 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:22,346 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:27.409173 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:22 wazuh-modulesd[33368] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:22 wazuh-modulesd[33368] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:22 wazuh-modulesd[33368] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:22 wazuh-modulesd[33368] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:27,406 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2023-07-28 23:50:27,406 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:27,406 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:32.469658 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[ALMALINUX 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:27 wazuh-modulesd[33395] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:27 wazuh-modulesd[33395] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:27 wazuh-modulesd[33395] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:27 wazuh-modulesd[33395] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:32,467 - wazuh_testing - ERROR - Could not find AlmaLinux 8 update starting log 2023-07-28 23:50:32,467 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:32,467 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find AlmaLinux 8 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:37.529695 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[ALMALINUX 9] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:50:32 wazuh-modulesd[33422] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:50:32 wazuh-modulesd[33422] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:50:32 wazuh-modulesd[33422] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:50:32 wazuh-modulesd[33422] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-28 23:50:37,527 - wazuh_testing - ERROR - Could not find AlmaLinux 9 update starting log 2023-07-28 23:50:37,527 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-28 23:50:37,527 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find AlmaLinux 9 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 02:50:42.467686 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 3.59 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-29 02:50:45.685104 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.06 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-29 02:50:49.838362 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.06 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-29 02:51:04.171660 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 11.24 server 0
No log output captured.
Passed 2023-07-29 02:51:22.751725 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 13.97 server 0
No log output captured.
Passed 2023-07-29 02:51:39.666682 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 13.97 server 0
No log output captured.
Passed 2023-07-29 02:51:57.031415 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 13.95 server 0
No log output captured.
Passed 2023-07-29 02:52:02.799350 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 2.76 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-29 02:52:06.000013 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[ALMALINUX] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.05 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-29 02:52:26.971547 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.98 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:21 wazuh-modulesd[37731] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:21 wazuh-modulesd[37731] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:21 wazuh-modulesd[37731] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:21 wazuh-modulesd[37731] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:21 wazuh-modulesd[37731] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:52:21 wazuh-modulesd[37731] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-07-29 02:52:34.512070 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.38 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:30 wazuh-modulesd[38127] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:30 wazuh-modulesd[38127] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:30 wazuh-modulesd[38127] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:30 wazuh-modulesd[38127] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:30 wazuh-modulesd[38127] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:52:41.754859 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[ALMALINUX] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.08 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:37 wazuh-modulesd[38484] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:37 wazuh-modulesd[38484] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:37 wazuh-modulesd[38484] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:37 wazuh-modulesd[38484] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:37 wazuh-modulesd[38484] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:52:45.413314 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:44 wazuh-modulesd[38829] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:44 wazuh-modulesd[38829] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:44 wazuh-modulesd[38829] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:44 wazuh-modulesd[38829] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:44 wazuh-modulesd[38829] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:52:48.927633 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:48 wazuh-modulesd[39023] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:48 wazuh-modulesd[39023] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:48 wazuh-modulesd[39023] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:48 wazuh-modulesd[39023] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:48 wazuh-modulesd[39023] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:52:52.945808 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2022] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:51 wazuh-modulesd[39217] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:51 wazuh-modulesd[39217] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:51 wazuh-modulesd[39217] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:51 wazuh-modulesd[39217] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:51 wazuh-modulesd[39217] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:52:57.154245 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:52:56 wazuh-modulesd[39423] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:52:56 wazuh-modulesd[39423] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:52:56 wazuh-modulesd[39423] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:52:56 wazuh-modulesd[39423] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:52:56 wazuh-modulesd[39423] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:00.856713 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:00 wazuh-modulesd[39632] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:00 wazuh-modulesd[39632] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:00 wazuh-modulesd[39632] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:00 wazuh-modulesd[39632] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:00 wazuh-modulesd[39632] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:04.858302 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:03 wazuh-modulesd[39709] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:03 wazuh-modulesd[39709] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:03 wazuh-modulesd[39709] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:03 wazuh-modulesd[39709] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:03 wazuh-modulesd[39709] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:08.529082 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:08 wazuh-modulesd[39786] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:08 wazuh-modulesd[39786] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:08 wazuh-modulesd[39786] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:08 wazuh-modulesd[39786] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:08 wazuh-modulesd[39786] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:12.039246 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Jammy] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:11 wazuh-modulesd[39863] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:11 wazuh-modulesd[39863] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:11 wazuh-modulesd[39863] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:11 wazuh-modulesd[39863] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:11 wazuh-modulesd[39863] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:15.554499 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:15 wazuh-modulesd[39940] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:15 wazuh-modulesd[39940] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:15 wazuh-modulesd[39940] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:15 wazuh-modulesd[39940] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:15 wazuh-modulesd[39940] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:19.564206 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:18 wazuh-modulesd[40017] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:18 wazuh-modulesd[40017] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:18 wazuh-modulesd[40017] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:18 wazuh-modulesd[40017] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:18 wazuh-modulesd[40017] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:23.775676 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:22 wazuh-modulesd[40094] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:22 wazuh-modulesd[40094] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:22 wazuh-modulesd[40094] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:22 wazuh-modulesd[40094] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:22 wazuh-modulesd[40094] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:27.460072 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:26 wazuh-modulesd[40171] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:26 wazuh-modulesd[40171] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:26 wazuh-modulesd[40171] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:26 wazuh-modulesd[40171] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:26 wazuh-modulesd[40171] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:31.472595 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:30 wazuh-modulesd[40248] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:30 wazuh-modulesd[40248] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:30 wazuh-modulesd[40248] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:30 wazuh-modulesd[40248] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:30 wazuh-modulesd[40248] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:35.188116 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:34 wazuh-modulesd[40325] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:34 wazuh-modulesd[40325] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:34 wazuh-modulesd[40325] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:34 wazuh-modulesd[40325] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:34 wazuh-modulesd[40325] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:38.690642 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:38 wazuh-modulesd[40402] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:38 wazuh-modulesd[40402] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:38 wazuh-modulesd[40402] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:38 wazuh-modulesd[40402] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:38 wazuh-modulesd[40402] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 23:53:38 wazuh-modulesd[40402] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 02:53:42.701170 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:41 wazuh-modulesd[40479] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:41 wazuh-modulesd[40479] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:41 wazuh-modulesd[40479] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:41 wazuh-modulesd[40479] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:41 wazuh-modulesd[40479] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 23:53:41 wazuh-modulesd[40479] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-07-29 02:53:46.915922 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:45 wazuh-modulesd[40558] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:45 wazuh-modulesd[40558] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:45 wazuh-modulesd[40558] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:45 wazuh-modulesd[40558] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:45 wazuh-modulesd[40558] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 23:53:45 wazuh-modulesd[40558] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 02:53:51.098750 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:50 wazuh-modulesd[40637] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:50 wazuh-modulesd[40637] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:50 wazuh-modulesd[40637] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:50 wazuh-modulesd[40637] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:50 wazuh-modulesd[40637] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:55.293875 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:54 wazuh-modulesd[40714] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:54 wazuh-modulesd[40714] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:54 wazuh-modulesd[40714] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:54 wazuh-modulesd[40714] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:54 wazuh-modulesd[40714] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:53:59.490739 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:53:58 wazuh-modulesd[40791] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:53:58 wazuh-modulesd[40791] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:53:58 wazuh-modulesd[40791] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:53:58 wazuh-modulesd[40791] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:53:58 wazuh-modulesd[40791] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:03.685284 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:02 wazuh-modulesd[40868] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:02 wazuh-modulesd[40868] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:02 wazuh-modulesd[40868] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:02 wazuh-modulesd[40868] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:02 wazuh-modulesd[40868] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:07.855517 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:06 wazuh-modulesd[40945] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:06 wazuh-modulesd[40945] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:06 wazuh-modulesd[40945] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:06 wazuh-modulesd[40945] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:06 wazuh-modulesd[40945] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:11.549436 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:11 wazuh-modulesd[41022] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:11 wazuh-modulesd[41022] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:11 wazuh-modulesd[41022] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:11 wazuh-modulesd[41022] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:11 wazuh-modulesd[41022] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:15.559767 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[ALMALINUX 8] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:14 wazuh-modulesd[41099] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:14 wazuh-modulesd[41099] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:14 wazuh-modulesd[41099] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:14 wazuh-modulesd[41099] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:14 wazuh-modulesd[41099] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:19.268415 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[ALMALINUX 9] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:18 wazuh-modulesd[41176] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:18 wazuh-modulesd[41176] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:18 wazuh-modulesd[41176] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:18 wazuh-modulesd[41176] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:18 wazuh-modulesd[41176] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (9) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:22.777895 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[RedHat] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:22 wazuh-modulesd[41253] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:22 wazuh-modulesd[41253] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:22 wazuh-modulesd[41253] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:22 wazuh-modulesd[41253] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:22 wazuh-modulesd[41253] wmodules-vuln-detector.c:1015 at wm_vuldet_read_provider_content(): INFO: 'update_from_year' option at module 'vulnerability-detector' is deprecated. Use 'os' instead. 2023/07/28 23:54:22 wazuh-modulesd[41253] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:26.127625 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:25 wazuh-modulesd[41330] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:25 wazuh-modulesd[41330] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:25 wazuh-modulesd[41330] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:25 wazuh-modulesd[41330] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:25 wazuh-modulesd[41330] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2023/07/28 23:54:25 wazuh-modulesd[41330] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:30.695343 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:30 wazuh-modulesd[41419] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:30 wazuh-modulesd[41419] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:30 wazuh-modulesd[41419] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:30 wazuh-modulesd[41419] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:30 wazuh-modulesd[41419] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2023/07/28 23:54:30 wazuh-modulesd[41419] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:34.706420 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:33 wazuh-modulesd[41496] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:33 wazuh-modulesd[41496] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:33 wazuh-modulesd[41496] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:33 wazuh-modulesd[41496] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:33 wazuh-modulesd[41496] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 23:54:33 wazuh-modulesd[41496] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-07-29 02:54:38.416202 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:37 wazuh-modulesd[41574] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:37 wazuh-modulesd[41574] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:37 wazuh-modulesd[41574] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:37 wazuh-modulesd[41574] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:37 wazuh-modulesd[41574] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/28 23:54:37 wazuh-modulesd[41574] wmodules-vuln-detector.c:1018 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2023/07/28 23:54:37 wazuh-modulesd[41574] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 02:54:41.926931 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:41 wazuh-modulesd[41652] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:41 wazuh-modulesd[41652] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:41 wazuh-modulesd[41652] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:41 wazuh-modulesd[41652] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:41 wazuh-modulesd[41652] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2023/07/28 23:54:41 wazuh-modulesd[41652] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:45.426821 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[ALMALINUX] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:44 wazuh-modulesd[41729] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:44 wazuh-modulesd[41729] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:44 wazuh-modulesd[41729] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:44 wazuh-modulesd[41729] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:44 wazuh-modulesd[41729] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'almalinux' provider at 'vulnerability-detector' 2023/07/28 23:54:44 wazuh-modulesd[41729] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:54:54.469193 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon Linux 2022] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:48 wazuh-modulesd[41806] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:48 wazuh-modulesd[41806] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:48 wazuh-modulesd[41806] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:48 wazuh-modulesd[41806] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:48 wazuh-modulesd[41806] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:55:03.689906 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:54:57 wazuh-modulesd[41884] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:54:57 wazuh-modulesd[41884] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:54:57 wazuh-modulesd[41884] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:54:57 wazuh-modulesd[41884] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:54:57 wazuh-modulesd[41884] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:55:12.868045 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Ubuntu Jammy] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:55:06 wazuh-modulesd[41961] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:55:06 wazuh-modulesd[41961] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:55:06 wazuh-modulesd[41961] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:55:06 wazuh-modulesd[41961] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:55:06 wazuh-modulesd[41961] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:55:22.046199 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:55:16 wazuh-modulesd[42038] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:55:16 wazuh-modulesd[42038] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:55:16 wazuh-modulesd[42038] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:55:16 wazuh-modulesd[42038] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:55:16 wazuh-modulesd[42038] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:55:31.264377 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:55:25 wazuh-modulesd[42115] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:55:25 wazuh-modulesd[42115] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:55:25 wazuh-modulesd[42115] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:55:25 wazuh-modulesd[42115] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:55:25 wazuh-modulesd[42115] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/28 23:55:25 wazuh-modulesd[42115] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:55:39.982346 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:55:34 wazuh-modulesd[42193] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:55:34 wazuh-modulesd[42193] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:55:34 wazuh-modulesd[42193] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:55:34 wazuh-modulesd[42193] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:55:34 wazuh-modulesd[42193] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/28 23:55:34 wazuh-modulesd[42193] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-29 02:55:48.999708 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:55:42 wazuh-modulesd[42271] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:55:42 wazuh-modulesd[42271] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:55:42 wazuh-modulesd[42271] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:55:42 wazuh-modulesd[42271] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:55:42 wazuh-modulesd[42271] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:55:57.665925 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[ALMALINUX] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:55:52 wazuh-modulesd[42348] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:55:52 wazuh-modulesd[42348] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:55:52 wazuh-modulesd[42348] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:55:52 wazuh-modulesd[42348] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:55:52 wazuh-modulesd[42348] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-29 02:56:09.302401 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 3.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:56:05 wazuh-modulesd[42440] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:56:05 wazuh-modulesd[42440] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:56:05 wazuh-modulesd[42440] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:56:05 wazuh-modulesd[42440] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:56:05 wazuh-modulesd[42440] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:56:21.232941 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:56:17 wazuh-modulesd[42540] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:56:17 wazuh-modulesd[42540] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:56:17 wazuh-modulesd[42540] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:56:17 wazuh-modulesd[42540] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:56:17 wazuh-modulesd[42540] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:56:30.336527 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:56:29 wazuh-modulesd[42640] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:56:29 wazuh-modulesd[42640] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:56:29 wazuh-modulesd[42640] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:56:29 wazuh-modulesd[42640] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:56:29 wazuh-modulesd[42640] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:56:39.647601 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:56:38 wazuh-modulesd[42731] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:56:38 wazuh-modulesd[42731] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:56:38 wazuh-modulesd[42731] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:56:38 wazuh-modulesd[42731] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:56:38 wazuh-modulesd[42731] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:56:48.978939 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:56:47 wazuh-modulesd[42822] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:56:47 wazuh-modulesd[42822] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:56:47 wazuh-modulesd[42822] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:56:47 wazuh-modulesd[42822] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:56:47 wazuh-modulesd[42822] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:56:57.963212 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:56:56 wazuh-modulesd[42913] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:56:56 wazuh-modulesd[42913] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:56:56 wazuh-modulesd[42913] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:56:56 wazuh-modulesd[42913] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:56:56 wazuh-modulesd[42913] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:57:07.280469 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:57:06 wazuh-modulesd[43004] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:57:06 wazuh-modulesd[43004] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:57:06 wazuh-modulesd[43004] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:57:06 wazuh-modulesd[43004] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:57:06 wazuh-modulesd[43004] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:57:16.579104 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:57:15 wazuh-modulesd[43095] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:57:15 wazuh-modulesd[43095] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:57:15 wazuh-modulesd[43095] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:57:15 wazuh-modulesd[43095] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:57:15 wazuh-modulesd[43095] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:57:25.891355 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:57:24 wazuh-modulesd[43186] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:57:24 wazuh-modulesd[43186] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:57:24 wazuh-modulesd[43186] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:57:24 wazuh-modulesd[43186] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:57:24 wazuh-modulesd[43186] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:57:35.183085 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:57:34 wazuh-modulesd[43277] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:57:34 wazuh-modulesd[43277] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:57:34 wazuh-modulesd[43277] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:57:34 wazuh-modulesd[43277] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:57:34 wazuh-modulesd[43277] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:57:44.534973 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:57:43 wazuh-modulesd[43368] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:57:43 wazuh-modulesd[43368] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:57:43 wazuh-modulesd[43368] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:57:43 wazuh-modulesd[43368] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:57:43 wazuh-modulesd[43368] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:57:53.822637 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:57:52 wazuh-modulesd[43459] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:57:52 wazuh-modulesd[43459] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:57:52 wazuh-modulesd[43459] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:57:52 wazuh-modulesd[43459] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:57:52 wazuh-modulesd[43459] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:58:03.115699 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:58:02 wazuh-modulesd[43550] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:58:02 wazuh-modulesd[43550] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:58:02 wazuh-modulesd[43550] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:58:02 wazuh-modulesd[43550] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:58:02 wazuh-modulesd[43550] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:58:12.045551 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALMALINUX] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:58:11 wazuh-modulesd[43641] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:58:11 wazuh-modulesd[43641] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:58:11 wazuh-modulesd[43641] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:58:11 wazuh-modulesd[43641] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:58:11 wazuh-modulesd[43641] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:58:24.328690 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:58:20 wazuh-modulesd[43742] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:58:20 wazuh-modulesd[43742] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:58:20 wazuh-modulesd[43742] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:58:20 wazuh-modulesd[43742] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:58:20 wazuh-modulesd[43742] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:58:20 wazuh-modulesd[43742] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 23:58:20 wazuh-modulesd[43742] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:58:37.140170 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:58:32 wazuh-modulesd[43841] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:58:32 wazuh-modulesd[43841] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:58:32 wazuh-modulesd[43841] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:58:32 wazuh-modulesd[43841] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:58:32 wazuh-modulesd[43841] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:58:32 wazuh-modulesd[43841] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:58:58.233387 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:58:53 wazuh-modulesd[44030] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:58:53 wazuh-modulesd[44030] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:58:53 wazuh-modulesd[44030] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:58:53 wazuh-modulesd[44030] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:58:53 wazuh-modulesd[44030] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/28 23:58:53 wazuh-modulesd[44030] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:59:10.343736 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:59:06 wazuh-modulesd[44129] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:59:06 wazuh-modulesd[44129] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:59:06 wazuh-modulesd[44129] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:59:06 wazuh-modulesd[44129] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:59:06 wazuh-modulesd[44129] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/28 23:59:06 wazuh-modulesd[44129] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:59:21.804265 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 3.14 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:59:18 wazuh-modulesd[44228] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:59:18 wazuh-modulesd[44228] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:59:18 wazuh-modulesd[44228] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:59:18 wazuh-modulesd[44228] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:59:18 wazuh-modulesd[44228] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:59:18 wazuh-modulesd[44228] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:59:34.084466 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALMALINUX] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 3.11 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:59:30 wazuh-modulesd[44736] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:59:30 wazuh-modulesd[44736] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:59:30 wazuh-modulesd[44736] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:59:30 wazuh-modulesd[44736] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:59:30 wazuh-modulesd[44736] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:59:30 wazuh-modulesd[44736] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 02:59:47.508970 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 4.02 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:59:43 wazuh-modulesd[45244] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:59:43 wazuh-modulesd[45244] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:59:43 wazuh-modulesd[45244] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:59:43 wazuh-modulesd[45244] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:59:43 wazuh-modulesd[45244] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:59:43 wazuh-modulesd[45244] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/28 23:59:43 wazuh-modulesd[45244] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:00:00.835196 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/28 23:59:55 wazuh-modulesd[45343] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/28 23:59:55 wazuh-modulesd[45343] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/28 23:59:55 wazuh-modulesd[45343] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/28 23:59:55 wazuh-modulesd[45343] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/28 23:59:55 wazuh-modulesd[45343] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/28 23:59:55 wazuh-modulesd[45343] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:00:21.854941 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:00:17 wazuh-modulesd[45672] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:00:17 wazuh-modulesd[45672] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:00:17 wazuh-modulesd[45672] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:00:17 wazuh-modulesd[45672] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:00:17 wazuh-modulesd[45672] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/29 00:00:17 wazuh-modulesd[45672] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:00:35.073631 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:00:30 wazuh-modulesd[45771] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:00:30 wazuh-modulesd[45771] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:00:30 wazuh-modulesd[45771] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:00:30 wazuh-modulesd[45771] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:00:30 wazuh-modulesd[45771] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/29 00:00:30 wazuh-modulesd[45771] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:00:47.034665 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 3.65 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:00:43 wazuh-modulesd[45870] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:00:43 wazuh-modulesd[45870] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:00:43 wazuh-modulesd[45870] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:00:43 wazuh-modulesd[45870] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:00:43 wazuh-modulesd[45870] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:00:43 wazuh-modulesd[45870] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:00:59.800693 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALMALINUX] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 3.61 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:00:56 wazuh-modulesd[46378] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:00:56 wazuh-modulesd[46378] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:00:56 wazuh-modulesd[46378] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:00:56 wazuh-modulesd[46378] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:00:56 wazuh-modulesd[46378] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:00:56 wazuh-modulesd[46378] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:01:15.280133 test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py::test_scan_triaged_null_vulnerabilities[RHEL] description: Check if a vulnerable package with triaged NULL, is detected with the partial scan. 6.04 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:01:09 wazuh-modulesd[46886] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:01:09 wazuh-modulesd[46886] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:01:09 wazuh-modulesd[46886] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:01:09 wazuh-modulesd[46886] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:01:09 wazuh-modulesd[46886] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:01:09 wazuh-modulesd[46886] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:01:09 wazuh-modulesd[46886] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:01:40.652653 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 17.08 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:01:23 wazuh-modulesd[46977] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:01:23 wazuh-modulesd[46977] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:01:23 wazuh-modulesd[46977] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:01:23 wazuh-modulesd[46977] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:01:23 wazuh-modulesd[46977] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:01:23 wazuh-modulesd[46977] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:01:23 wazuh-modulesd[46977] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:02:01.009136 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - ALAS 2022] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 12.06 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:01:48 wazuh-modulesd[47089] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:01:48 wazuh-modulesd[47089] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:01:48 wazuh-modulesd[47089] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:01:48 wazuh-modulesd[47089] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:01:48 wazuh-modulesd[47089] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/29 00:01:48 wazuh-modulesd[47089] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:02:26.899428 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 17.58 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:02:09 wazuh-modulesd[47200] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:02:09 wazuh-modulesd[47200] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:02:09 wazuh-modulesd[47200] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:02:09 wazuh-modulesd[47200] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:02:09 wazuh-modulesd[47200] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:02:09 wazuh-modulesd[47200] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:02:52.773619 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - ALMALINUX] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 17.57 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:02:35 wazuh-modulesd[47311] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:02:35 wazuh-modulesd[47311] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:02:35 wazuh-modulesd[47311] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:02:35 wazuh-modulesd[47311] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:02:35 wazuh-modulesd[47311] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:02:35 wazuh-modulesd[47311] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:03:17.869097 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 16.91 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:03:00 wazuh-modulesd[47422] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:03:00 wazuh-modulesd[47422] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:03:00 wazuh-modulesd[47422] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:03:00 wazuh-modulesd[47422] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:03:00 wazuh-modulesd[47422] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:03:00 wazuh-modulesd[47422] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:03:00 wazuh-modulesd[47422] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:03:42.872055 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - ALAS 2022] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 16.87 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:03:26 wazuh-modulesd[47532] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:03:26 wazuh-modulesd[47532] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:03:26 wazuh-modulesd[47532] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:03:26 wazuh-modulesd[47532] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:03:26 wazuh-modulesd[47532] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/29 00:03:26 wazuh-modulesd[47532] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:04:02.866821 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 11.90 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:03:50 wazuh-modulesd[47642] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:03:50 wazuh-modulesd[47642] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:03:50 wazuh-modulesd[47642] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:03:50 wazuh-modulesd[47642] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:03:50 wazuh-modulesd[47642] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:03:50 wazuh-modulesd[47642] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:04:27.844297 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - ALMALINUX] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 16.87 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:04:10 wazuh-modulesd[47752] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:04:10 wazuh-modulesd[47752] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:04:10 wazuh-modulesd[47752] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:04:10 wazuh-modulesd[47752] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:04:10 wazuh-modulesd[47752] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:04:10 wazuh-modulesd[47752] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:04:36.441810 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 0.50 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:04:35 wazuh-modulesd[47872] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:04:35 wazuh-modulesd[47872] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:04:35 wazuh-modulesd[47872] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:04:35 wazuh-modulesd[47872] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:04:35 wazuh-modulesd[47872] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:04:35 wazuh-modulesd[47872] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:04:35 wazuh-modulesd[47872] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:04:46.715841 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 2.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:04:44 wazuh-modulesd[47962] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:04:44 wazuh-modulesd[47962] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:04:44 wazuh-modulesd[47962] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:04:44 wazuh-modulesd[47962] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:04:44 wazuh-modulesd[47962] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:04:44 wazuh-modulesd[47962] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:04:44 wazuh-modulesd[47962] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:04:56.015645 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:04:55 wazuh-modulesd[48055] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:04:55 wazuh-modulesd[48055] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:04:55 wazuh-modulesd[48055] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:04:55 wazuh-modulesd[48055] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:04:55 wazuh-modulesd[48055] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:04:55 wazuh-modulesd[48055] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:04:55 wazuh-modulesd[48055] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:05:17.333941 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 13.07 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:05:04 wazuh-modulesd[48146] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:05:04 wazuh-modulesd[48146] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:05:04 wazuh-modulesd[48146] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:05:04 wazuh-modulesd[48146] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:05:04 wazuh-modulesd[48146] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:05:04 wazuh-modulesd[48146] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:05:04 wazuh-modulesd[48146] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-29 00:05:17,323 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-07-29 00:05:17,324 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-29 00:05:17,324 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 03:05:32.131032 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 6.55 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:05:25 wazuh-modulesd[48255] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:05:25 wazuh-modulesd[48255] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:05:25 wazuh-modulesd[48255] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:05:25 wazuh-modulesd[48255] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:05:25 wazuh-modulesd[48255] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:05:25 wazuh-modulesd[48255] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:05:25 wazuh-modulesd[48255] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:05:46.932074 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 6.55 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:05:40 wazuh-modulesd[48362] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:05:40 wazuh-modulesd[48362] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:05:40 wazuh-modulesd[48362] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:05:40 wazuh-modulesd[48362] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:05:40 wazuh-modulesd[48362] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:05:40 wazuh-modulesd[48362] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:05:40 wazuh-modulesd[48362] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:05:56.234525 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:05:55 wazuh-modulesd[48470] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:05:55 wazuh-modulesd[48470] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:05:55 wazuh-modulesd[48470] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:05:55 wazuh-modulesd[48470] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:05:55 wazuh-modulesd[48470] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:05:55 wazuh-modulesd[48470] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:05:55 wazuh-modulesd[48470] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:06:20.530087 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 16.03 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:06:04 wazuh-modulesd[48561] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:06:04 wazuh-modulesd[48561] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:06:04 wazuh-modulesd[48561] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:06:04 wazuh-modulesd[48561] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:06:04 wazuh-modulesd[48561] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:06:04 wazuh-modulesd[48561] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:06:04 wazuh-modulesd[48561] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-29 00:06:20,519 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-07-29 00:06:20,520 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-29 00:06:20,520 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-29 03:06:39.854697 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 11.02 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:06:28 wazuh-modulesd[48654] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:06:28 wazuh-modulesd[48654] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:06:28 wazuh-modulesd[48654] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:06:28 wazuh-modulesd[48654] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:06:28 wazuh-modulesd[48654] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:06:28 wazuh-modulesd[48654] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:06:28 wazuh-modulesd[48654] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:06:55.138721 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 7.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:06:48 wazuh-modulesd[48746] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:06:48 wazuh-modulesd[48746] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:06:48 wazuh-modulesd[48746] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:06:48 wazuh-modulesd[48746] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:06:48 wazuh-modulesd[48746] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:06:48 wazuh-modulesd[48746] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:06:48 wazuh-modulesd[48746] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:07:04.959618 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 1.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:07:03 wazuh-modulesd[48839] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:07:03 wazuh-modulesd[48839] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:07:03 wazuh-modulesd[48839] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:07:03 wazuh-modulesd[48839] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:07:03 wazuh-modulesd[48839] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:07:03 wazuh-modulesd[48839] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:07:03 wazuh-modulesd[48839] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:07:15.267726 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 2.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:07:13 wazuh-modulesd[48935] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:07:13 wazuh-modulesd[48935] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:07:13 wazuh-modulesd[48935] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:07:13 wazuh-modulesd[48935] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:07:13 wazuh-modulesd[48935] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:07:13 wazuh-modulesd[48935] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:07:13 wazuh-modulesd[48935] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:07:25.098370 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 1.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:07:23 wazuh-modulesd[49031] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:07:23 wazuh-modulesd[49031] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:07:23 wazuh-modulesd[49031] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:07:23 wazuh-modulesd[49031] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:07:23 wazuh-modulesd[49031] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:07:23 wazuh-modulesd[49031] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:07:23 wazuh-modulesd[49031] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:07:36.452951 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 3.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:07:33 wazuh-modulesd[49123] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:07:33 wazuh-modulesd[49123] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:07:33 wazuh-modulesd[49123] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:07:33 wazuh-modulesd[49123] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:07:33 wazuh-modulesd[49123] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:07:33 wazuh-modulesd[49123] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:07:33 wazuh-modulesd[49123] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-29 03:07:45.776839 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/29 00:07:44 wazuh-modulesd[49219] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/29 00:07:44 wazuh-modulesd[49219] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/29 00:07:44 wazuh-modulesd[49219] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/29 00:07:44 wazuh-modulesd[49219] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/29 00:07:44 wazuh-modulesd[49219] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/29 00:07:44 wazuh-modulesd[49219] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/29 00:07:44 wazuh-modulesd[49219] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s