Report generated on 04-Oct-2021 at 14:13:10 by pytest-html v2.0.1
Packages | {'pytest': '6.2.2', 'py': '1.10.0', 'pluggy': '0.13.1'} |
Platform | Windows-10-10.0.19043-SP0 |
Plugins | {'html': '2.0.1', 'metadata': '1.11.0', 'testinfra': '5.0.0'} |
Python | 3.9.7 |
2 tests ran in 8.17 seconds.
(Un)check the boxes to filter the results.
0 passed, 0 skipped, 2 failed, 0 errors, 0 expected failures, 0 unexpected passesTests | Failed | Success | XFail | Error |
---|---|---|---|---|
test_fim\test_files\test_windows_audit_interval\test_windows_audit_interval.py | 2 | 0 | 0 | 0 |
Result | Time | Test | Description | Duration | Markers | Links | Tier |
---|---|---|---|---|---|---|---|
No results found. Try to check the filters | |||||||
Failed | 2021-10-04 14:13:07.056884 | test_fim/test_files/test_windows_audit_interval/test_windows_audit_interval.py::test_windows_audit_modify_sacl[get_configuration0-tags_to_apply0] | Check that Wazuh detects a SACL change every 'windows_audit_interval' and sets monitoring to real-time if so. | 0.06 | win32 | Test arguments ossec.log ossec.conf local_internal_options.conf | 1 |
Test function detailsExtended SummaryParameterstags_to_apply = {'audit_interval'} get_configuration = {'apply_to_modules': ['test_windows_audit_interval'], 'metadata': {'fim_mode': 'whodata', 'test_directories': 'c:\\tes...], 'value': 'c:\\testdir_modify_sacl,c:\\testdir_restore_sacl'}}], 'section': 'syscheck'}], 'tags': ['audit_interval']} configure_environment = None, restart_syscheckd = None wait_for_fim_start = None @pytest.mark.parametrize('tags_to_apply', [ {'audit_interval'} ]) def test_windows_audit_modify_sacl(tags_to_apply, get_configuration, configure_environment, restart_syscheckd, wait_for_fim_start): """Check that Wazuh detects a SACL change every 'windows_audit_interval' and sets monitoring to real-time if so.""" check_apply_test(tags_to_apply, get_configuration['tags']) with Privilege('SeSecurityPrivilege'): # Assert that Wazuh rules are added lfss = get_file_security_descriptor(testdir_modify) dir_rules = get_sacl(lfss) > assert dir_rules is not None, 'No SACL rules were applied to the monitored directory.' E AssertionError: No SACL rules were applied to the monitored directory. E assert None is not None test_fim\test_files\test_windows_audit_interval\test_windows_audit_interval.py:91: AssertionError | |||||||
Failed | 2021-10-04 14:13:07.134608 | test_fim/test_files/test_windows_audit_interval/test_windows_audit_interval.py::test_windows_audit_restore_sacl[get_configuration0-tags_to_apply0] | Check that Wazuh restores previous SACL rules when the service is stopped. | 0.04 | win32 | Test arguments ossec.log ossec.conf local_internal_options.conf | 1 |
Test function detailsExtended SummaryParameterstags_to_apply = {'audit_interval'} get_configuration = {'apply_to_modules': ['test_windows_audit_interval'], 'metadata': {'fim_mode': 'whodata', 'test_directories': 'c:\\tes...], 'value': 'c:\\testdir_modify_sacl,c:\\testdir_restore_sacl'}}], 'section': 'syscheck'}], 'tags': ['audit_interval']} configure_environment = None, restart_syscheckd = None wait_for_fim_start = None @pytest.mark.parametrize('tags_to_apply', [ {'audit_interval'} ]) def test_windows_audit_restore_sacl(tags_to_apply, get_configuration, configure_environment, restart_syscheckd, wait_for_fim_start): """Check that Wazuh restores previous SACL rules when the service is stopped.""" check_apply_test(tags_to_apply, get_configuration['tags']) with Privilege('SeSecurityPrivilege'): lfss = get_file_security_descriptor(testdir_restore) > dir_rules = set(get_sacl(lfss)) E TypeError: 'NoneType' object is not iterable test_fim\test_files\test_windows_audit_interval\test_windows_audit_interval.py:117: TypeError |