R2.html

Report generated on 01-Jun-2022 at 20:22:24 by pytest-html v3.1.1

Environment

Packages {"pluggy": "0.13.1", "py": "1.10.0", "pytest": "6.2.2"}
Platform Linux-4.18.0-305.12.1.el8_4.x86_64-x86_64-with-centos-8.4.2105
Plugins {"html": "3.1.1", "metadata": "1.11.0", "testinfra": "5.0.0"}
Python 3.6.8

Summary

244 tests ran in 4520.79 seconds.

242 passed, 0 skipped, 0 failed, 0 errors, 2 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 0 21 1 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 7 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 7 1 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 45 0 0
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 44 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 8 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 2 0 0
test_vulnerability_detector/test_providers/test_os.py 0 22 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 6 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 7 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 13 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
XFailed 2022-06-01 20:22:24.285502 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.19 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:131: XFailed
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:15:02 wazuh-modulesd[128161] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:15:02 wazuh-modulesd[128161] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:15:02 wazuh-modulesd[128161] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:15:02 wazuh-modulesd[128161] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:15:02 wazuh-modulesd[128161] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2022-06-01 20:22:24.289119 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 1.12 server 2
configuration = {'sections': [{'elements': [{'enabled': {'value': 'yes'}}, {'run_on_start': {'value': 'yes'}}, {'provider': {'attribut...check'}, {'attributes': [{'name': 'syscollector'}], 'elements': [{'disabled': {'value': 'yes'}}], 'section': 'wodle'}]}
metadata = {'custom_feed_url': 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3', 'description': 'Ch...and parsing of JPG file as invalid feed in the NVD', 'name': 'NVD - MP3', 'provider_feed_names': ['nvd provider'], ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_import_invalid_feed_type(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check the vulnerability detector behavior when importing unexpected file types as feeds.

test_phases:
- Set a custom Wazuh configuration, with custom URL feeds which refer to files of unexpected type.
- Check the error when updating the provider data.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Configuration loaded from `configuration_template`.
- metadata:
type: dict
brief: Test case metadata.
- set_wazuh_configuration_vdt:
type: fixture
brief: Set wazuh configuration.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all CVE tables.
- restart_modulesd_function:
type: fixture
brief: Restart wazuh-modulesd daemon before starting a test, and stop it after finishing.

assertions:
- Check the error when updating the provider database.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

input_description:
- The `configuration_import_invalid_feed_type.yaml` file provides the module configuration for this test.
- The `cases_import_invalid_feed_type` file provides the test cases.

expected_output:
- r"Failed when updating '{provider_feed_name}' database"
- r"ERROR: .* CVE database could not be updated."
'''
if metadata['target'] == 'nvd':
> pytest.xfail(reason='no error reported when importing invalid NVD feed. '
'https://github.com/wazuh/wazuh/issues/5210')
E _pytest.outcomes.XFailed: no error reported when importing invalid NVD feed. https://github.com/wazuh/wazuh/issues/5210

test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py:138: XFailed
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:54 wazuh-modulesd[131000] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:54 wazuh-modulesd[131000] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:54 wazuh-modulesd[131000] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:54 wazuh-modulesd[131000] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:54 wazuh-modulesd[131000] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.282422 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 7.59 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:13 wazuh-modulesd[126071] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:13 wazuh-modulesd[126071] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:13 wazuh-modulesd[126071] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:13 wazuh-modulesd[126071] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:13 wazuh-modulesd[126071] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.282728 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.80 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:19 wazuh-modulesd[126165] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:19 wazuh-modulesd[126165] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:19 wazuh-modulesd[126165] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:19 wazuh-modulesd[126165] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:19 wazuh-modulesd[126165] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:07:19 wazuh-modulesd[126165] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.282847 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.82 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:26 wazuh-modulesd[126243] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:26 wazuh-modulesd[126243] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:26 wazuh-modulesd[126243] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:26 wazuh-modulesd[126243] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:26 wazuh-modulesd[126243] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:07:26 wazuh-modulesd[126243] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.282945 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.76 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:33 wazuh-modulesd[126321] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:33 wazuh-modulesd[126321] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:33 wazuh-modulesd[126321] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:33 wazuh-modulesd[126321] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:33 wazuh-modulesd[126321] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:07:33 wazuh-modulesd[126321] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283038 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.75 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:40 wazuh-modulesd[126411] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:40 wazuh-modulesd[126411] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:40 wazuh-modulesd[126411] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:40 wazuh-modulesd[126411] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:40 wazuh-modulesd[126411] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:07:40 wazuh-modulesd[126411] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283132 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.83 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:47 wazuh-modulesd[126490] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:47 wazuh-modulesd[126490] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:47 wazuh-modulesd[126490] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:47 wazuh-modulesd[126490] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:47 wazuh-modulesd[126490] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:07:47 wazuh-modulesd[126490] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283227 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.50 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:07:53 wazuh-modulesd[126568] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:07:53 wazuh-modulesd[126568] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:07:53 wazuh-modulesd[126568] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:07:53 wazuh-modulesd[126568] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:07:53 wazuh-modulesd[126568] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:07:53 wazuh-modulesd[126568] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283315 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.80 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:00 wazuh-modulesd[126658] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:00 wazuh-modulesd[126658] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:00 wazuh-modulesd[126658] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:00 wazuh-modulesd[126658] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:00 wazuh-modulesd[126658] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:00 wazuh-modulesd[126658] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283412 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.83 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:08 wazuh-modulesd[126736] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:08 wazuh-modulesd[126736] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:08 wazuh-modulesd[126736] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:08 wazuh-modulesd[126736] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:08 wazuh-modulesd[126736] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:08 wazuh-modulesd[126736] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283503 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.82 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:14 wazuh-modulesd[126802] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:14 wazuh-modulesd[126802] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:14 wazuh-modulesd[126802] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:14 wazuh-modulesd[126802] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:14 wazuh-modulesd[126802] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:14 wazuh-modulesd[126802] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283592 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.78 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:21 wazuh-modulesd[126880] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:21 wazuh-modulesd[126880] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:21 wazuh-modulesd[126880] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:21 wazuh-modulesd[126880] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:21 wazuh-modulesd[126880] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:21 wazuh-modulesd[126880] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283766 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.80 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:29 wazuh-modulesd[126971] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:29 wazuh-modulesd[126971] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:29 wazuh-modulesd[126971] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:29 wazuh-modulesd[126971] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:29 wazuh-modulesd[126971] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:29 wazuh-modulesd[126971] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283869 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.80 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:36 wazuh-modulesd[127049] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:36 wazuh-modulesd[127049] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:36 wazuh-modulesd[127049] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:36 wazuh-modulesd[127049] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:36 wazuh-modulesd[127049] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:36 wazuh-modulesd[127049] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.283959 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.82 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:43 wazuh-modulesd[127139] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:43 wazuh-modulesd[127139] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:43 wazuh-modulesd[127139] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:43 wazuh-modulesd[127139] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:43 wazuh-modulesd[127139] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:43 wazuh-modulesd[127139] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.284051 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.81 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:50 wazuh-modulesd[127217] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:50 wazuh-modulesd[127217] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:50 wazuh-modulesd[127217] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:50 wazuh-modulesd[127217] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:50 wazuh-modulesd[127217] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:50 wazuh-modulesd[127217] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.284140 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.82 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:08:56 wazuh-modulesd[127295] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:08:56 wazuh-modulesd[127295] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:08:56 wazuh-modulesd[127295] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:08:56 wazuh-modulesd[127295] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:08:56 wazuh-modulesd[127295] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:08:56 wazuh-modulesd[127295] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.284231 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.93 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:09:04 wazuh-modulesd[127406] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:09:04 wazuh-modulesd[127406] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:09:04 wazuh-modulesd[127406] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:09:04 wazuh-modulesd[127406] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:09:04 wazuh-modulesd[127406] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:09:04 wazuh-modulesd[127406] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.284316 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.76 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:09:11 wazuh-modulesd[127484] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:09:11 wazuh-modulesd[127484] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:09:11 wazuh-modulesd[127484] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:09:11 wazuh-modulesd[127484] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:09:11 wazuh-modulesd[127484] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 19:09:11 wazuh-modulesd[127484] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.284406 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 75.27 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:09:13 wazuh-modulesd[127522] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:09:13 wazuh-modulesd[127522] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:09:13 wazuh-modulesd[127522] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:09:13 wazuh-modulesd[127522] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:09:13 wazuh-modulesd[127522] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.284496 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 75.73 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:10:29 wazuh-modulesd[127649] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:10:29 wazuh-modulesd[127649] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:10:29 wazuh-modulesd[127649] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:10:29 wazuh-modulesd[127649] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:10:29 wazuh-modulesd[127649] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.284581 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 79.54 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:11:44 wazuh-modulesd[127763] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:11:44 wazuh-modulesd[127763] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:11:44 wazuh-modulesd[127763] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:11:44 wazuh-modulesd[127763] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:11:44 wazuh-modulesd[127763] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.284668 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 73.88 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:13:04 wazuh-modulesd[127861] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:13:04 wazuh-modulesd[127861] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:13:04 wazuh-modulesd[127861] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:13:04 wazuh-modulesd[127861] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:13:04 wazuh-modulesd[127861] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.284783 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 21.30 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:14:18 wazuh-modulesd[127977] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:14:18 wazuh-modulesd[127977] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:14:18 wazuh-modulesd[127977] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:14:18 wazuh-modulesd[127977] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:14:18 wazuh-modulesd[127977] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.284869 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 22.23 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:14:39 wazuh-modulesd[128069] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:14:39 wazuh-modulesd[128069] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:14:39 wazuh-modulesd[128069] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:14:39 wazuh-modulesd[128069] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:14:39 wazuh-modulesd[128069] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.285601 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 20.14 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:15:05 wazuh-modulesd[128228] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:15:05 wazuh-modulesd[128228] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:15:05 wazuh-modulesd[128228] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:15:05 wazuh-modulesd[128228] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:15:05 wazuh-modulesd[128228] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.285689 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[STRETCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 122.50 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:15:24 wazuh-modulesd[128313] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:15:24 wazuh-modulesd[128313] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:15:24 wazuh-modulesd[128313] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:15:24 wazuh-modulesd[128313] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:15:24 wazuh-modulesd[128313] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (stretch) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.285802 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 89.93 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:17:26 wazuh-modulesd[128407] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:17:26 wazuh-modulesd[128407] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:17:26 wazuh-modulesd[128407] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:17:26 wazuh-modulesd[128407] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:17:26 wazuh-modulesd[128407] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.285887 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 81.33 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:18:56 wazuh-modulesd[128497] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:18:56 wazuh-modulesd[128497] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:18:56 wazuh-modulesd[128497] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:18:56 wazuh-modulesd[128497] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:18:56 wazuh-modulesd[128497] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.285974 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.41 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:20:19 wazuh-modulesd[128596] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:20:19 wazuh-modulesd[128596] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:20:19 wazuh-modulesd[128596] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:20:19 wazuh-modulesd[128596] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:20:19 wazuh-modulesd[128596] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/06/01 19:20:19 wazuh-modulesd[128596] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.286059 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.74 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:20:28 wazuh-modulesd[128671] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:20:28 wazuh-modulesd[128671] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:20:28 wazuh-modulesd[128671] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:20:28 wazuh-modulesd[128671] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:20:28 wazuh-modulesd[128671] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286145 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.53 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:20:35 wazuh-modulesd[128770] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:20:35 wazuh-modulesd[128770] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:20:35 wazuh-modulesd[128770] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:20:35 wazuh-modulesd[128770] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:20:35 wazuh-modulesd[128770] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286235 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 572.73 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:20:39 wazuh-modulesd[128839] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:20:39 wazuh-modulesd[128839] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:20:39 wazuh-modulesd[128839] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:20:39 wazuh-modulesd[128839] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:20:39 wazuh-modulesd[128839] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/06/01 19:20:39 wazuh-modulesd[128839] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.286323 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.96 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:30:12 wazuh-modulesd[128993] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:30:12 wazuh-modulesd[128993] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:30:12 wazuh-modulesd[128993] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:30:12 wazuh-modulesd[128993] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:30:12 wazuh-modulesd[128993] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/06/01 19:30:12 wazuh-modulesd[128993] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.286411 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 123.51 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:30:24 wazuh-modulesd[129086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:30:24 wazuh-modulesd[129086] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:30:24 wazuh-modulesd[129086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:30:24 wazuh-modulesd[129086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:30:24 wazuh-modulesd[129086] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286499 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 284.19 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:32:28 wazuh-modulesd[129192] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:32:28 wazuh-modulesd[129192] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:32:28 wazuh-modulesd[129192] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:32:28 wazuh-modulesd[129192] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:32:28 wazuh-modulesd[129192] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286586 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 321.41 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:37:12 wazuh-modulesd[129314] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:37:12 wazuh-modulesd[129314] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:37:12 wazuh-modulesd[129314] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:37:12 wazuh-modulesd[129314] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:37:12 wazuh-modulesd[129314] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286707 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 23.21 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:42:32 wazuh-modulesd[129422] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:42:32 wazuh-modulesd[129422] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:42:32 wazuh-modulesd[129422] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:42:32 wazuh-modulesd[129422] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:42:32 wazuh-modulesd[129422] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286796 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 70.46 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:42:56 wazuh-modulesd[129524] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:42:56 wazuh-modulesd[129524] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:42:56 wazuh-modulesd[129524] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:42:56 wazuh-modulesd[129524] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:42:56 wazuh-modulesd[129524] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286880 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 212.19 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:44:06 wazuh-modulesd[129605] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:44:06 wazuh-modulesd[129605] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:44:06 wazuh-modulesd[129605] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:44:06 wazuh-modulesd[129605] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:44:06 wazuh-modulesd[129605] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.286963 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.60 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:47:39 wazuh-modulesd[129734] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:47:39 wazuh-modulesd[129734] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:47:39 wazuh-modulesd[129734] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:47:39 wazuh-modulesd[129734] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:47:39 wazuh-modulesd[129734] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 19:47:39 wazuh-modulesd[129734] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2022-06-01 20:22:24.287049 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.56 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:47:53 wazuh-modulesd[129836] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:47:53 wazuh-modulesd[129836] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:47:53 wazuh-modulesd[129836] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:47:53 wazuh-modulesd[129836] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:47:53 wazuh-modulesd[129836] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.287139 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.59 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:48:06 wazuh-modulesd[129955] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:48:06 wazuh-modulesd[129955] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:48:06 wazuh-modulesd[129955] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:48:06 wazuh-modulesd[129955] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:48:06 wazuh-modulesd[129955] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.287223 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.52 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:48:20 wazuh-modulesd[130048] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:48:20 wazuh-modulesd[130048] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:48:20 wazuh-modulesd[130048] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:48:20 wazuh-modulesd[130048] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:48:20 wazuh-modulesd[130048] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.287308 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.84 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:48:34 wazuh-modulesd[130172] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:48:34 wazuh-modulesd[130172] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:48:34 wazuh-modulesd[130172] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:48:34 wazuh-modulesd[130172] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:48:34 wazuh-modulesd[130172] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/06/01 19:48:34 wazuh-modulesd[130172] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.287396 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.60 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:48:49 wazuh-modulesd[130317] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:48:49 wazuh-modulesd[130317] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:48:49 wazuh-modulesd[130317] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:48:49 wazuh-modulesd[130317] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:48:49 wazuh-modulesd[130317] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/06/01 19:48:49 wazuh-modulesd[130317] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.287484 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.23 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:04 wazuh-modulesd[130411] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:04 wazuh-modulesd[130411] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:04 wazuh-modulesd[130411] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:04 wazuh-modulesd[130411] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:04 wazuh-modulesd[130411] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.287955 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.55 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:18 wazuh-modulesd[130512] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:18 wazuh-modulesd[130512] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:18 wazuh-modulesd[130512] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:18 wazuh-modulesd[130512] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:18 wazuh-modulesd[130512] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2022/06/01 19:49:18 wazuh-modulesd[130512] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2022-06-01 20:22:24.288060 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 5.22 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:25 wazuh-modulesd[130599] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:25 wazuh-modulesd[130599] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:25 wazuh-modulesd[130599] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:25 wazuh-modulesd[130599] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:25 wazuh-modulesd[130599] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2022-06-01 20:22:24.288149 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 11.53 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:29 wazuh-modulesd[130674] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:29 wazuh-modulesd[130674] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:29 wazuh-modulesd[130674] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:29 wazuh-modulesd[130674] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:29 wazuh-modulesd[130674] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2022-06-01 20:22:24.288234 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.39 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:40 wazuh-modulesd[130766] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:40 wazuh-modulesd[130766] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:40 wazuh-modulesd[130766] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:40 wazuh-modulesd[130766] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:40 wazuh-modulesd[130766] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2022-06-01 20:22:24.288323 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 5.18 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:45 wazuh-modulesd[130840] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:45 wazuh-modulesd[130840] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:45 wazuh-modulesd[130840] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:45 wazuh-modulesd[130840] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:45 wazuh-modulesd[130840] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.288411 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.48 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:50 wazuh-modulesd[130920] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:50 wazuh-modulesd[130920] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:50 wazuh-modulesd[130920] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:50 wazuh-modulesd[130920] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:50 wazuh-modulesd[130920] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.289224 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 5.31 server 2
-----------------------------Captured stderr setup------------------------------
2022/06/01 19:49:56 wazuh-modulesd[131056] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 19:49:56 wazuh-modulesd[131056] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 19:49:56 wazuh-modulesd[131056] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 19:49:56 wazuh-modulesd[131056] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 19:49:56 wazuh-modulesd[131056] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2022-06-01 20:22:24.289316 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.98 2
No log output captured.
Passed 2022-06-01 20:22:24.289397 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.82 2
No log output captured.
Passed 2022-06-01 20:22:24.289472 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.74 2
No log output captured.
Passed 2022-06-01 20:22:24.289563 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.49 2
No log output captured.
Passed 2022-06-01 20:22:24.289645 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.85 2
No log output captured.
Passed 2022-06-01 20:22:24.289728 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2002] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.12 2
No log output captured.
Passed 2022-06-01 20:22:24.289809 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2003] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.85 2
No log output captured.
Passed 2022-06-01 20:22:24.289887 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2004] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.29 2
No log output captured.
Passed 2022-06-01 20:22:24.289969 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2005] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.58 2
No log output captured.
Passed 2022-06-01 20:22:24.290098 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2006] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.50 2
No log output captured.
Passed 2022-06-01 20:22:24.290178 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2007] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.07 2
No log output captured.
Passed 2022-06-01 20:22:24.290263 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2008] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.99 2
No log output captured.
Passed 2022-06-01 20:22:24.290346 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2009] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 6.16 2
No log output captured.
Passed 2022-06-01 20:22:24.290427 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2010] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 14.54 2
No log output captured.
Passed 2022-06-01 20:22:24.290503 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2011] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 13.27 2
No log output captured.
Passed 2022-06-01 20:22:24.290584 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2012] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 8.71 2
No log output captured.
Passed 2022-06-01 20:22:24.290662 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2013] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 13.09 2
No log output captured.
Passed 2022-06-01 20:22:24.290746 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2014] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 8.85 2
No log output captured.
Passed 2022-06-01 20:22:24.290827 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2015] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 11.34 2
No log output captured.
Passed 2022-06-01 20:22:24.290907 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2016] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 7.56 2
No log output captured.
Passed 2022-06-01 20:22:24.290984 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2017] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 9.88 2
No log output captured.
Passed 2022-06-01 20:22:24.291106 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2018] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 11.81 2
No log output captured.
Passed 2022-06-01 20:22:24.291195 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2019] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 15.23 2
No log output captured.
Passed 2022-06-01 20:22:24.291275 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2020] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 19.42 2
No log output captured.
Passed 2022-06-01 20:22:24.291356 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2021] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 61.51 2
No log output captured.
Passed 2022-06-01 20:22:24.291438 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2022] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 11.56 2
No log output captured.
Passed 2022-06-01 20:22:24.291519 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.55 2
No log output captured.
Passed 2022-06-01 20:22:24.291597 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.98 2
No log output captured.
Passed 2022-06-01 20:22:24.291671 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.14 2
No log output captured.
Passed 2022-06-01 20:22:24.291749 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.87 2
No log output captured.
Passed 2022-06-01 20:22:24.291823 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.27 2
No log output captured.
Passed 2022-06-01 20:22:24.291903 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 13.44 2
No log output captured.
Passed 2022-06-01 20:22:24.291979 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 14.59 2
No log output captured.
Passed 2022-06-01 20:22:24.292080 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 13.74 2
No log output captured.
Passed 2022-06-01 20:22:24.292156 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 7.48 2
No log output captured.
Passed 2022-06-01 20:22:24.292231 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 7.05 2
No log output captured.
Passed 2022-06-01 20:22:24.292308 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 2.98 2
No log output captured.
Passed 2022-06-01 20:22:24.292387 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 2.74 2
No log output captured.
Passed 2022-06-01 20:22:24.292462 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian4] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 7.09 2
No log output captured.
Passed 2022-06-01 20:22:24.292539 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 22.12 2
No log output captured.
Passed 2022-06-01 20:22:24.292615 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 45.37 2
No log output captured.
Passed 2022-06-01 20:22:24.292692 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 104.03 2
No log output captured.
Passed 2022-06-01 20:22:24.292768 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 65.07 2
No log output captured.
Passed 2022-06-01 20:22:24.292845 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 166.97 2
No log output captured.
Passed 2022-06-01 20:22:24.292921 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 285.26 2
No log output captured.
Passed 2022-06-01 20:22:24.293046 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.08 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:21 wazuh-modulesd[131913] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:21 wazuh-modulesd[131913] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:21 wazuh-modulesd[131913] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:21 wazuh-modulesd[131913] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:07:31,846 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2022-06-01 20:07:31,847 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:07:31,847 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.293133 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 1.06 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:31 wazuh-modulesd[131955] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:31 wazuh-modulesd[131955] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:31 wazuh-modulesd[131955] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:31 wazuh-modulesd[131955] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-06-01 20:22:24.293216 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 2.09 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:34 wazuh-modulesd[132001] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:34 wazuh-modulesd[132001] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:34 wazuh-modulesd[132001] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:34 wazuh-modulesd[132001] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-06-01 20:22:24.293299 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.07 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:35 wazuh-modulesd[132031] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:35 wazuh-modulesd[132031] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:35 wazuh-modulesd[132031] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:35 wazuh-modulesd[132031] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-06-01 20:22:24.293379 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.07 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:36 wazuh-modulesd[132048] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:36 wazuh-modulesd[132048] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:36 wazuh-modulesd[132048] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:36 wazuh-modulesd[132048] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-06-01 20:22:24.293468 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 2.16 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:37 wazuh-modulesd[132065] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:37 wazuh-modulesd[132065] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:37 wazuh-modulesd[132065] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:37 wazuh-modulesd[132065] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-06-01 20:22:24.293555 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 27.81 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:07:45 wazuh-modulesd[132155] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:07:45 wazuh-modulesd[132155] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:07:45 wazuh-modulesd[132155] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:07:45 wazuh-modulesd[132155] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:07:45 wazuh-modulesd[132155] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:07:45 wazuh-modulesd[132155] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:07:45 wazuh-modulesd[132155] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.293639 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 11.36 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:08:11 wazuh-modulesd[132263] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:08:11 wazuh-modulesd[132263] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:08:11 wazuh-modulesd[132263] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:08:11 wazuh-modulesd[132263] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:08:11 wazuh-modulesd[132263] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:08:11 wazuh-modulesd[132263] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:08:11 wazuh-modulesd[132263] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.293725 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 26.90 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:08:23 wazuh-modulesd[132342] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:08:23 wazuh-modulesd[132342] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:08:23 wazuh-modulesd[132342] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:08:23 wazuh-modulesd[132342] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:08:23 wazuh-modulesd[132342] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:08:23 wazuh-modulesd[132342] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:08:23 wazuh-modulesd[132342] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.293811 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:08:45 wazuh-modulesd[132400] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:08:45 wazuh-modulesd[132400] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:08:45 wazuh-modulesd[132400] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:08:45 wazuh-modulesd[132400] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:08:45 wazuh-modulesd[132400] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.293929 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 11.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:08:47 wazuh-modulesd[132444] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:08:47 wazuh-modulesd[132444] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:08:47 wazuh-modulesd[132444] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:08:47 wazuh-modulesd[132444] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:08:47 wazuh-modulesd[132444] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-06-01 20:08:57,825 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2022-06-01 20:08:57,826 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:08:57,826 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.294012 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:08:58 wazuh-modulesd[132510] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:08:58 wazuh-modulesd[132510] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:08:58 wazuh-modulesd[132510] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:08:58 wazuh-modulesd[132510] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:08:58 wazuh-modulesd[132510] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294097 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:00 wazuh-modulesd[132534] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:00 wazuh-modulesd[132534] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:00 wazuh-modulesd[132534] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:00 wazuh-modulesd[132534] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:00 wazuh-modulesd[132534] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294181 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:01 wazuh-modulesd[132553] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:01 wazuh-modulesd[132553] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:01 wazuh-modulesd[132553] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:01 wazuh-modulesd[132553] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:01 wazuh-modulesd[132553] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294266 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.11 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:02 wazuh-modulesd[132571] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:02 wazuh-modulesd[132571] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:02 wazuh-modulesd[132571] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:02 wazuh-modulesd[132571] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:02 wazuh-modulesd[132571] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294354 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:03 wazuh-modulesd[132589] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:03 wazuh-modulesd[132589] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:03 wazuh-modulesd[132589] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:03 wazuh-modulesd[132589] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:03 wazuh-modulesd[132589] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294441 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:04 wazuh-modulesd[132614] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:04 wazuh-modulesd[132614] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:04 wazuh-modulesd[132614] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:04 wazuh-modulesd[132614] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:04 wazuh-modulesd[132614] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294532 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:05 wazuh-modulesd[132638] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:05 wazuh-modulesd[132638] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:05 wazuh-modulesd[132638] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:05 wazuh-modulesd[132638] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:05 wazuh-modulesd[132638] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294615 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:06 wazuh-modulesd[132656] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:06 wazuh-modulesd[132656] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:06 wazuh-modulesd[132656] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:06 wazuh-modulesd[132656] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:06 wazuh-modulesd[132656] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294706 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.10 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:07 wazuh-modulesd[132674] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:07 wazuh-modulesd[132674] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:07 wazuh-modulesd[132674] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:07 wazuh-modulesd[132674] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:07 wazuh-modulesd[132674] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294813 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:08 wazuh-modulesd[132692] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:08 wazuh-modulesd[132692] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:08 wazuh-modulesd[132692] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:08 wazuh-modulesd[132692] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:08 wazuh-modulesd[132692] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294898 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:09 wazuh-modulesd[132726] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:09 wazuh-modulesd[132726] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:09 wazuh-modulesd[132726] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:09 wazuh-modulesd[132726] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:09 wazuh-modulesd[132726] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.294979 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:10 wazuh-modulesd[132748] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:10 wazuh-modulesd[132748] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:10 wazuh-modulesd[132748] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:10 wazuh-modulesd[132748] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:10 wazuh-modulesd[132748] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295064 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Stretch] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:12 wazuh-modulesd[132766] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:12 wazuh-modulesd[132766] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:12 wazuh-modulesd[132766] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:12 wazuh-modulesd[132766] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:12 wazuh-modulesd[132766] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (stretch) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295151 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:13 wazuh-modulesd[132784] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:13 wazuh-modulesd[132784] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:13 wazuh-modulesd[132784] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:13 wazuh-modulesd[132784] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:13 wazuh-modulesd[132784] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/06/01 20:09:13 wazuh-modulesd[132784] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.295235 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:14 wazuh-modulesd[132809] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:14 wazuh-modulesd[132809] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:14 wazuh-modulesd[132809] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:14 wazuh-modulesd[132809] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:14 wazuh-modulesd[132809] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/06/01 20:09:14 wazuh-modulesd[132809] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-06-01 20:22:24.295318 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:15 wazuh-modulesd[132832] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:15 wazuh-modulesd[132832] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:15 wazuh-modulesd[132832] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:15 wazuh-modulesd[132832] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:15 wazuh-modulesd[132832] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/06/01 20:09:15 wazuh-modulesd[132832] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.295400 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.04 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:16 wazuh-modulesd[132851] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:16 wazuh-modulesd[132851] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:16 wazuh-modulesd[132851] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:16 wazuh-modulesd[132851] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:16 wazuh-modulesd[132851] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295487 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:17 wazuh-modulesd[132869] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:17 wazuh-modulesd[132869] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:17 wazuh-modulesd[132869] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:17 wazuh-modulesd[132869] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:17 wazuh-modulesd[132869] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295570 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:18 wazuh-modulesd[132887] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:18 wazuh-modulesd[132887] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:18 wazuh-modulesd[132887] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:18 wazuh-modulesd[132887] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:18 wazuh-modulesd[132887] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295674 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:19 wazuh-modulesd[132912] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:19 wazuh-modulesd[132912] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:19 wazuh-modulesd[132912] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:19 wazuh-modulesd[132912] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:19 wazuh-modulesd[132912] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295756 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:20 wazuh-modulesd[132935] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:20 wazuh-modulesd[132935] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:20 wazuh-modulesd[132935] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:20 wazuh-modulesd[132935] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:20 wazuh-modulesd[132935] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295838 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:21 wazuh-modulesd[132953] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:21 wazuh-modulesd[132953] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:21 wazuh-modulesd[132953] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:21 wazuh-modulesd[132953] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:09:21 wazuh-modulesd[132953] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.295944 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.55 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:22 wazuh-modulesd[132971] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:22 wazuh-modulesd[132971] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:22 wazuh-modulesd[132971] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:22 wazuh-modulesd[132971] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:27,761 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2022-06-01 20:09:27,762 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:27,762 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 1 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296063 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:28 wazuh-modulesd[133000] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:28 wazuh-modulesd[133000] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:28 wazuh-modulesd[133000] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:28 wazuh-modulesd[133000] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:33,320 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2022-06-01 20:09:33,320 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:33,321 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 2 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296177 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:33 wazuh-modulesd[133029] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:33 wazuh-modulesd[133029] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:33 wazuh-modulesd[133029] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:33 wazuh-modulesd[133029] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:38,431 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2022-06-01 20:09:38,431 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:38,431 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Focal update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296277 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:38 wazuh-modulesd[133058] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:38 wazuh-modulesd[133058] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:38 wazuh-modulesd[133058] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:38 wazuh-modulesd[133058] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:43,495 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2022-06-01 20:09:43,495 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:43,495 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Bionic update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296374 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:43 wazuh-modulesd[133087] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:43 wazuh-modulesd[133087] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:43 wazuh-modulesd[133087] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:43 wazuh-modulesd[133087] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:48,599 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2022-06-01 20:09:48,599 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:48,599 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Xenial update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296475 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:48 wazuh-modulesd[133116] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:48 wazuh-modulesd[133116] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:48 wazuh-modulesd[133116] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:48 wazuh-modulesd[133116] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:53,692 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2022-06-01 20:09:53,693 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:53,693 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Trusty update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296603 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:53 wazuh-modulesd[133145] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:53 wazuh-modulesd[133145] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:53 wazuh-modulesd[133145] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:53 wazuh-modulesd[133145] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:09:58,787 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2022-06-01 20:09:58,788 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:09:58,788 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 8 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296699 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:09:58 wazuh-modulesd[133174] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:09:58 wazuh-modulesd[133174] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:09:58 wazuh-modulesd[133174] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:09:58 wazuh-modulesd[133174] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:03,886 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2022-06-01 20:10:03,886 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:03,886 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 7 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296797 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:03 wazuh-modulesd[133203] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:03 wazuh-modulesd[133203] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:03 wazuh-modulesd[133203] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:03 wazuh-modulesd[133203] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:08,996 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2022-06-01 20:10:08,997 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:08,998 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 6 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296892 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:09 wazuh-modulesd[133232] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:09 wazuh-modulesd[133232] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:09 wazuh-modulesd[133232] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:09 wazuh-modulesd[133232] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:14,079 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2022-06-01 20:10:14,080 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:14,080 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 5 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.296993 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.58 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:14 wazuh-modulesd[133261] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:14 wazuh-modulesd[133261] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:14 wazuh-modulesd[133261] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:14 wazuh-modulesd[133261] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:19,190 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2022-06-01 20:10:19,190 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:19,190 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Bullseye update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297087 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.58 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:19 wazuh-modulesd[133297] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:19 wazuh-modulesd[133297] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:19 wazuh-modulesd[133297] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:19 wazuh-modulesd[133297] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:24,765 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2022-06-01 20:10:24,766 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:24,766 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Buster update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297183 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Stretch] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.60 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:25 wazuh-modulesd[133331] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:25 wazuh-modulesd[133331] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:25 wazuh-modulesd[133331] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:25 wazuh-modulesd[133331] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:30,377 - wazuh_testing - ERROR - Could not find Debian Stretch update starting log 2022-06-01 20:10:30,378 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:30,378 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Stretch update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297303 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:30 wazuh-modulesd[133360] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:30 wazuh-modulesd[133360] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:30 wazuh-modulesd[133360] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:30 wazuh-modulesd[133360] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:35,984 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2022-06-01 20:10:35,984 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:35,984 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Arch Linux update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297400 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:36 wazuh-modulesd[133389] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:36 wazuh-modulesd[133389] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:36 wazuh-modulesd[133389] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:36 wazuh-modulesd[133389] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:41,081 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2022-06-01 20:10:41,082 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:41,082 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find National Vulnerability Database update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297500 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.07 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:41 wazuh-modulesd[133418] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:41 wazuh-modulesd[133418] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:41 wazuh-modulesd[133418] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:41 wazuh-modulesd[133418] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:46,176 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2022-06-01 20:10:46,177 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:46,177 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Microsoft Security Update update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297597 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.12 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:46 wazuh-modulesd[133447] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:46 wazuh-modulesd[133447] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:46 wazuh-modulesd[133447] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:46 wazuh-modulesd[133447] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:51,292 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2022-06-01 20:10:51,293 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:51,293 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297695 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:51 wazuh-modulesd[133476] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:51 wazuh-modulesd[133476] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:51 wazuh-modulesd[133476] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:51 wazuh-modulesd[133476] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:10:56,412 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2022-06-01 20:10:56,412 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:10:56,412 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297794 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:10:56 wazuh-modulesd[133505] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:10:56 wazuh-modulesd[133505] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:10:56 wazuh-modulesd[133505] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:10:56 wazuh-modulesd[133505] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:11:01,518 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2022-06-01 20:11:01,518 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:11:01,518 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297890 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:11:01 wazuh-modulesd[133534] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:11:01 wazuh-modulesd[133534] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:11:01 wazuh-modulesd[133534] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:11:01 wazuh-modulesd[133534] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:11:06,634 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2022-06-01 20:11:06,635 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:11:06,635 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.297992 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:11:06 wazuh-modulesd[133563] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:11:06 wazuh-modulesd[133563] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:11:06 wazuh-modulesd[133563] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:11:06 wazuh-modulesd[133563] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:11:11,760 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2022-06-01 20:11:11,760 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:11:11,760 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.298108 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:11:11 wazuh-modulesd[133592] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:11:11 wazuh-modulesd[133592] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:11:11 wazuh-modulesd[133592] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:11:11 wazuh-modulesd[133592] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-06-01 20:11:16,844 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2022-06-01 20:11:16,845 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:11:16,845 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.298201 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 4.08 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-06-01 20:22:24.298325 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.70 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-06-01 20:22:24.298416 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 2.77 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-06-01 20:22:24.298506 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 18.63 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-06-01 20:22:24.298587 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 17.23 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-06-01 20:22:24.298666 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 23.04 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-06-01 20:22:24.298773 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 18.34 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-06-01 20:22:24.298875 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 17.18 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
----------------------------Captured stdout teardown----------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-06-01 20:22:24.298960 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.31 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:01 wazuh-modulesd[136697] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:01 wazuh-modulesd[136697] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:01 wazuh-modulesd[136697] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:01 wazuh-modulesd[136697] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:01 wazuh-modulesd[136697] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:13:01 wazuh-modulesd[136697] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2022-06-01 20:22:24.299413 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.32 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:05 wazuh-modulesd[136778] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:05 wazuh-modulesd[136778] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:05 wazuh-modulesd[136778] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:05 wazuh-modulesd[136778] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:05 wazuh-modulesd[136778] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.299509 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 2.30 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:08 wazuh-modulesd[136863] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:08 wazuh-modulesd[136863] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:08 wazuh-modulesd[136863] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:08 wazuh-modulesd[136863] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:08 wazuh-modulesd[136863] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.299594 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 3.24 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:12 wazuh-modulesd[136941] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:12 wazuh-modulesd[136941] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:12 wazuh-modulesd[136941] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:12 wazuh-modulesd[136941] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:12 wazuh-modulesd[136941] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.299679 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 2.16 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:14 wazuh-modulesd[136982] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:14 wazuh-modulesd[136982] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:14 wazuh-modulesd[136982] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:14 wazuh-modulesd[136982] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:14 wazuh-modulesd[136982] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.299761 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 3.19 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:17 wazuh-modulesd[137059] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:17 wazuh-modulesd[137059] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:17 wazuh-modulesd[137059] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:17 wazuh-modulesd[137059] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:17 wazuh-modulesd[137059] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.299845 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:19 wazuh-modulesd[137099] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:19 wazuh-modulesd[137099] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:19 wazuh-modulesd[137099] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:19 wazuh-modulesd[137099] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:19 wazuh-modulesd[137099] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.299929 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:21 wazuh-modulesd[137158] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:21 wazuh-modulesd[137158] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:21 wazuh-modulesd[137158] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:21 wazuh-modulesd[137158] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:21 wazuh-modulesd[137158] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300012 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Stretch] description: Check if modulesd downloads the feeds for each os. 2.23 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:24 wazuh-modulesd[137215] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:24 wazuh-modulesd[137215] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:24 wazuh-modulesd[137215] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:24 wazuh-modulesd[137215] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:24 wazuh-modulesd[137215] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (stretch) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300095 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 3.21 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:27 wazuh-modulesd[137279] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:27 wazuh-modulesd[137279] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:27 wazuh-modulesd[137279] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:27 wazuh-modulesd[137279] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:27 wazuh-modulesd[137279] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300183 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 2.20 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:29 wazuh-modulesd[137331] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:29 wazuh-modulesd[137331] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:29 wazuh-modulesd[137331] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:29 wazuh-modulesd[137331] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:29 wazuh-modulesd[137331] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300287 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 2.16 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:31 wazuh-modulesd[137378] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:31 wazuh-modulesd[137378] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:31 wazuh-modulesd[137378] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:31 wazuh-modulesd[137378] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:31 wazuh-modulesd[137378] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300370 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 3.20 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:34 wazuh-modulesd[137448] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:34 wazuh-modulesd[137448] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:34 wazuh-modulesd[137448] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:34 wazuh-modulesd[137448] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:34 wazuh-modulesd[137448] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300466 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 2.21 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:37 wazuh-modulesd[137538] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:37 wazuh-modulesd[137538] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:37 wazuh-modulesd[137538] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:37 wazuh-modulesd[137538] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:37 wazuh-modulesd[137538] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300550 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 3.20 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:40 wazuh-modulesd[137590] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:40 wazuh-modulesd[137590] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:40 wazuh-modulesd[137590] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:40 wazuh-modulesd[137590] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:40 wazuh-modulesd[137590] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300633 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 3.19 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:43 wazuh-modulesd[137654] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:43 wazuh-modulesd[137654] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:43 wazuh-modulesd[137654] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:43 wazuh-modulesd[137654] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:43 wazuh-modulesd[137654] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/06/01 20:13:43 wazuh-modulesd[137654] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.300719 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 2.56 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:46 wazuh-modulesd[137739] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:46 wazuh-modulesd[137739] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:46 wazuh-modulesd[137739] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:46 wazuh-modulesd[137739] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:46 wazuh-modulesd[137739] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/06/01 20:13:46 wazuh-modulesd[137739] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-06-01 20:22:24.300809 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:48 wazuh-modulesd[137772] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:48 wazuh-modulesd[137772] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:48 wazuh-modulesd[137772] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:48 wazuh-modulesd[137772] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:48 wazuh-modulesd[137772] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/06/01 20:13:48 wazuh-modulesd[137772] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.300893 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 2.23 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:50 wazuh-modulesd[137839] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:50 wazuh-modulesd[137839] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:50 wazuh-modulesd[137839] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:50 wazuh-modulesd[137839] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:50 wazuh-modulesd[137839] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.300975 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 3.19 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:53 wazuh-modulesd[137917] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:53 wazuh-modulesd[137917] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:53 wazuh-modulesd[137917] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:53 wazuh-modulesd[137917] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:53 wazuh-modulesd[137917] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301064 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 3.23 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:13:56 wazuh-modulesd[137975] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:13:56 wazuh-modulesd[137975] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:13:56 wazuh-modulesd[137975] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:13:56 wazuh-modulesd[137975] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:13:56 wazuh-modulesd[137975] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301147 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 3.20 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:00 wazuh-modulesd[138032] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:00 wazuh-modulesd[138032] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:00 wazuh-modulesd[138032] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:00 wazuh-modulesd[138032] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:00 wazuh-modulesd[138032] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301255 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 2.15 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:02 wazuh-modulesd[138096] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:02 wazuh-modulesd[138096] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:02 wazuh-modulesd[138096] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:02 wazuh-modulesd[138096] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:02 wazuh-modulesd[138096] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301342 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 2.21 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:04 wazuh-modulesd[138136] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:04 wazuh-modulesd[138136] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:04 wazuh-modulesd[138136] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:04 wazuh-modulesd[138136] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:04 wazuh-modulesd[138136] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301431 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[RedHat] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:06 wazuh-modulesd[138208] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:06 wazuh-modulesd[138208] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:06 wazuh-modulesd[138208] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:06 wazuh-modulesd[138208] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:06 wazuh-modulesd[138208] wmodules-vuln-detector.c:980 at wm_vuldet_read_provider_content(): INFO: 'update_from_year' option at module 'vulnerability-detector' is deprecated. Use 'os' instead. 2022/06/01 20:14:06 wazuh-modulesd[138208] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301526 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.22 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:07 wazuh-modulesd[138252] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:07 wazuh-modulesd[138252] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:07 wazuh-modulesd[138252] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:07 wazuh-modulesd[138252] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:07 wazuh-modulesd[138252] wmodules-vuln-detector.c:994 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2022/06/01 20:14:07 wazuh-modulesd[138252] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301611 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.14 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:09 wazuh-modulesd[138279] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:09 wazuh-modulesd[138279] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:09 wazuh-modulesd[138279] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:09 wazuh-modulesd[138279] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:09 wazuh-modulesd[138279] wmodules-vuln-detector.c:994 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2022/06/01 20:14:09 wazuh-modulesd[138279] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301699 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.26 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:11 wazuh-modulesd[138324] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:11 wazuh-modulesd[138324] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:11 wazuh-modulesd[138324] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:11 wazuh-modulesd[138324] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:11 wazuh-modulesd[138324] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/06/01 20:14:11 wazuh-modulesd[138324] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-06-01 20:22:24.301782 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 2.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:14 wazuh-modulesd[138395] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:14 wazuh-modulesd[138395] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:14 wazuh-modulesd[138395] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:14 wazuh-modulesd[138395] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:14 wazuh-modulesd[138395] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/06/01 20:14:14 wazuh-modulesd[138395] wmodules-vuln-detector.c:983 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2022/06/01 20:14:14 wazuh-modulesd[138395] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.301869 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 1.47 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:15 wazuh-modulesd[138433] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:15 wazuh-modulesd[138433] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:15 wazuh-modulesd[138433] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:15 wazuh-modulesd[138433] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:15 wazuh-modulesd[138433] wmodules-vuln-detector.c:994 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2022/06/01 20:14:15 wazuh-modulesd[138433] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.301952 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.46 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:18 wazuh-modulesd[138510] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:18 wazuh-modulesd[138510] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:18 wazuh-modulesd[138510] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:18 wazuh-modulesd[138510] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:18 wazuh-modulesd[138510] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.302033 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.51 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:24 wazuh-modulesd[138575] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:24 wazuh-modulesd[138575] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:24 wazuh-modulesd[138575] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:24 wazuh-modulesd[138575] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:24 wazuh-modulesd[138575] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.302138 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Canonical] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.56 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:32 wazuh-modulesd[138646] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:32 wazuh-modulesd[138646] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:32 wazuh-modulesd[138646] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:32 wazuh-modulesd[138646] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:32 wazuh-modulesd[138646] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.302223 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.51 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:38 wazuh-modulesd[138715] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:38 wazuh-modulesd[138715] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:38 wazuh-modulesd[138715] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:38 wazuh-modulesd[138715] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:38 wazuh-modulesd[138715] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.302305 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.57 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:46 wazuh-modulesd[138812] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:46 wazuh-modulesd[138812] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:46 wazuh-modulesd[138812] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:46 wazuh-modulesd[138812] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:46 wazuh-modulesd[138812] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/06/01 20:14:46 wazuh-modulesd[138812] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.302388 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.47 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:14:52 wazuh-modulesd[138869] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:14:52 wazuh-modulesd[138869] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:14:52 wazuh-modulesd[138869] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:14:52 wazuh-modulesd[138869] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:14:52 wazuh-modulesd[138869] wmodules-vuln-detector.c:1043 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/06/01 20:14:52 wazuh-modulesd[138869] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-06-01 20:22:24.302469 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.56 server 0
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:00 wazuh-modulesd[138959] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:00 wazuh-modulesd[138959] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:00 wazuh-modulesd[138959] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:00 wazuh-modulesd[138959] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:00 wazuh-modulesd[138959] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-06-01 20:22:24.302558 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 8.88 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:11 wazuh-modulesd[139050] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:11 wazuh-modulesd[139050] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:11 wazuh-modulesd[139050] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:11 wazuh-modulesd[139050] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:11 wazuh-modulesd[139050] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.302640 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 8.93 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:20 wazuh-modulesd[139149] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:20 wazuh-modulesd[139149] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:20 wazuh-modulesd[139149] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:20 wazuh-modulesd[139149] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:20 wazuh-modulesd[139149] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.302812 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.83 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:29 wazuh-modulesd[139240] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:29 wazuh-modulesd[139240] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:29 wazuh-modulesd[139240] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:29 wazuh-modulesd[139240] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:29 wazuh-modulesd[139240] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.302912 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.83 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:36 wazuh-modulesd[139341] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:36 wazuh-modulesd[139341] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:36 wazuh-modulesd[139341] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:36 wazuh-modulesd[139341] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:36 wazuh-modulesd[139341] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.302998 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.93 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:44 wazuh-modulesd[139445] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:44 wazuh-modulesd[139445] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:44 wazuh-modulesd[139445] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:44 wazuh-modulesd[139445] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:44 wazuh-modulesd[139445] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303109 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.85 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:51 wazuh-modulesd[139511] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:51 wazuh-modulesd[139511] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:51 wazuh-modulesd[139511] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:51 wazuh-modulesd[139511] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:51 wazuh-modulesd[139511] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303194 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.95 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:15:59 wazuh-modulesd[139601] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:15:59 wazuh-modulesd[139601] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:15:59 wazuh-modulesd[139601] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:15:59 wazuh-modulesd[139601] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:15:59 wazuh-modulesd[139601] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303275 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.86 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:05 wazuh-modulesd[139667] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:05 wazuh-modulesd[139667] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:05 wazuh-modulesd[139667] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:05 wazuh-modulesd[139667] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:05 wazuh-modulesd[139667] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303360 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.83 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:12 wazuh-modulesd[139757] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:12 wazuh-modulesd[139757] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:12 wazuh-modulesd[139757] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:12 wazuh-modulesd[139757] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:12 wazuh-modulesd[139757] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303444 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.83 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:19 wazuh-modulesd[139835] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:19 wazuh-modulesd[139835] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:19 wazuh-modulesd[139835] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:19 wazuh-modulesd[139835] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:19 wazuh-modulesd[139835] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303527 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.79 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:26 wazuh-modulesd[139901] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:26 wazuh-modulesd[139901] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:26 wazuh-modulesd[139901] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:26 wazuh-modulesd[139901] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:26 wazuh-modulesd[139901] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303611 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.80 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:33 wazuh-modulesd[139991] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:33 wazuh-modulesd[139991] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:33 wazuh-modulesd[139991] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:33 wazuh-modulesd[139991] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:33 wazuh-modulesd[139991] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303693 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.84 server
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:40 wazuh-modulesd[140069] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:40 wazuh-modulesd[140069] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:40 wazuh-modulesd[140069] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:40 wazuh-modulesd[140069] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:40 wazuh-modulesd[140069] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303781 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.39 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:46 wazuh-modulesd[140135] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:46 wazuh-modulesd[140135] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:46 wazuh-modulesd[140135] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:46 wazuh-modulesd[140135] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:46 wazuh-modulesd[140135] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:16:46 wazuh-modulesd[140135] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:16:46 wazuh-modulesd[140135] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303866 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.90 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:16:56 wazuh-modulesd[140246] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:16:56 wazuh-modulesd[140246] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:16:56 wazuh-modulesd[140246] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:16:56 wazuh-modulesd[140246] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:16:56 wazuh-modulesd[140246] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:16:56 wazuh-modulesd[140246] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.303971 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.33 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:17:05 wazuh-modulesd[140320] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:17:05 wazuh-modulesd[140320] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:17:05 wazuh-modulesd[140320] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:17:05 wazuh-modulesd[140320] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:17:05 wazuh-modulesd[140320] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:17:05 wazuh-modulesd[140320] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304058 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.91 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:17:14 wazuh-modulesd[140419] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:17:14 wazuh-modulesd[140419] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:17:14 wazuh-modulesd[140419] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:17:14 wazuh-modulesd[140419] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:17:14 wazuh-modulesd[140419] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2022/06/01 20:17:14 wazuh-modulesd[140419] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304148 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 8.91 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:17:23 wazuh-modulesd[140505] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:17:23 wazuh-modulesd[140505] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:17:23 wazuh-modulesd[140505] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:17:23 wazuh-modulesd[140505] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:17:23 wazuh-modulesd[140505] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 20:17:23 wazuh-modulesd[140505] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304232 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.95 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:17:33 wazuh-modulesd[140616] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:17:33 wazuh-modulesd[140616] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:17:33 wazuh-modulesd[140616] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:17:33 wazuh-modulesd[140616] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:17:33 wazuh-modulesd[140616] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:17:33 wazuh-modulesd[140616] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304319 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.85 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:17:42 wazuh-modulesd[140714] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:17:42 wazuh-modulesd[140714] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:17:42 wazuh-modulesd[140714] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:17:42 wazuh-modulesd[140714] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:17:42 wazuh-modulesd[140714] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:17:42 wazuh-modulesd[140714] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:17:42 wazuh-modulesd[140714] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304406 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.85 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:17:51 wazuh-modulesd[140788] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:17:51 wazuh-modulesd[140788] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:17:51 wazuh-modulesd[140788] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:17:51 wazuh-modulesd[140788] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:17:51 wazuh-modulesd[140788] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:17:51 wazuh-modulesd[140788] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304498 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.35 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:18:00 wazuh-modulesd[140886] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:18:00 wazuh-modulesd[140886] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:18:00 wazuh-modulesd[140886] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:18:00 wazuh-modulesd[140886] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:18:00 wazuh-modulesd[140886] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:18:00 wazuh-modulesd[140886] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304582 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.55 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:18:08 wazuh-modulesd[140960] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:18:08 wazuh-modulesd[140960] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:18:08 wazuh-modulesd[140960] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:18:08 wazuh-modulesd[140960] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:18:08 wazuh-modulesd[140960] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2022/06/01 20:18:08 wazuh-modulesd[140960] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304670 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 9.46 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:18:18 wazuh-modulesd[141058] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:18:18 wazuh-modulesd[141058] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:18:18 wazuh-modulesd[141058] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:18:18 wazuh-modulesd[141058] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:18:18 wazuh-modulesd[141058] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/06/01 20:18:18 wazuh-modulesd[141058] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304754 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.34 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:18:26 wazuh-modulesd[141144] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:18:26 wazuh-modulesd[141144] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:18:26 wazuh-modulesd[141144] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:18:26 wazuh-modulesd[141144] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:18:26 wazuh-modulesd[141144] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:18:26 wazuh-modulesd[141144] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304841 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 16.94 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:18:34 wazuh-modulesd[141242] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:18:34 wazuh-modulesd[141242] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:18:34 wazuh-modulesd[141242] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:18:34 wazuh-modulesd[141242] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:18:34 wazuh-modulesd[141242] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:18:34 wazuh-modulesd[141242] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:18:34 wazuh-modulesd[141242] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.304946 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 16.87 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:18:51 wazuh-modulesd[141328] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:18:51 wazuh-modulesd[141328] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:18:51 wazuh-modulesd[141328] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:18:51 wazuh-modulesd[141328] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:18:51 wazuh-modulesd[141328] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:18:51 wazuh-modulesd[141328] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305037 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 17.95 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:19:09 wazuh-modulesd[141466] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:19:09 wazuh-modulesd[141466] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:19:09 wazuh-modulesd[141466] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:19:09 wazuh-modulesd[141466] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:19:09 wazuh-modulesd[141466] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:19:09 wazuh-modulesd[141466] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:19:09 wazuh-modulesd[141466] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305122 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 22.66 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:19:27 wazuh-modulesd[141575] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:19:27 wazuh-modulesd[141575] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:19:27 wazuh-modulesd[141575] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:19:27 wazuh-modulesd[141575] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:19:27 wazuh-modulesd[141575] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:19:27 wazuh-modulesd[141575] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305207 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 6.84 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:19:49 wazuh-modulesd[141665] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:19:49 wazuh-modulesd[141665] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:19:49 wazuh-modulesd[141665] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:19:49 wazuh-modulesd[141665] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:19:49 wazuh-modulesd[141665] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:19:49 wazuh-modulesd[141665] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:19:49 wazuh-modulesd[141665] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305295 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 6.83 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:19:56 wazuh-modulesd[141755] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:19:56 wazuh-modulesd[141755] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:19:56 wazuh-modulesd[141755] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:19:56 wazuh-modulesd[141755] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:19:56 wazuh-modulesd[141755] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:19:56 wazuh-modulesd[141755] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:19:56 wazuh-modulesd[141755] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305378 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 7.89 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:20:04 wazuh-modulesd[141835] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:20:04 wazuh-modulesd[141835] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:20:04 wazuh-modulesd[141835] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:20:04 wazuh-modulesd[141835] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:20:04 wazuh-modulesd[141835] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:20:04 wazuh-modulesd[141835] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:20:04 wazuh-modulesd[141835] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305484 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 19.40 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:20:11 wazuh-modulesd[141933] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:20:11 wazuh-modulesd[141933] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:20:11 wazuh-modulesd[141933] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:20:11 wazuh-modulesd[141933] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:20:11 wazuh-modulesd[141933] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:20:11 wazuh-modulesd[141933] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:20:11 wazuh-modulesd[141933] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-06-01 20:20:24,558 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2022-06-01 20:20:24,559 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:20:24,559 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.305573 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 11.92 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:20:30 wazuh-modulesd[142021] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:20:30 wazuh-modulesd[142021] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:20:30 wazuh-modulesd[142021] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:20:30 wazuh-modulesd[142021] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:20:30 wazuh-modulesd[142021] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:20:30 wazuh-modulesd[142021] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:20:30 wazuh-modulesd[142021] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305660 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 12.92 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:20:43 wazuh-modulesd[142134] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:20:43 wazuh-modulesd[142134] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:20:43 wazuh-modulesd[142134] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:20:43 wazuh-modulesd[142134] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:20:43 wazuh-modulesd[142134] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:20:43 wazuh-modulesd[142134] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:20:43 wazuh-modulesd[142134] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305746 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 6.84 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:20:55 wazuh-modulesd[142222] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:20:55 wazuh-modulesd[142222] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:20:55 wazuh-modulesd[142222] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:20:55 wazuh-modulesd[142222] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:20:55 wazuh-modulesd[142222] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:20:55 wazuh-modulesd[142222] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:20:55 wazuh-modulesd[142222] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.305871 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 21.86 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:21:02 wazuh-modulesd[142300] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:21:02 wazuh-modulesd[142300] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:21:02 wazuh-modulesd[142300] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:21:02 wazuh-modulesd[142300] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:21:02 wazuh-modulesd[142300] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:21:02 wazuh-modulesd[142300] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:21:02 wazuh-modulesd[142300] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-06-01 20:21:18,117 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2022-06-01 20:21:18,118 - wazuh_testing - ERROR - Results accumulated: 0 2022-06-01 20:21:18,118 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-06-01 20:22:24.305956 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 17.35 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:21:23 wazuh-modulesd[142368] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:21:23 wazuh-modulesd[142368] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:21:23 wazuh-modulesd[142368] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:21:23 wazuh-modulesd[142368] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:21:23 wazuh-modulesd[142368] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:21:23 wazuh-modulesd[142368] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:21:23 wazuh-modulesd[142368] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.306039 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 12.35 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:21:41 wazuh-modulesd[142459] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:21:41 wazuh-modulesd[142459] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:21:41 wazuh-modulesd[142459] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:21:41 wazuh-modulesd[142459] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:21:41 wazuh-modulesd[142459] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:21:41 wazuh-modulesd[142459] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:21:41 wazuh-modulesd[142459] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.306125 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 6.88 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:21:53 wazuh-modulesd[142539] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:21:53 wazuh-modulesd[142539] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:21:53 wazuh-modulesd[142539] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:21:53 wazuh-modulesd[142539] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:21:53 wazuh-modulesd[142539] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:21:53 wazuh-modulesd[142539] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:21:53 wazuh-modulesd[142539] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.306212 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 7.80 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:22:01 wazuh-modulesd[142647] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:22:01 wazuh-modulesd[142647] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:22:01 wazuh-modulesd[142647] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:22:01 wazuh-modulesd[142647] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:22:01 wazuh-modulesd[142647] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:22:01 wazuh-modulesd[142647] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:22:01 wazuh-modulesd[142647] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.306296 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 6.85 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:22:08 wazuh-modulesd[142718] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:22:08 wazuh-modulesd[142718] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:22:08 wazuh-modulesd[142718] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:22:08 wazuh-modulesd[142718] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:22:08 wazuh-modulesd[142718] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:22:08 wazuh-modulesd[142718] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:22:08 wazuh-modulesd[142718] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.306384 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 6.87 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:22:15 wazuh-modulesd[142809] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:22:15 wazuh-modulesd[142809] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:22:15 wazuh-modulesd[142809] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:22:15 wazuh-modulesd[142809] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:22:15 wazuh-modulesd[142809] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:22:15 wazuh-modulesd[142809] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:22:15 wazuh-modulesd[142809] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-06-01 20:22:24.306468 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 6.83 server 1
-----------------------------Captured stderr setup------------------------------
2022/06/01 20:22:22 wazuh-modulesd[142892] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/06/01 20:22:22 wazuh-modulesd[142892] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/06/01 20:22:22 wazuh-modulesd[142892] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/06/01 20:22:22 wazuh-modulesd[142892] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/06/01 20:22:22 wazuh-modulesd[142892] wmodules-vuln-detector.c:657 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/06/01 20:22:22 wazuh-modulesd[142892] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/06/01 20:22:22 wazuh-modulesd[142892] wmodules-vuln-detector.c:715 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/M2/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s