Report generated on 22-May-2024 at 18:03:19 by pytest-html v3.1.1
16 tests ran in 11540.28 seconds.
(Un)check the boxes to filter the results.
1 passed, 0 skipped, 15 failed, 0 errors, 0 expected failures, 0 unexpected passesTests | Failed | Success | XFail | Error |
---|---|---|---|---|
test_vulnerability_detector/test_vulnerability_detector.py | 15 | 1 | 0 | 0 |
Result | Test | Description | Duration | Links |
---|---|---|---|---|
No results found. Try to check the filters | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_first_syscollector_scan[vd_disabled_when_agents_registration] | description: Validates the initiation of the first Syscollector scans across all agents in the environment. | 2176.20 | Test arguments agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json test_first_syscollector_scan[vd_disabled_when_agents_registration].log error_level_messages agent3_ossec.log agents_not_scanned_vulnerability_first_scan agent1_ossec.log agents_not_scanned_syscollector_first_scan vulnerabilities_index_first_scan manager1_alert.json agent5_ossec.log |
Test function detailsExtended SummaryThis test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7b3dba7db9a0> request = <FixtureRequest for <Function test_first_syscollector_scan[vd_disabled_when_agents_registration]>> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780>, save_indexer_credentials_keystore = None vulnerability_detection_previously_enabled = False, configure_vulnerability_detection_test_environment = '2024-05-22T12:52:13' record_property = <function record_property.<locals>.append_property at 0x7b3dba170d30>, clean_environment_logs = None, delete_states_vulnerability_index = None @pytest.mark.parametrize( "vulnerability_detection_previously_enabled", [False, True], ids=[ "vd_disabled_when_agents_registration", "vd_enabled_when_agents_registration", ], ) def test_first_syscollector_scan( self, request, host_manager, save_indexer_credentials_keystore, vulnerability_detection_previously_enabled, configure_vulnerability_detection_test_environment, record_property, clean_environment_logs, delete_states_vulnerability_index, ): """ description: Validates the initiation of the first Syscollector scans across all agents in the environment. This test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned """ global AGENTS_SCANNED_FIRST_SCAN global FIRST_SCAN_TIME global FIRST_SCAN_VULNERABILITIES_INDEX global INITIAL_VULNERABILITIES FIRST_SCAN_TIME = configure_vulnerability_detection_test_environment test_result = TestResult(request.node.name) test_result.add_check(self.all_agents_scanned_syscollector_first_scan_check) test_result.add_check(self.all_agents_scanned_vulnerability_first_scan_check) test_result.add_check(self.no_errors_check) record_property("test_result", test_result) # Store the agents scanned by syscollector in a global variable. # Only the last test case result is retained for comparison with the second scan. agents_not_scanned_first_scan = monitoring_syscollector_scan_agents(host_manager, VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN) AGENTS_SCANNED_FIRST_SCAN = [ agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_first_scan ] test_result.validate_check( "all_agents_scanned_syscollector_first_scan", [ Evidence( "agents_not_scanned_syscollector_first_scan", agents_not_scanned_first_scan, ) ], ) if len(AGENTS_SCANNED_FIRST_SCAN) == 0: logging.critical("Critical error. Test can not continue") pytest.fail( "Syscollector scan not started in any agent. Check agent logs for more information" ) logging.critical("Waiting until agent all agents have been scanned.") time.sleep(TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN * len(AGENTS_SCANNED_FIRST_SCAN)) logging.critical("Checking vulnerabilities in the index") vuln_by_agent_index = get_vulnerabilities_from_states_by_agent( host_manager, AGENTS_SCANNED_FIRST_SCAN, greater_than_timestamp=FIRST_SCAN_TIME, ) # Store the vulnerabilities in the global variable to make the comparision in test_consistency_initial_scans if not vulnerability_detection_previously_enabled: INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"] = ( vuln_by_agent_index ) else: INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"] = ( vuln_by_agent_index ) FIRST_SCAN_VULNERABILITIES_INDEX = vuln_by_agent_index logging.critical( "Checking that all agents has been scanned and generated vulnerabilities in the index" ) agent_not_scanned = [] # We expect at least one vulnerability in each agent for agent, vulnerabilities in vuln_by_agent_index.items(): if len(vulnerabilities) == 0: logging.critical(f"No vulnerabilities found for {agent}") agent_not_scanned.append(agent) # Validate that all agents has been scanned and generated vulnerabilities in the index test_result.validate_check( "all_agents_scanned_vulnerability_first_scan", [ Evidence( "agents_not_scanned_vulnerability_first_scan", agent_not_scanned ), Evidence( "vulnerabilities_index_first_scan", vuln_by_agent_index, debug=True ), ], ) logging.critical("Checking for errors in the environment") unexpected_errors = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", unexpected_errors)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_first_syscollector_scan[vd_disabled_when_agents_registration] failed E E Check all_agents_scanned_syscollector_first_scan succeeded E Check all_agents_scanned_vulnerability_first_scan failed. Evidences (['agents_not_scanned_vulnerability_first_scan']) can be found in the report. E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5f49d0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5f49d0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5f49d0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:374: AssertionError -------------------------------Captured log setup------------------------------- ERROR root:conftest.py:276 Save the Wazuh indexer username and password into the Wazuh manager keystore ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: False ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:140 Starting agents ERROR root:test_vulnerability_detector.py:143 Wait until agents are connected ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: True ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:130 Wait until Vulnerability Detector has update all the feeds -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_first_scan result to True with evidences ['agents_not_scanned_syscollector_first_scan'] CRITICAL root:test_vulnerability_detector.py:319 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:322 Checking vulnerabilities in the index ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:test_vulnerability_detector.py:341 Checking that all agents has been scanned and generated vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent1 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent3 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent4 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent5 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent2 ERROR root:__init__.py:237 Marked check all_agents_scanned_vulnerability_first_scan result to False with evidences ['agents_not_scanned_vulnerability_first_scan', 'vulnerabilities_index_first_scan'] CRITICAL root:test_vulnerability_detector.py:365 Checking for errors in the environment ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_first_syscollector_scan[vd_enabled_when_agents_registration] | description: Validates the initiation of the first Syscollector scans across all agents in the environment. | 1107.07 | Test arguments agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json error_level_messages agent3_ossec.log agents_not_scanned_vulnerability_first_scan agent1_ossec.log agents_not_scanned_syscollector_first_scan test_first_syscollector_scan[vd_enabled_when_agents_registration].log vulnerabilities_index_first_scan manager1_alert.json agent5_ossec.log |
Test function detailsExtended SummaryThis test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7b3dba7dbbb0> request = <FixtureRequest for <Function test_first_syscollector_scan[vd_enabled_when_agents_registration]>> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780>, save_indexer_credentials_keystore = None vulnerability_detection_previously_enabled = True, configure_vulnerability_detection_test_environment = '2024-05-22T13:28:07' record_property = <function record_property.<locals>.append_property at 0x7b3dba0f7d90>, clean_environment_logs = None, delete_states_vulnerability_index = None @pytest.mark.parametrize( "vulnerability_detection_previously_enabled", [False, True], ids=[ "vd_disabled_when_agents_registration", "vd_enabled_when_agents_registration", ], ) def test_first_syscollector_scan( self, request, host_manager, save_indexer_credentials_keystore, vulnerability_detection_previously_enabled, configure_vulnerability_detection_test_environment, record_property, clean_environment_logs, delete_states_vulnerability_index, ): """ description: Validates the initiation of the first Syscollector scans across all agents in the environment. This test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned """ global AGENTS_SCANNED_FIRST_SCAN global FIRST_SCAN_TIME global FIRST_SCAN_VULNERABILITIES_INDEX global INITIAL_VULNERABILITIES FIRST_SCAN_TIME = configure_vulnerability_detection_test_environment test_result = TestResult(request.node.name) test_result.add_check(self.all_agents_scanned_syscollector_first_scan_check) test_result.add_check(self.all_agents_scanned_vulnerability_first_scan_check) test_result.add_check(self.no_errors_check) record_property("test_result", test_result) # Store the agents scanned by syscollector in a global variable. # Only the last test case result is retained for comparison with the second scan. agents_not_scanned_first_scan = monitoring_syscollector_scan_agents(host_manager, VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN) AGENTS_SCANNED_FIRST_SCAN = [ agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_first_scan ] test_result.validate_check( "all_agents_scanned_syscollector_first_scan", [ Evidence( "agents_not_scanned_syscollector_first_scan", agents_not_scanned_first_scan, ) ], ) if len(AGENTS_SCANNED_FIRST_SCAN) == 0: logging.critical("Critical error. Test can not continue") pytest.fail( "Syscollector scan not started in any agent. Check agent logs for more information" ) logging.critical("Waiting until agent all agents have been scanned.") time.sleep(TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN * len(AGENTS_SCANNED_FIRST_SCAN)) logging.critical("Checking vulnerabilities in the index") vuln_by_agent_index = get_vulnerabilities_from_states_by_agent( host_manager, AGENTS_SCANNED_FIRST_SCAN, greater_than_timestamp=FIRST_SCAN_TIME, ) # Store the vulnerabilities in the global variable to make the comparision in test_consistency_initial_scans if not vulnerability_detection_previously_enabled: INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"] = ( vuln_by_agent_index ) else: INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"] = ( vuln_by_agent_index ) FIRST_SCAN_VULNERABILITIES_INDEX = vuln_by_agent_index logging.critical( "Checking that all agents has been scanned and generated vulnerabilities in the index" ) agent_not_scanned = [] # We expect at least one vulnerability in each agent for agent, vulnerabilities in vuln_by_agent_index.items(): if len(vulnerabilities) == 0: logging.critical(f"No vulnerabilities found for {agent}") agent_not_scanned.append(agent) # Validate that all agents has been scanned and generated vulnerabilities in the index test_result.validate_check( "all_agents_scanned_vulnerability_first_scan", [ Evidence( "agents_not_scanned_vulnerability_first_scan", agent_not_scanned ), Evidence( "vulnerabilities_index_first_scan", vuln_by_agent_index, debug=True ), ], ) logging.critical("Checking for errors in the environment") unexpected_errors = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", unexpected_errors)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_first_syscollector_scan[vd_enabled_when_agents_registration] failed E E Check all_agents_scanned_syscollector_first_scan succeeded E Check all_agents_scanned_vulnerability_first_scan failed. Evidences (['agents_not_scanned_vulnerability_first_scan']) can be found in the report. E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15cb20>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15cb20>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15cb20>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:374: AssertionError -------------------------------Captured log setup------------------------------- ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: True ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:130 Wait until Vulnerability Detector has update all the feeds ERROR root:test_vulnerability_detector.py:140 Starting agents ERROR root:test_vulnerability_detector.py:143 Wait until agents are connected -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_first_scan result to True with evidences ['agents_not_scanned_syscollector_first_scan'] CRITICAL root:test_vulnerability_detector.py:319 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:322 Checking vulnerabilities in the index ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:test_vulnerability_detector.py:341 Checking that all agents has been scanned and generated vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent1 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent3 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent4 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent5 CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent2 ERROR root:__init__.py:237 Marked check all_agents_scanned_vulnerability_first_scan result to False with evidences ['agents_not_scanned_vulnerability_first_scan', 'vulnerabilities_index_first_scan'] CRITICAL root:test_vulnerability_detector.py:365 Checking for errors in the environment ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_syscollector_second_scan | description: Validates the initiation of the second Syscollector scans across all agents in the environment. | 167.12 | Test arguments agent4_ossec.log test_syscollector_second_scan.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json error_level_messages agents_not_scanned_syscollector_second_scan agent3_ossec.log agent1_ossec.log vulnerabilities_index_first_scan vulnerabilities_index_second_scan manager1_alert.json agent5_ossec.log |
Test function detailsExtended SummaryThis test ensures that Syscollector second scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - setup_vulnerability_tests: type: fixture brief: Setup the environment to proceed with the testing - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned cases: None tags: - syscollector - vulnerability_detector Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7b3dba7db940>, request = <FixtureRequest for <Function test_syscollector_second_scan>> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba01f9a0>, get_timestamp = '2024-05-22T13:47:18', clean_environment_logs = None delete_states_vulnerability_index = None def test_syscollector_second_scan( self, request, host_manager, record_property, get_timestamp, clean_environment_logs, delete_states_vulnerability_index, ): """ description: Validates the initiation of the second Syscollector scans across all agents in the environment. This test ensures that Syscollector second scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - setup_vulnerability_tests: type: fixture brief: Setup the environment to proceed with the testing - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned cases: None tags: - syscollector - vulnerability_detector """ TIMEOUT_SECOND_SCAN = 60 global AGENTS_SCANNED_FIRST_SCAN test_result = TestResult(request.node.name) test_result.add_check(self.all_agents_scanned_syscollector_second_scan_check) test_result.add_check(self.no_errors_check) test_result.add_check(self.vulnerabilities_consistent_first_second_scan) record_property("test_result", test_result) if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip( "First scan was not executed or no agent was scanned. Skipping test" ) agents_not_scanned_second_scan = monitoring_syscollector_scan_agents( host_manager, VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN, greater_than_timestamp=get_timestamp, ) test_result.validate_check( "all_agents_scanned_syscollector_second_scan", [ Evidence( "agents_not_scanned_syscollector_second_scan", agents_not_scanned_second_scan, ) ], ) agents_to_check_vulns = [ agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_second_scan ] if len(agents_to_check_vulns) == 0: pytest.fail( "Syscollector scan not started in any agent. Check agent logs for more information" ) logging.critical("Waiting until agent all agents have been scanned.") time.sleep(TIMEOUT_SECOND_SCAN) global FIRST_SCAN_TIME logging.critical("Checking vulnerabilities in the index") vuln_by_agent_index = get_vulnerabilities_from_states_by_agent( host_manager, agents_to_check_vulns, greater_than_timestamp=FIRST_SCAN_TIME ) logging.critical( "Checking that all agents has been scanned and generated vulnerabilities in the index" ) test_result.validate_check( "vulnerabilities_consistent_first_second_scan", [ Evidence( "vulnerabilities_index_first_scan", FIRST_SCAN_VULNERABILITIES_INDEX ), Evidence("vulnerabilities_index_second_scan", vuln_by_agent_index), ], ) unexpected_errors = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=get_timestamp, ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", unexpected_errors)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_syscollector_second_scan failed E E Check all_agents_scanned_syscollector_second_scan succeeded E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check vulnerabilities_consistent_first_second_scan succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5da5f0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5da5f0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5da5f0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:525: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_second_scan result to True with evidences ['agents_not_scanned_syscollector_second_scan'] CRITICAL root:test_vulnerability_detector.py:492 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:497 Checking vulnerabilities in the index ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:test_vulnerability_detector.py:502 Checking that all agents has been scanned and generated vulnerabilities in the index ERROR root:__init__.py:237 Marked check vulnerabilities_consistent_first_second_scan result to True with evidences ['vulnerabilities_index_first_scan', 'vulnerabilities_index_second_scan'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_install_vulnerable_package_when_agent_down[install_package] | description: Install a vulnerable package when the agent is down. | 910.47 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities test_install_vulnerable_package_when_agent_down[install_package].log manager1_alert.json agent5_ossec.log missing_vulnerabilities |
Test function detailsExtended SummaryThis test ensures that the Vulnerability Detector detects the vulnerability when the agent is down. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: Parametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da980> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> request = <FixtureRequest for <Function test_install_vulnerable_package_when_agent_down[install_package]>> record_property = <function record_property.<locals>.append_property at 0x7b3dba01cdc0>, preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} setup = [], clean_environment_logs = None, delete_states_vulnerability_index = None, clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", single_vulnerable_case_complete_list, ids=single_vulnerable_case_list_ids,) def test_install_vulnerable_package_when_agent_down(self, host_manager, request, record_property, preconditions, body, teardown, setup, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): """ description: Install a vulnerable package when the agent is down. This test ensures that the Vulnerability Detector detects the vulnerability when the agent is down. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: """ # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) host_manager.control_environment("stop", ["agent"], parallel=True) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) host_manager.control_environment("start", ["agent"], parallel=True) time.sleep(AGENT_REGISTRATION_TIMEOUT * len(AGENTS_SCANNED_FIRST_SCAN)) time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) logging.critical("Validating found vulnerabilities") test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_install_vulnerable_package_when_agent_down[install_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15f6d0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15f6d0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15f6d0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:747: AssertionError -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:691 Remote operation results: {'agent5': True, 'agent2': True, 'agent3': True, 'agent4': True, 'agent1': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:test_vulnerability_detector.py:709 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} CRITICAL root:test_vulnerability_detector.py:720 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:730 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs CRITICAL root:conftest.py:351 Running teardown for agent: ['agent1', 'agent3', 'agent4', 'agent5', 'agent2'] CRITICAL root:conftest.py:354 Teardown Results: {'agent4': True, 'agent1': True, 'agent3': True, 'agent5': True, 'agent2': True} | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_change_agent_manager[install_package] | 971.12 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities agent1_ossec.log test_change_agent_manager[install_package].log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da800>, permutate_agents_managers = None request = <FixtureRequest for <Function test_change_agent_manager[install_package]>>, preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba01c940>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", test_cases_change_manager, ids=list_ids_change_manager,) def test_change_agent_manager(self, permutate_agents_managers, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for Syscollector and VD Scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) logging.critical("Validating found vulnerabilities") test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp ) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_change_agent_manager[install_package] failed E E Check no_errors succeeded E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5d9090>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5d9090>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5d9090>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:873: AssertionError -------------------------------Captured log setup------------------------------- ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent1 to manager2 (172.31.15.188) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent3 to manager2 (172.31.15.188) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent4 to manager2 (172.31.15.188) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent5 to manager1 (172.31.12.193) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent2 to manager1 (172.31.12.193) ERROR root:test_vulnerability_detector.py:626 Restarting agents -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:782 Remote operation results: {'agent4': True, 'agent5': True, 'agent3': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} CRITICAL root:test_vulnerability_detector.py:803 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:818 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:839 Validating found alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:852 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to True with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs CRITICAL root:conftest.py:351 Running teardown for agent: ['agent1', 'agent3', 'agent4', 'agent5', 'agent2'] CRITICAL root:conftest.py:354 Teardown Results: {'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True, 'agent2': True} ERROR root:test_vulnerability_detector.py:635 Restarting agents | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package] | 349.58 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts test_vulnerability_detector_scans_cases[install_package].log missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da620> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package]>>, preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3db8fceb90>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[install_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5da4a0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5da4a0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5da4a0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent5': True, 'agent4': True, 'agent3': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_package] | 352.90 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log test_vulnerability_detector_scans_cases[remove_package].log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da6b0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[remove_package]>>, preconditions = None body = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3db8f616c0>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[remove_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5d93c0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5d93c0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5d93c0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] | 838.59 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability].log expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da3e0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability]>> preconditions = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...m64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}, 'target_os': ['centos', 'ubuntu', 'windows', 'macos']} body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-...oxy-0.5.10'}, 'ubuntu': {'amd64': 'grafana-8.5.6', 'arm64v8': 'grafana-8.5.6'}, 'windows': {'amd64': 'node-v17.1.0'}}}} teardown = None, setup = ['agent2', 'agent1', 'agent5', 'agent3', 'agent4'], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba01e050>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results failed. Evidences (['setup_failed_agents']) can be found in the report. E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3db8f95f90>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3db8f95f90>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3db8f95f90>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log setup------------------------------- CRITICAL root:conftest.py:310 Preconditions finished. Results: {'agent5': True, 'agent4': True, 'agent3': True, 'agent1': True, 'agent2': True} ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to False with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent5': True, 'agent4': True, 'agent3': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability] | 508.01 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability].log expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da5c0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability]>> preconditions = {'operation': 'install_package', 'package': {'macos': {'amd64': 'axios-0.6.0', 'arm64v8': 'axios-0.6.0'}}, 'target_os': ['macos']} body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.6-1', 'arm64v8': 'grafana-8.5.6-...ios-0.10.0'}, 'ubuntu': {'amd64': 'grafana-9.1.1', 'arm64v8': 'grafana-9.1.1'}, 'windows': {'amd64': 'node-v18.0.0'}}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba01d3f0>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5cdb10>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5cdb10>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5cdb10>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log setup------------------------------- CRITICAL root:conftest.py:310 Preconditions finished. Results: {} -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent4': True, 'agent5': True, 'agent3': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability] | 511.75 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability].log alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da1a0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability]>> preconditions = {'operation': 'install_package', 'package': {'macos': {'amd64': 'systeminformation-4.34.23', 'arm64v8': 'systeminformation-4.34.23'}}, 'target_os': ['macos']} body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.1.1-1', 'arm64v8': 'grafana-9.1.1-...tion-5.0.0'}, 'ubuntu': {'amd64': 'grafana-9.2.0', 'arm64v8': 'grafana-9.2.0'}, 'windows': {'amd64': 'node-v18.1.0'}}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba1856c0>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15ff40>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15ff40>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba15ff40>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log setup------------------------------- CRITICAL root:conftest.py:310 Preconditions finished. Results: {} -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent5': True, 'agent3': True, 'agent1': True, 'agent4': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] | 383.28 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability].log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da170> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability]>>, preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.2.0-1', 'arm64v8': 'grafana-9.2.0-...y-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.4.17', 'arm64v8': 'grafana-9.4.17'}, 'windows': {'amd64': 'node-v18.20.0'}}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba1e97e0>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5dbe50>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5dbe50>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5dbe50>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent4': True, 'agent1': True, 'agent3': True, 'agent5': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable] | 765.77 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable].log | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da1d0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable]>>, preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.4.17-1', 'arm64v8': 'grafana-9.4.1...y-0.7.2'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.2'}}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}}, 'target_os': ['centos', 'ubuntu']} setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3db8f63400>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3db9929930>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3db9929930>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3db9929930>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs CRITICAL root:conftest.py:351 Running teardown for agent: ['agent1', 'agent3', 'agent4', 'agent5'] CRITICAL root:conftest.py:354 Teardown Results: {'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True} | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] | 1228.91 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts missing_mitigated_alerts manager1_alert.json test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable].log agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7da230> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable]>> preconditions = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.27-1', 'arm64v8': 'grafana-8.5.27-1'}, '...5.2'}, 'ubuntu': {'amd64': 'grafana-8.5.27', 'arm64v8': 'grafana-8.5.27'}}, 'target_os': ['centos', 'ubuntu', 'macos']} body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.27-1', 'arm64v8': 'grafana-8.5.2...uxon-3.0.0'}, 'ubuntu': {'amd64': 'grafana-9.1.1', 'arm64v8': 'grafana-9.1.1'}, 'windows': {'amd64': 'node-v20.5.1'}}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-9.1.1-1', 'arm64v8': 'grafana-9.1.1-1'}, 'mac...m64v8': 'grafana-9.1.1'}, 'windows': {'amd64': 'node-v20.5.1'}}, 'target_os': ['centos', 'ubuntu', 'macos', 'windows']} setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba170160>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5e0580>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5e0580>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5e0580>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log setup------------------------------- CRITICAL root:conftest.py:310 Preconditions finished. Results: {'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True} ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent5': True, 'agent4': True, 'agent3': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent1: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='x86_64')], 'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent2': [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs CRITICAL root:conftest.py:351 Running teardown for agent: ['agent1', 'agent3', 'agent4', 'agent5', 'agent2'] CRITICAL root:conftest.py:354 Teardown Results: {'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True, 'agent2': True} | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package_non_vulnerable] | 353.36 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts test_vulnerability_detector_scans_cases[install_package_non_vulnerable].log expected_alerts missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7d9f90> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package_non_vulnerable]>>, preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-9.5.17-1', 'arm64v8': 'grafana-9.5.17-1'}, '...xy-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.5.17', 'arm64v8': 'grafana-9.5.17'}, 'windows': {'amd64': 'node-v18.20.0'}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba1e81f0>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[install_package_non_vulnerable] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5cb3d0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5cb3d0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3dba5cb3d0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] | 398.70 | Test arguments operation_results agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json alerts_found_in_index error_level_messages unexpected_vulnerabilities agent3_ossec.log duplicated_vulnerabilities setup_failed_agents agent1_ossec.log vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities missing_affected_alerts expected_alerts test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge].log missing_mitigated_alerts manager1_alert.json agent5_ossec.log missing_vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7b3dba7d9e70> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge]>>, preconditions = None body = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-9.5.17-1', 'arm64v8': 'grafana-9.5.17-1'}, 'm...xy-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.5.17', 'arm64v8': 'grafana-9.5.17'}, 'windows': {'amd64': 'node-v18.20.0'}}} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7b3dba7d9780> record_property = <function record_property.<locals>.append_property at 0x7b3dba1aba30>, clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3db999aec0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7b3db999aec0>> = <wazuh_testing.end_to_end.TestResult object at 0x7b3db999aec0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:1002: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:912 Remote operation results: {'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent1. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent3. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent4. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent5. Exception 'hits' ERROR root:vulnerability_detector.py:314 No vulnerabilities were obtained for agent2. Exception 'hits' ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:939 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:949 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:968 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:981 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs ERROR root:conftest.py:164 Delete vulnerability index ERROR root:conftest.py:138 Truncate managers and agents logs | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_consistency_initial_scans | description: Ensure the consistency of the agent's vulnerabilities neither the agent was registered nor. | 0.00 | Test arguments agent4_ossec.log manager1_ossec.log agent2_ossec.log manager2_ossec.log manager2_alert.json agent3_ossec.log agent1_ossec.log vd_disabled_when_agents_registration vd_enabled_when_agents_registration manager1_alert.json agent5_ossec.log test_consistency_initial_scans.log |
Test function detailsExtended SummaryThis test ensures that the agent's vulnerabilities are consistent with the initial scan. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment assertions: - Verify that the number of vulnerabilities is the same between scans Parameters -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check initial_vulnerabilities_consistent result to True with evidences ['vd_disabled_when_agents_registration', 'vd_enabled_when_agents_registration'] |