R1.html

Report generated on 11-Aug-2022 at 16:33:26 by pytest-html v3.1.1

Environment

Packages {"pluggy": "0.13.1", "py": "1.10.0", "pytest": "6.2.5"}
Platform Linux-4.18.0-305.12.1.el8_4.x86_64-x86_64-with-centos-8.4.2105
Plugins {"html": "3.1.1", "metadata": "1.11.0", "testinfra": "5.0.0"}
Python 3.6.8

Summary

245 tests ran in 2747.64 seconds.

243 passed, 2 skipped, 0 failed, 0 errors, 2 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 0 21 1 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 11 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 7 1 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 45 0 0
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 44 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 8 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 2 0 0
test_vulnerability_detector/test_providers/test_os.py 0 22 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 5 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 7 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 13 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 5 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 5 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
XFailed 2022-08-11 16:33:26.851399 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.11 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None
restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:134: XFailed
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:52:58 wazuh-modulesd[17748] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:52:58 wazuh-modulesd[17748] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:52:58 wazuh-modulesd[17748] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:52:58 wazuh-modulesd[17748] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:52:58 wazuh-modulesd[17748] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2022-08-11 16:33:26.859242 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.23 server 2
configuration = {'sections': [{'elements': [{'enabled': {'value': 'yes'}}, {'run_on_start': {'value': 'yes'}}, {'provider': {'attribut...check'}, {'attributes': [{'name': 'syscollector'}], 'elements': [{'disabled': {'value': 'yes'}}], 'section': 'wodle'}]}
metadata = {'custom_feed_url': 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3', 'description': 'Ch...and parsing of JPG file as invalid feed in the NVD', 'name': 'NVD - MP3', 'provider_feed_names': ['nvd provider'], ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None
restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_import_invalid_feed_type(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check the vulnerability detector behavior when importing unexpected file types as feeds.

test_phases:
- Set a custom Wazuh configuration, with custom URL feeds which refer to files of unexpected type.
- Check the error when updating the provider data.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Configuration loaded from `configuration_template`.
- metadata:
type: dict
brief: Test case metadata.
- set_wazuh_configuration_vdt:
type: fixture
brief: Set wazuh configuration.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all CVE tables.
- restart_modulesd_function:
type: fixture
brief: Restart wazuh-modulesd daemon before starting a test, and stop it after finishing.

assertions:
- Check the error when updating the provider database.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

input_description:
- The `configuration_import_invalid_feed_type.yaml` file provides the module configuration for this test.
- The `cases_import_invalid_feed_type` file provides the test cases.

expected_output:
- r"Failed when updating '{provider_feed_name}' database"
- r"ERROR: .* CVE database could not be updated."
'''
if metadata['target'] == 'nvd':
> pytest.xfail(reason='no error reported when importing invalid NVD feed. '
'https://github.com/wazuh/wazuh/issues/5210')
E _pytest.outcomes.XFailed: no error reported when importing invalid NVD feed. https://github.com/wazuh/wazuh/issues/5210

test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py:143: XFailed
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:11:28 wazuh-modulesd[20911] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:11:28 wazuh-modulesd[20911] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:11:28 wazuh-modulesd[20911] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:11:28 wazuh-modulesd[20911] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:11:28 wazuh-modulesd[20911] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 2010 | Timeout: 300s
Skipped 2022-08-11 16:33:26.883520 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 7.95 server 1
('/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py', 144, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:27:28 wazuh-modulesd[29315] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:27:28 wazuh-modulesd[29315] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:27:28 wazuh-modulesd[29315] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:27:28 wazuh-modulesd[29315] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:27:28 wazuh-modulesd[29315] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:27:28 wazuh-modulesd[29315] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Skipped 2022-08-11 16:33:26.884142 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 7.36 server 1
('/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py', 143, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:31 wazuh-modulesd[29886] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:31 wazuh-modulesd[29886] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:31 wazuh-modulesd[29886] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:31 wazuh-modulesd[29886] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:31 wazuh-modulesd[29886] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:28:31 wazuh-modulesd[29886] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.844944 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 9.99 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:47:51 wazuh-modulesd[15592] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:47:51 wazuh-modulesd[15592] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:47:51 wazuh-modulesd[15592] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:47:51 wazuh-modulesd[15592] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:47:51 wazuh-modulesd[15592] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.845536 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.92 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:02 wazuh-modulesd[15689] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:02 wazuh-modulesd[15689] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:02 wazuh-modulesd[15689] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:02 wazuh-modulesd[15689] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:02 wazuh-modulesd[15689] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:02 wazuh-modulesd[15689] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.845767 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.88 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:10 wazuh-modulesd[15769] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:10 wazuh-modulesd[15769] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:10 wazuh-modulesd[15769] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:10 wazuh-modulesd[15769] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:10 wazuh-modulesd[15769] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:10 wazuh-modulesd[15769] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.845966 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.37 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:19 wazuh-modulesd[15861] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:19 wazuh-modulesd[15861] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:19 wazuh-modulesd[15861] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:19 wazuh-modulesd[15861] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:19 wazuh-modulesd[15861] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:19 wazuh-modulesd[15861] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.846155 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.90 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:29 wazuh-modulesd[15953] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:29 wazuh-modulesd[15953] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:29 wazuh-modulesd[15953] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:29 wazuh-modulesd[15953] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:29 wazuh-modulesd[15953] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:29 wazuh-modulesd[15953] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.846395 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.27 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:38 wazuh-modulesd[16045] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:38 wazuh-modulesd[16045] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:38 wazuh-modulesd[16045] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:38 wazuh-modulesd[16045] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:38 wazuh-modulesd[16045] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:38 wazuh-modulesd[16045] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.846584 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.82 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:46 wazuh-modulesd[16125] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:46 wazuh-modulesd[16125] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:46 wazuh-modulesd[16125] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:46 wazuh-modulesd[16125] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:46 wazuh-modulesd[16125] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:46 wazuh-modulesd[16125] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.846773 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 5.97 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:48:52 wazuh-modulesd[16180] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:48:52 wazuh-modulesd[16180] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:48:52 wazuh-modulesd[16180] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:48:52 wazuh-modulesd[16180] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:48:52 wazuh-modulesd[16180] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:48:52 wazuh-modulesd[16180] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.846965 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.31 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:00 wazuh-modulesd[16260] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:00 wazuh-modulesd[16260] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:00 wazuh-modulesd[16260] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:00 wazuh-modulesd[16260] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:00 wazuh-modulesd[16260] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:00 wazuh-modulesd[16260] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.847147 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.13 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:08 wazuh-modulesd[16340] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:08 wazuh-modulesd[16340] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:08 wazuh-modulesd[16340] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:08 wazuh-modulesd[16340] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:08 wazuh-modulesd[16340] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:08 wazuh-modulesd[16340] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.847362 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.50 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:16 wazuh-modulesd[16420] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:16 wazuh-modulesd[16420] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:16 wazuh-modulesd[16420] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:16 wazuh-modulesd[16420] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:16 wazuh-modulesd[16420] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:16 wazuh-modulesd[16420] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.847746 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.92 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:26 wazuh-modulesd[16512] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:26 wazuh-modulesd[16512] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:26 wazuh-modulesd[16512] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:26 wazuh-modulesd[16512] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:26 wazuh-modulesd[16512] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:26 wazuh-modulesd[16512] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.847946 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.56 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:35 wazuh-modulesd[16604] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:35 wazuh-modulesd[16604] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:35 wazuh-modulesd[16604] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:35 wazuh-modulesd[16604] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:35 wazuh-modulesd[16604] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:35 wazuh-modulesd[16604] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.848131 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 7.37 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:42 wazuh-modulesd[16684] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:42 wazuh-modulesd[16684] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:42 wazuh-modulesd[16684] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:42 wazuh-modulesd[16684] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:42 wazuh-modulesd[16684] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:42 wazuh-modulesd[16684] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.848373 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 9.39 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:49:52 wazuh-modulesd[16776] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:49:52 wazuh-modulesd[16776] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:49:52 wazuh-modulesd[16776] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:49:52 wazuh-modulesd[16776] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:49:52 wazuh-modulesd[16776] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:49:52 wazuh-modulesd[16776] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.848560 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.93 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:50:01 wazuh-modulesd[16868] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:50:01 wazuh-modulesd[16868] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:50:01 wazuh-modulesd[16868] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:50:01 wazuh-modulesd[16868] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:50:01 wazuh-modulesd[16868] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:50:01 wazuh-modulesd[16868] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.848744 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 6.57 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:50:08 wazuh-modulesd[16948] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:50:08 wazuh-modulesd[16948] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:50:08 wazuh-modulesd[16948] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:50:08 wazuh-modulesd[16948] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:50:08 wazuh-modulesd[16948] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:50:08 wazuh-modulesd[16948] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.848951 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 8.94 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:50:17 wazuh-modulesd[17048] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:50:17 wazuh-modulesd[17048] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:50:17 wazuh-modulesd[17048] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:50:17 wazuh-modulesd[17048] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:50:17 wazuh-modulesd[17048] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 15:50:17 wazuh-modulesd[17048] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.849145 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 31.55 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:50:21 wazuh-modulesd[17125] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:50:21 wazuh-modulesd[17125] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:50:21 wazuh-modulesd[17125] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:50:21 wazuh-modulesd[17125] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:50:21 wazuh-modulesd[17125] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.849345 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 27.44 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:50:51 wazuh-modulesd[17237] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:50:51 wazuh-modulesd[17237] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:50:51 wazuh-modulesd[17237] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:50:51 wazuh-modulesd[17237] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:50:51 wazuh-modulesd[17237] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.849523 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 29.10 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:51:18 wazuh-modulesd[17361] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:51:18 wazuh-modulesd[17361] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:51:18 wazuh-modulesd[17361] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:51:18 wazuh-modulesd[17361] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:51:18 wazuh-modulesd[17361] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.849696 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 27.47 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:51:48 wazuh-modulesd[17485] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:51:48 wazuh-modulesd[17485] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:51:48 wazuh-modulesd[17485] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:51:48 wazuh-modulesd[17485] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:51:48 wazuh-modulesd[17485] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.849921 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 19.81 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:52:14 wazuh-modulesd[17584] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:52:14 wazuh-modulesd[17584] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:52:14 wazuh-modulesd[17584] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:52:14 wazuh-modulesd[17584] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:52:14 wazuh-modulesd[17584] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.850090 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 22.90 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:52:36 wazuh-modulesd[17678] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:52:36 wazuh-modulesd[17678] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:52:36 wazuh-modulesd[17678] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:52:36 wazuh-modulesd[17678] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:52:36 wazuh-modulesd[17678] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.851605 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 18.80 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:53:00 wazuh-modulesd[17837] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:53:00 wazuh-modulesd[17837] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:53:00 wazuh-modulesd[17837] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:53:00 wazuh-modulesd[17837] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:53:00 wazuh-modulesd[17837] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.851798 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[JAMMY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 15.59 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:53:20 wazuh-modulesd[17918] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:53:20 wazuh-modulesd[17918] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:53:20 wazuh-modulesd[17918] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:53:20 wazuh-modulesd[17918] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:53:20 wazuh-modulesd[17918] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.852032 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 18.58 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:53:36 wazuh-modulesd[18012] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:53:36 wazuh-modulesd[18012] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:53:36 wazuh-modulesd[18012] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:53:36 wazuh-modulesd[18012] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:53:36 wazuh-modulesd[18012] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.852204 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 23.11 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:53:53 wazuh-modulesd[18096] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:53:53 wazuh-modulesd[18096] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:53:53 wazuh-modulesd[18096] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:53:53 wazuh-modulesd[18096] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:53:53 wazuh-modulesd[18096] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.852375 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 7.92 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:54:18 wazuh-modulesd[18180] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:54:18 wazuh-modulesd[18180] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:54:18 wazuh-modulesd[18180] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:54:18 wazuh-modulesd[18180] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:54:18 wazuh-modulesd[18180] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/08/11 15:54:18 wazuh-modulesd[18180] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.852544 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 8.28 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:54:26 wazuh-modulesd[18286] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:54:26 wazuh-modulesd[18286] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:54:26 wazuh-modulesd[18286] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:54:26 wazuh-modulesd[18286] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:54:26 wazuh-modulesd[18286] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.852714 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 6.80 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:54:33 wazuh-modulesd[18369] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:54:33 wazuh-modulesd[18369] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:54:33 wazuh-modulesd[18369] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:54:33 wazuh-modulesd[18369] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:54:33 wazuh-modulesd[18369] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.852908 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 482.95 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 15:54:41 wazuh-modulesd[18464] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 15:54:41 wazuh-modulesd[18464] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 15:54:41 wazuh-modulesd[18464] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 15:54:41 wazuh-modulesd[18464] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 15:54:41 wazuh-modulesd[18464] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/08/11 15:54:41 wazuh-modulesd[18464] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.853089 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.18 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:02:43 wazuh-modulesd[18617] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:02:43 wazuh-modulesd[18617] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:02:43 wazuh-modulesd[18617] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:02:43 wazuh-modulesd[18617] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:02:43 wazuh-modulesd[18617] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/08/11 16:02:43 wazuh-modulesd[18617] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.853257 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 41.30 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:02:54 wazuh-modulesd[18700] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:02:54 wazuh-modulesd[18700] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:02:54 wazuh-modulesd[18700] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:02:54 wazuh-modulesd[18700] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:02:54 wazuh-modulesd[18700] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.853432 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 66.88 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:03:34 wazuh-modulesd[18781] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:03:34 wazuh-modulesd[18781] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:03:34 wazuh-modulesd[18781] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:03:34 wazuh-modulesd[18781] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:03:34 wazuh-modulesd[18781] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.853604 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 96.22 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:04:42 wazuh-modulesd[18849] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:04:42 wazuh-modulesd[18849] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:04:42 wazuh-modulesd[18849] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:04:42 wazuh-modulesd[18849] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:04:42 wazuh-modulesd[18849] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.853832 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 12.63 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:06:18 wazuh-modulesd[18944] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:06:18 wazuh-modulesd[18944] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:06:18 wazuh-modulesd[18944] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:06:18 wazuh-modulesd[18944] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:06:18 wazuh-modulesd[18944] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.854007 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 24.76 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:06:31 wazuh-modulesd[19023] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:06:31 wazuh-modulesd[19023] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:06:31 wazuh-modulesd[19023] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:06:31 wazuh-modulesd[19023] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:06:31 wazuh-modulesd[19023] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.854182 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 60.58 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:06:55 wazuh-modulesd[19102] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:06:55 wazuh-modulesd[19102] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:06:55 wazuh-modulesd[19102] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:06:55 wazuh-modulesd[19102] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:06:55 wazuh-modulesd[19102] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.854361 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.25 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:07:55 wazuh-modulesd[19185] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:07:55 wazuh-modulesd[19185] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:07:55 wazuh-modulesd[19185] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:07:55 wazuh-modulesd[19185] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:07:55 wazuh-modulesd[19185] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:07:55 wazuh-modulesd[19185] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2022-08-11 16:33:26.854546 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.99 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:08:09 wazuh-modulesd[19295] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:08:09 wazuh-modulesd[19295] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:08:09 wazuh-modulesd[19295] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:08:09 wazuh-modulesd[19295] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:08:09 wazuh-modulesd[19295] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.854721 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Trusty] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.71 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:08:25 wazuh-modulesd[19411] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:08:25 wazuh-modulesd[19411] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:08:25 wazuh-modulesd[19411] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:08:25 wazuh-modulesd[19411] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:08:25 wazuh-modulesd[19411] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.854892 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Xenial] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.59 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:08:42 wazuh-modulesd[19519] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:08:42 wazuh-modulesd[19519] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:08:42 wazuh-modulesd[19519] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:08:42 wazuh-modulesd[19519] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:08:42 wazuh-modulesd[19519] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.855071 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Bionic] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.30 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:08:58 wazuh-modulesd[19615] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:08:58 wazuh-modulesd[19615] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:08:58 wazuh-modulesd[19615] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:08:58 wazuh-modulesd[19615] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:08:58 wazuh-modulesd[19615] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.855248 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Focal] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.77 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:09:15 wazuh-modulesd[19723] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:09:15 wazuh-modulesd[19723] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:09:15 wazuh-modulesd[19723] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:09:15 wazuh-modulesd[19723] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:09:15 wazuh-modulesd[19723] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.855419 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Jammy] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.38 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:09:31 wazuh-modulesd[19818] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:09:31 wazuh-modulesd[19818] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:09:31 wazuh-modulesd[19818] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:09:31 wazuh-modulesd[19818] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:09:31 wazuh-modulesd[19818] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.855593 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 16.40 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:09:46 wazuh-modulesd[19913] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:09:46 wazuh-modulesd[19913] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:09:46 wazuh-modulesd[19913] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:09:46 wazuh-modulesd[19913] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:09:46 wazuh-modulesd[19913] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.856663 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 14.78 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:10:02 wazuh-modulesd[20021] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:10:02 wazuh-modulesd[20021] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:10:02 wazuh-modulesd[20021] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:10:02 wazuh-modulesd[20021] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:10:02 wazuh-modulesd[20021] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/08/11 16:10:02 wazuh-modulesd[20021] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.856871 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.32 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:10:17 wazuh-modulesd[20129] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:10:17 wazuh-modulesd[20129] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:10:17 wazuh-modulesd[20129] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:10:17 wazuh-modulesd[20129] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:10:17 wazuh-modulesd[20129] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/08/11 16:10:17 wazuh-modulesd[20129] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.857055 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 15.71 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:10:32 wazuh-modulesd[20237] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:10:32 wazuh-modulesd[20237] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:10:32 wazuh-modulesd[20237] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:10:32 wazuh-modulesd[20237] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:10:32 wazuh-modulesd[20237] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.857235 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 7.65 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:10:49 wazuh-modulesd[20345] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:10:49 wazuh-modulesd[20345] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:10:49 wazuh-modulesd[20345] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:10:49 wazuh-modulesd[20345] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:10:49 wazuh-modulesd[20345] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2022/08/11 16:10:49 wazuh-modulesd[20345] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2022-08-11 16:33:26.857414 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.26 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:10:56 wazuh-modulesd[20441] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:10:56 wazuh-modulesd[20441] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:10:56 wazuh-modulesd[20441] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:10:56 wazuh-modulesd[20441] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:10:56 wazuh-modulesd[20441] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2022-08-11 16:33:26.857592 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.31 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:11:01 wazuh-modulesd[20535] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:11:01 wazuh-modulesd[20535] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:11:01 wazuh-modulesd[20535] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:11:01 wazuh-modulesd[20535] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:11:01 wazuh-modulesd[20535] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2022-08-11 16:33:26.857753 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.30 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:11:08 wazuh-modulesd[20629] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:11:08 wazuh-modulesd[20629] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:11:08 wazuh-modulesd[20629] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:11:08 wazuh-modulesd[20629] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:11:08 wazuh-modulesd[20629] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2022-08-11 16:33:26.857930 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.66 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:11:15 wazuh-modulesd[20723] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:11:15 wazuh-modulesd[20723] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:11:15 wazuh-modulesd[20723] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:11:15 wazuh-modulesd[20723] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:11:15 wazuh-modulesd[20723] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.858097 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.34 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:11:22 wazuh-modulesd[20817] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:11:22 wazuh-modulesd[20817] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:11:22 wazuh-modulesd[20817] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:11:22 wazuh-modulesd[20817] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:11:22 wazuh-modulesd[20817] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.859436 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 6.35 server 2
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:11:32 wazuh-modulesd[20988] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:11:32 wazuh-modulesd[20988] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:11:32 wazuh-modulesd[20988] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:11:32 wazuh-modulesd[20988] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:11:32 wazuh-modulesd[20988] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2022-08-11 16:33:26.859602 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.43 2
No log output captured.
Passed 2022-08-11 16:33:26.859760 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.87 2
No log output captured.
Passed 2022-08-11 16:33:26.859916 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.77 2
No log output captured.
Passed 2022-08-11 16:33:26.860074 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.25 2
No log output captured.
Passed 2022-08-11 16:33:26.860268 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.19 2
No log output captured.
Passed 2022-08-11 16:33:26.860470 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2002] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.47 2
No log output captured.
Passed 2022-08-11 16:33:26.860647 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2003] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.70 2
No log output captured.
Passed 2022-08-11 16:33:26.860865 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2004] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.86 2
No log output captured.
Passed 2022-08-11 16:33:26.861029 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2005] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.41 2
No log output captured.
Passed 2022-08-11 16:33:26.861198 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2006] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.72 2
No log output captured.
Passed 2022-08-11 16:33:26.861359 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2007] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.72 2
No log output captured.
Passed 2022-08-11 16:33:26.861527 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2008] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.81 2
No log output captured.
Passed 2022-08-11 16:33:26.861685 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2009] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.71 2
No log output captured.
Passed 2022-08-11 16:33:26.861840 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2010] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.85 2
No log output captured.
Passed 2022-08-11 16:33:26.861997 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2011] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.58 2
No log output captured.
Passed 2022-08-11 16:33:26.862157 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2012] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 2.88 2
No log output captured.
Passed 2022-08-11 16:33:26.862367 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2013] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.25 2
No log output captured.
Passed 2022-08-11 16:33:26.862529 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2014] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.44 2
No log output captured.
Passed 2022-08-11 16:33:26.862693 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2015] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.06 2
No log output captured.
Passed 2022-08-11 16:33:26.862854 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2016] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.47 2
No log output captured.
Passed 2022-08-11 16:33:26.863031 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2017] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.59 2
No log output captured.
Passed 2022-08-11 16:33:26.863351 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2018] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.60 2
No log output captured.
Passed 2022-08-11 16:33:26.863629 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2019] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 4.90 2
No log output captured.
Passed 2022-08-11 16:33:26.863788 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2020] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 5.90 2
No log output captured.
Passed 2022-08-11 16:33:26.863947 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2021] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 6.51 2
No log output captured.
Passed 2022-08-11 16:33:26.864119 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2022] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 3.92 2
No log output captured.
Passed 2022-08-11 16:33:26.864304 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 2.01 2
No log output captured.
Passed 2022-08-11 16:33:26.864466 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.49 2
No log output captured.
Passed 2022-08-11 16:33:26.864659 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.50 2
No log output captured.
Passed 2022-08-11 16:33:26.864896 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.91 2
No log output captured.
Passed 2022-08-11 16:33:26.865070 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Jammy] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.95 2
No log output captured.
Passed 2022-08-11 16:33:26.865232 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Focal] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.48 2
No log output captured.
Passed 2022-08-11 16:33:26.865385 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Bionic] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.01 2
No log output captured.
Passed 2022-08-11 16:33:26.865546 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Xenial] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.23 2
No log output captured.
Passed 2022-08-11 16:33:26.865688 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Trusty] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 5.36 2
No log output captured.
Passed 2022-08-11 16:33:26.865834 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.28 2
No log output captured.
Passed 2022-08-11 16:33:26.865973 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 2.75 2
No log output captured.
Passed 2022-08-11 16:33:26.866127 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 2.47 2
No log output captured.
Passed 2022-08-11 16:33:26.866270 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 4.33 2
No log output captured.
Passed 2022-08-11 16:33:26.866418 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 36.38 2
No log output captured.
Passed 2022-08-11 16:33:26.866566 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 9.98 2
No log output captured.
Passed 2022-08-11 16:33:26.866762 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 25.56 2
No log output captured.
Passed 2022-08-11 16:33:26.866902 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 15.98 2
No log output captured.
Passed 2022-08-11 16:33:26.867048 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 24.20 2
No log output captured.
Passed 2022-08-11 16:33:26.867196 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 65.17 2
No log output captured.
Passed 2022-08-11 16:33:26.867397 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:16:45 wazuh-modulesd[21061] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:16:45 wazuh-modulesd[21061] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:16:45 wazuh-modulesd[21061] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:16:45 wazuh-modulesd[21061] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:16:55,517 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2022-08-11 16:16:55,518 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:16:55,518 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.867558 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 0.57 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:16:55 wazuh-modulesd[21078] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:16:55 wazuh-modulesd[21078] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:16:55 wazuh-modulesd[21078] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:16:55 wazuh-modulesd[21078] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-08-11 16:33:26.867722 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 2.01 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:16:57 wazuh-modulesd[21125] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:16:57 wazuh-modulesd[21125] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:16:57 wazuh-modulesd[21125] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:16:57 wazuh-modulesd[21125] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-08-11 16:33:26.867888 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.07 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:16:58 wazuh-modulesd[21142] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:16:58 wazuh-modulesd[21142] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:16:58 wazuh-modulesd[21142] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:16:58 wazuh-modulesd[21142] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-08-11 16:33:26.868046 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 0.58 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:16:59 wazuh-modulesd[21159] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:16:59 wazuh-modulesd[21159] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:16:59 wazuh-modulesd[21159] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:16:59 wazuh-modulesd[21159] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-08-11 16:33:26.868205 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 3.21 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:16:59 wazuh-modulesd[21176] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:16:59 wazuh-modulesd[21176] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:16:59 wazuh-modulesd[21176] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:16:59 wazuh-modulesd[21176] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2022-08-11 16:33:26.868415 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 29.00 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:17:08 wazuh-modulesd[21268] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:17:08 wazuh-modulesd[21268] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:17:08 wazuh-modulesd[21268] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:17:08 wazuh-modulesd[21268] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:17:08 wazuh-modulesd[21268] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:17:08 wazuh-modulesd[21268] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:17:08 wazuh-modulesd[21268] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.868580 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 11.92 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:17:37 wazuh-modulesd[21377] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:17:37 wazuh-modulesd[21377] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:17:37 wazuh-modulesd[21377] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:17:37 wazuh-modulesd[21377] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:17:37 wazuh-modulesd[21377] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:17:37 wazuh-modulesd[21377] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:17:37 wazuh-modulesd[21377] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.868746 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 27.50 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:17:49 wazuh-modulesd[21470] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:17:49 wazuh-modulesd[21470] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:17:49 wazuh-modulesd[21470] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:17:49 wazuh-modulesd[21470] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:17:49 wazuh-modulesd[21470] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:17:49 wazuh-modulesd[21470] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:17:49 wazuh-modulesd[21470] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.868932 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 4.31 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:13 wazuh-modulesd[21536] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:13 wazuh-modulesd[21536] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:13 wazuh-modulesd[21536] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:13 wazuh-modulesd[21536] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:13 wazuh-modulesd[21536] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.869128 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 13.34 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:18 wazuh-modulesd[21613] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:18 wazuh-modulesd[21613] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:18 wazuh-modulesd[21613] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:18 wazuh-modulesd[21613] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:18 wazuh-modulesd[21613] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-08-11 16:18:28,064 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2022-08-11 16:18:28,064 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:18:28,065 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.869293 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:29 wazuh-modulesd[21661] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:29 wazuh-modulesd[21661] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:29 wazuh-modulesd[21661] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:29 wazuh-modulesd[21661] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:29 wazuh-modulesd[21661] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.869454 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.04 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:30 wazuh-modulesd[21680] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:30 wazuh-modulesd[21680] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:30 wazuh-modulesd[21680] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:30 wazuh-modulesd[21680] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:30 wazuh-modulesd[21680] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.869614 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.05 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:31 wazuh-modulesd[21699] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:31 wazuh-modulesd[21699] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:31 wazuh-modulesd[21699] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:31 wazuh-modulesd[21699] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:31 wazuh-modulesd[21699] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.869776 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:32 wazuh-modulesd[21717] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:32 wazuh-modulesd[21717] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:32 wazuh-modulesd[21717] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:32 wazuh-modulesd[21717] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:32 wazuh-modulesd[21717] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.869941 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:33 wazuh-modulesd[21735] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:33 wazuh-modulesd[21735] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:33 wazuh-modulesd[21735] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:33 wazuh-modulesd[21735] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:33 wazuh-modulesd[21735] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.870148 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:34 wazuh-modulesd[21753] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:34 wazuh-modulesd[21753] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:34 wazuh-modulesd[21753] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:34 wazuh-modulesd[21753] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:34 wazuh-modulesd[21753] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.870308 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Jammy] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.57 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:35 wazuh-modulesd[21771] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:35 wazuh-modulesd[21771] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:35 wazuh-modulesd[21771] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:35 wazuh-modulesd[21771] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:35 wazuh-modulesd[21771] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.870479 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:36 wazuh-modulesd[21789] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:36 wazuh-modulesd[21789] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:36 wazuh-modulesd[21789] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:36 wazuh-modulesd[21789] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:36 wazuh-modulesd[21789] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.870642 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.55 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:37 wazuh-modulesd[21807] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:37 wazuh-modulesd[21807] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:37 wazuh-modulesd[21807] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:37 wazuh-modulesd[21807] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:37 wazuh-modulesd[21807] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.870801 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:37 wazuh-modulesd[21825] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:37 wazuh-modulesd[21825] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:37 wazuh-modulesd[21825] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:37 wazuh-modulesd[21825] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:37 wazuh-modulesd[21825] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.870976 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:39 wazuh-modulesd[21843] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:39 wazuh-modulesd[21843] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:39 wazuh-modulesd[21843] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:39 wazuh-modulesd[21843] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:39 wazuh-modulesd[21843] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.871132 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.56 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:40 wazuh-modulesd[21861] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:40 wazuh-modulesd[21861] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:40 wazuh-modulesd[21861] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:40 wazuh-modulesd[21861] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:40 wazuh-modulesd[21861] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.871330 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:40 wazuh-modulesd[21879] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:40 wazuh-modulesd[21879] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:40 wazuh-modulesd[21879] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:40 wazuh-modulesd[21879] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:40 wazuh-modulesd[21879] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.871509 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:41 wazuh-modulesd[21897] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:41 wazuh-modulesd[21897] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:41 wazuh-modulesd[21897] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:41 wazuh-modulesd[21897] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:41 wazuh-modulesd[21897] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/08/11 16:18:41 wazuh-modulesd[21897] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.871678 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.10 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:42 wazuh-modulesd[21915] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:42 wazuh-modulesd[21915] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:42 wazuh-modulesd[21915] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:42 wazuh-modulesd[21915] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:42 wazuh-modulesd[21915] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/08/11 16:18:42 wazuh-modulesd[21915] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-08-11 16:33:26.871895 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:44 wazuh-modulesd[21934] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:44 wazuh-modulesd[21934] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:44 wazuh-modulesd[21934] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:44 wazuh-modulesd[21934] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:44 wazuh-modulesd[21934] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/08/11 16:18:44 wazuh-modulesd[21934] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.872063 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.55 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:45 wazuh-modulesd[21953] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:45 wazuh-modulesd[21953] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:45 wazuh-modulesd[21953] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:45 wazuh-modulesd[21953] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:45 wazuh-modulesd[21953] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.872225 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:45 wazuh-modulesd[21971] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:45 wazuh-modulesd[21971] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:45 wazuh-modulesd[21971] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:45 wazuh-modulesd[21971] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:45 wazuh-modulesd[21971] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.872383 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.06 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:46 wazuh-modulesd[21989] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:46 wazuh-modulesd[21989] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:46 wazuh-modulesd[21989] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:46 wazuh-modulesd[21989] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:46 wazuh-modulesd[21989] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.872559 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:47 wazuh-modulesd[22007] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:47 wazuh-modulesd[22007] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:47 wazuh-modulesd[22007] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:47 wazuh-modulesd[22007] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:47 wazuh-modulesd[22007] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.872698 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:48 wazuh-modulesd[22025] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:48 wazuh-modulesd[22025] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:48 wazuh-modulesd[22025] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:48 wazuh-modulesd[22025] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:48 wazuh-modulesd[22025] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.872835 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.07 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:50 wazuh-modulesd[22043] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:50 wazuh-modulesd[22043] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:50 wazuh-modulesd[22043] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:50 wazuh-modulesd[22043] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:18:50 wazuh-modulesd[22043] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.872986 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:51 wazuh-modulesd[22061] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:51 wazuh-modulesd[22061] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:51 wazuh-modulesd[22061] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:51 wazuh-modulesd[22061] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:18:56,117 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2022-08-11 16:18:56,118 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:18:56,118 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 1 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.873138 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.59 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:18:56 wazuh-modulesd[22078] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:18:56 wazuh-modulesd[22078] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:18:56 wazuh-modulesd[22078] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:18:56 wazuh-modulesd[22078] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:01,220 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2022-08-11 16:19:01,221 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:01,221 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Amazon Linux 2 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.873286 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.59 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:01 wazuh-modulesd[22095] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:01 wazuh-modulesd[22095] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:01 wazuh-modulesd[22095] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:01 wazuh-modulesd[22095] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:06,830 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2022-08-11 16:19:06,831 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:06,831 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Focal update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.873474 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.61 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:07 wazuh-modulesd[22112] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:07 wazuh-modulesd[22112] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:07 wazuh-modulesd[22112] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:07 wazuh-modulesd[22112] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:12,442 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2022-08-11 16:19:12,443 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:12,443 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Bionic update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.873622 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.11 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:13 wazuh-modulesd[22129] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:13 wazuh-modulesd[22129] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:13 wazuh-modulesd[22129] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:13 wazuh-modulesd[22129] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:18,052 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2022-08-11 16:19:18,052 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:18,053 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Xenial update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.873774 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:18 wazuh-modulesd[22146] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:18 wazuh-modulesd[22146] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:18 wazuh-modulesd[22146] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:18 wazuh-modulesd[22146] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:23,164 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2022-08-11 16:19:23,165 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:23,165 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Trusty update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.873920 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Jammy] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.60 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:23 wazuh-modulesd[22163] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:23 wazuh-modulesd[22163] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:23 wazuh-modulesd[22163] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:23 wazuh-modulesd[22163] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:28,277 - wazuh_testing - ERROR - Could not find Ubuntu Jammy update starting log 2022-08-11 16:19:28,278 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:28,278 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Ubuntu Jammy update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.874069 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:28 wazuh-modulesd[22180] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:28 wazuh-modulesd[22180] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:28 wazuh-modulesd[22180] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:28 wazuh-modulesd[22180] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:33,873 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2022-08-11 16:19:33,874 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:33,874 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 8 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.874218 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:33 wazuh-modulesd[22197] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:33 wazuh-modulesd[22197] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:33 wazuh-modulesd[22197] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:33 wazuh-modulesd[22197] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:38,996 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2022-08-11 16:19:38,996 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:38,997 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 7 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.874372 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:39 wazuh-modulesd[22214] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:39 wazuh-modulesd[22214] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:39 wazuh-modulesd[22214] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:39 wazuh-modulesd[22214] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:44,093 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2022-08-11 16:19:44,094 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:44,094 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 6 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.874525 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.11 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:44 wazuh-modulesd[22231] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:44 wazuh-modulesd[22231] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:44 wazuh-modulesd[22231] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:44 wazuh-modulesd[22231] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:49,211 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2022-08-11 16:19:49,212 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:49,212 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Red Hat Enterprise Linux 5 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.874706 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:49 wazuh-modulesd[22248] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:49 wazuh-modulesd[22248] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:49 wazuh-modulesd[22248] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:49 wazuh-modulesd[22248] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:54,319 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2022-08-11 16:19:54,320 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:54,320 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Bullseye update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.874853 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:54 wazuh-modulesd[22265] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:54 wazuh-modulesd[22265] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:54 wazuh-modulesd[22265] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:54 wazuh-modulesd[22265] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:19:59,421 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2022-08-11 16:19:59,421 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:19:59,421 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Debian Buster update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875007 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.57 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:19:59 wazuh-modulesd[22282] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:19:59 wazuh-modulesd[22282] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:19:59 wazuh-modulesd[22282] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:19:59 wazuh-modulesd[22282] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:04,488 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2022-08-11 16:20:04,489 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:04,489 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Arch Linux update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875149 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:05 wazuh-modulesd[22299] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:05 wazuh-modulesd[22299] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:05 wazuh-modulesd[22299] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:05 wazuh-modulesd[22299] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:10,099 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2022-08-11 16:20:10,100 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:10,100 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find National Vulnerability Database update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875292 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.11 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:10 wazuh-modulesd[22316] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:10 wazuh-modulesd[22316] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:10 wazuh-modulesd[22316] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:10 wazuh-modulesd[22316] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:15,207 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2022-08-11 16:20:15,208 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:15,208 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find Microsoft Security Update update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875441 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.61 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:15 wazuh-modulesd[22341] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:15 wazuh-modulesd[22341] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:15 wazuh-modulesd[22341] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:15 wazuh-modulesd[22341] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:20,342 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2022-08-11 16:20:20,342 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:20,342 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875586 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:20 wazuh-modulesd[22358] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:20 wazuh-modulesd[22358] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:20 wazuh-modulesd[22358] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:20 wazuh-modulesd[22358] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:25,935 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2022-08-11 16:20:25,936 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:25,936 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875731 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.10 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:26 wazuh-modulesd[22375] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:26 wazuh-modulesd[22375] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:26 wazuh-modulesd[22375] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:26 wazuh-modulesd[22375] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:31,050 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2022-08-11 16:20:31,051 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:31,051 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.875914 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:31 wazuh-modulesd[22392] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:31 wazuh-modulesd[22392] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:31 wazuh-modulesd[22392] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:31 wazuh-modulesd[22392] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:36,142 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2022-08-11 16:20:36,143 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:36,143 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.876056 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.09 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:36 wazuh-modulesd[22409] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:36 wazuh-modulesd[22409] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:36 wazuh-modulesd[22409] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:36 wazuh-modulesd[22409] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:41,253 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2022-08-11 16:20:41,253 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:41,253 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.876202 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.08 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:20:41 wazuh-modulesd[22426] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:20:41 wazuh-modulesd[22426] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:20:41 wazuh-modulesd[22426] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:20:41 wazuh-modulesd[22426] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2022-08-11 16:20:46,333 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2022-08-11 16:20:46,334 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:20:46,334 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.876338 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 5.20 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-08-11 16:33:26.876487 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 5.29 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-08-11 16:33:26.876616 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 2.71 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
Passed 2022-08-11 16:33:26.876742 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 9.48 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-08-11 16:33:26.876892 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 18.15 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-08-11 16:33:26.877011 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 18.82 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-08-11 16:33:26.877648 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 17.08 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-08-11 16:33:26.877792 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 16.07 server 0
------------------------------Captured stdout call------------------------------
Restarting wazuh-manager (via systemctl): [FAILED]
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xe" for details.
----------------------------Captured stdout teardown----------------------------
Restarting wazuh-manager (via systemctl): [ OK ]
Passed 2022-08-11 16:33:26.877927 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 6.67 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:21 wazuh-modulesd[25165] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:21 wazuh-modulesd[25165] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:21 wazuh-modulesd[25165] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:21 wazuh-modulesd[25165] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:21 wazuh-modulesd[25165] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:22:21 wazuh-modulesd[25165] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2022-08-11 16:33:26.878055 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 8.41 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:28 wazuh-modulesd[25278] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:28 wazuh-modulesd[25278] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:28 wazuh-modulesd[25278] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:28 wazuh-modulesd[25278] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:28 wazuh-modulesd[25278] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878183 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 4.65 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:36 wazuh-modulesd[25388] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:36 wazuh-modulesd[25388] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:36 wazuh-modulesd[25388] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:36 wazuh-modulesd[25388] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:36 wazuh-modulesd[25388] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878308 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 4.49 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:41 wazuh-modulesd[25454] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:41 wazuh-modulesd[25454] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:41 wazuh-modulesd[25454] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:41 wazuh-modulesd[25454] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:41 wazuh-modulesd[25454] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878438 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 4.29 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:45 wazuh-modulesd[25533] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:45 wazuh-modulesd[25533] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:45 wazuh-modulesd[25533] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:45 wazuh-modulesd[25533] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:45 wazuh-modulesd[25533] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878572 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 4.25 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:49 wazuh-modulesd[25611] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:49 wazuh-modulesd[25611] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:49 wazuh-modulesd[25611] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:49 wazuh-modulesd[25611] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:49 wazuh-modulesd[25611] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878699 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 3.22 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:53 wazuh-modulesd[25689] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:53 wazuh-modulesd[25689] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:53 wazuh-modulesd[25689] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:53 wazuh-modulesd[25689] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:53 wazuh-modulesd[25689] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878823 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 2.16 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:55 wazuh-modulesd[25731] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:55 wazuh-modulesd[25731] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:55 wazuh-modulesd[25731] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:55 wazuh-modulesd[25731] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:55 wazuh-modulesd[25731] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.878984 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Jammy] description: Check if modulesd downloads the feeds for each os. 3.64 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:22:58 wazuh-modulesd[25809] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:22:58 wazuh-modulesd[25809] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:22:58 wazuh-modulesd[25809] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:22:58 wazuh-modulesd[25809] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:22:58 wazuh-modulesd[25809] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879114 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 2.21 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:01 wazuh-modulesd[25863] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:01 wazuh-modulesd[25863] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:01 wazuh-modulesd[25863] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:01 wazuh-modulesd[25863] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:01 wazuh-modulesd[25863] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879242 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 4.29 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:04 wazuh-modulesd[25928] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:04 wazuh-modulesd[25928] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:04 wazuh-modulesd[25928] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:04 wazuh-modulesd[25928] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:04 wazuh-modulesd[25928] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879365 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 3.23 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:07 wazuh-modulesd[26006] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:07 wazuh-modulesd[26006] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:07 wazuh-modulesd[26006] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:07 wazuh-modulesd[26006] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:07 wazuh-modulesd[26006] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879495 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 3.23 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:12 wazuh-modulesd[26084] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:12 wazuh-modulesd[26084] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:12 wazuh-modulesd[26084] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:12 wazuh-modulesd[26084] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:12 wazuh-modulesd[26084] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879613 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 4.17 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:15 wazuh-modulesd[26162] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:15 wazuh-modulesd[26162] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:15 wazuh-modulesd[26162] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:15 wazuh-modulesd[26162] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:15 wazuh-modulesd[26162] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879707 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 4.29 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:19 wazuh-modulesd[26240] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:19 wazuh-modulesd[26240] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:19 wazuh-modulesd[26240] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:19 wazuh-modulesd[26240] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:19 wazuh-modulesd[26240] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.879801 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 4.27 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:24 wazuh-modulesd[26318] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:24 wazuh-modulesd[26318] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:24 wazuh-modulesd[26318] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:24 wazuh-modulesd[26318] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:24 wazuh-modulesd[26318] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/08/11 16:23:24 wazuh-modulesd[26318] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.879900 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 3.64 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:28 wazuh-modulesd[26396] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:28 wazuh-modulesd[26396] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:28 wazuh-modulesd[26396] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:28 wazuh-modulesd[26396] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:28 wazuh-modulesd[26396] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/08/11 16:23:28 wazuh-modulesd[26396] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-08-11 16:33:26.879993 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 3.26 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:31 wazuh-modulesd[26475] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:31 wazuh-modulesd[26475] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:31 wazuh-modulesd[26475] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:31 wazuh-modulesd[26475] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:31 wazuh-modulesd[26475] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/08/11 16:23:31 wazuh-modulesd[26475] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.880111 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 3.61 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:34 wazuh-modulesd[26555] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:34 wazuh-modulesd[26555] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:34 wazuh-modulesd[26555] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:34 wazuh-modulesd[26555] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:34 wazuh-modulesd[26555] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880206 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 4.21 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:39 wazuh-modulesd[26633] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:39 wazuh-modulesd[26633] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:39 wazuh-modulesd[26633] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:39 wazuh-modulesd[26633] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:39 wazuh-modulesd[26633] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880305 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 3.18 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:42 wazuh-modulesd[26699] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:42 wazuh-modulesd[26699] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:42 wazuh-modulesd[26699] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:42 wazuh-modulesd[26699] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:42 wazuh-modulesd[26699] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880402 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 3.63 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:46 wazuh-modulesd[26765] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:46 wazuh-modulesd[26765] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:46 wazuh-modulesd[26765] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:46 wazuh-modulesd[26765] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:46 wazuh-modulesd[26765] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880498 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 5.29 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:50 wazuh-modulesd[26843] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:50 wazuh-modulesd[26843] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:50 wazuh-modulesd[26843] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:50 wazuh-modulesd[26843] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:50 wazuh-modulesd[26843] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880634 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 3.26 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:54 wazuh-modulesd[26921] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:54 wazuh-modulesd[26921] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:54 wazuh-modulesd[26921] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:54 wazuh-modulesd[26921] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:54 wazuh-modulesd[26921] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880765 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.93 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:23:59 wazuh-modulesd[26999] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:23:59 wazuh-modulesd[26999] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:23:59 wazuh-modulesd[26999] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:23:59 wazuh-modulesd[26999] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:23:59 wazuh-modulesd[26999] wmodules-vuln-detector.c:999 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2022/08/11 16:23:59 wazuh-modulesd[26999] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880868 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.25 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:02 wazuh-modulesd[27077] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:02 wazuh-modulesd[27077] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:02 wazuh-modulesd[27077] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:02 wazuh-modulesd[27077] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:02 wazuh-modulesd[27077] wmodules-vuln-detector.c:999 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2022/08/11 16:24:02 wazuh-modulesd[27077] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.880966 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 4.34 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:05 wazuh-modulesd[27143] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:05 wazuh-modulesd[27143] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:05 wazuh-modulesd[27143] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:05 wazuh-modulesd[27143] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:05 wazuh-modulesd[27143] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/08/11 16:24:05 wazuh-modulesd[27143] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2022 | Timeout: 300s
Passed 2022-08-11 16:33:26.881064 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 3.25 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:09 wazuh-modulesd[27234] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:09 wazuh-modulesd[27234] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:09 wazuh-modulesd[27234] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:09 wazuh-modulesd[27234] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:09 wazuh-modulesd[27234] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2022/08/11 16:24:09 wazuh-modulesd[27234] wmodules-vuln-detector.c:988 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2022/08/11 16:24:09 wazuh-modulesd[27234] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.881188 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 2.79 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:13 wazuh-modulesd[27312] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:13 wazuh-modulesd[27312] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:13 wazuh-modulesd[27312] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:13 wazuh-modulesd[27312] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:13 wazuh-modulesd[27312] wmodules-vuln-detector.c:999 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2022/08/11 16:24:13 wazuh-modulesd[27312] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.881289 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.70 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:15 wazuh-modulesd[27389] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:15 wazuh-modulesd[27389] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:15 wazuh-modulesd[27389] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:15 wazuh-modulesd[27389] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:15 wazuh-modulesd[27389] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.881383 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 8.63 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:23 wazuh-modulesd[27455] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:23 wazuh-modulesd[27455] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:23 wazuh-modulesd[27455] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:23 wazuh-modulesd[27455] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:23 wazuh-modulesd[27455] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.881480 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Ubuntu Jammy] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 8.76 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:32 wazuh-modulesd[27533] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:32 wazuh-modulesd[27533] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:32 wazuh-modulesd[27533] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:32 wazuh-modulesd[27533] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:32 wazuh-modulesd[27533] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.881581 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 8.69 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:41 wazuh-modulesd[27611] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:41 wazuh-modulesd[27611] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:41 wazuh-modulesd[27611] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:41 wazuh-modulesd[27611] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:41 wazuh-modulesd[27611] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.881678 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.64 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:49 wazuh-modulesd[27689] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:49 wazuh-modulesd[27689] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:49 wazuh-modulesd[27689] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:49 wazuh-modulesd[27689] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:49 wazuh-modulesd[27689] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2022/08/11 16:24:49 wazuh-modulesd[27689] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.881777 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 7.67 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:24:57 wazuh-modulesd[27767] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:24:57 wazuh-modulesd[27767] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:24:57 wazuh-modulesd[27767] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:24:57 wazuh-modulesd[27767] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:24:57 wazuh-modulesd[27767] wmodules-vuln-detector.c:1048 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2022/08/11 16:24:57 wazuh-modulesd[27767] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2022-08-11 16:33:26.881874 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 8.61 server 0
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:25:06 wazuh-modulesd[27845] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:25:06 wazuh-modulesd[27845] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:25:06 wazuh-modulesd[27845] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:25:06 wazuh-modulesd[27845] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:25:06 wazuh-modulesd[27845] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2022-08-11 16:33:26.881971 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 11.13 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:25:19 wazuh-modulesd[27938] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:25:19 wazuh-modulesd[27938] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:25:19 wazuh-modulesd[27938] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:25:19 wazuh-modulesd[27938] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:25:19 wazuh-modulesd[27938] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882064 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 10.93 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:25:29 wazuh-modulesd[28027] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:25:29 wazuh-modulesd[28027] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:25:29 wazuh-modulesd[28027] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:25:29 wazuh-modulesd[28027] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:25:29 wazuh-modulesd[28027] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882166 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 8.44 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:25:41 wazuh-modulesd[28128] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:25:41 wazuh-modulesd[28128] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:25:41 wazuh-modulesd[28128] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:25:41 wazuh-modulesd[28128] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:25:41 wazuh-modulesd[28128] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882290 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.64 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:25:48 wazuh-modulesd[28220] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:25:48 wazuh-modulesd[28220] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:25:48 wazuh-modulesd[28220] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:25:48 wazuh-modulesd[28220] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:25:48 wazuh-modulesd[28220] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882390 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 8.82 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:25:56 wazuh-modulesd[28300] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:25:56 wazuh-modulesd[28300] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:25:56 wazuh-modulesd[28300] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:25:56 wazuh-modulesd[28300] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:25:56 wazuh-modulesd[28300] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882488 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 8.58 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:05 wazuh-modulesd[28392] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:05 wazuh-modulesd[28392] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:05 wazuh-modulesd[28392] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:05 wazuh-modulesd[28392] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:05 wazuh-modulesd[28392] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882582 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.60 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:13 wazuh-modulesd[28484] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:13 wazuh-modulesd[28484] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:13 wazuh-modulesd[28484] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:13 wazuh-modulesd[28484] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:13 wazuh-modulesd[28484] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882676 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.86 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:20 wazuh-modulesd[28576] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:20 wazuh-modulesd[28576] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:20 wazuh-modulesd[28576] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:20 wazuh-modulesd[28576] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:20 wazuh-modulesd[28576] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882770 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.58 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:28 wazuh-modulesd[28668] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:28 wazuh-modulesd[28668] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:28 wazuh-modulesd[28668] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:28 wazuh-modulesd[28668] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:28 wazuh-modulesd[28668] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882866 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.43 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:35 wazuh-modulesd[28760] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:35 wazuh-modulesd[28760] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:35 wazuh-modulesd[28760] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:35 wazuh-modulesd[28760] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:35 wazuh-modulesd[28760] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.882960 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 7.18 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:43 wazuh-modulesd[28852] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:43 wazuh-modulesd[28852] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:43 wazuh-modulesd[28852] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:43 wazuh-modulesd[28852] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:43 wazuh-modulesd[28852] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883057 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 6.86 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:50 wazuh-modulesd[28944] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:50 wazuh-modulesd[28944] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:50 wazuh-modulesd[28944] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:50 wazuh-modulesd[28944] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:50 wazuh-modulesd[28944] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883155 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 8.62 server
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:26:58 wazuh-modulesd[29023] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:26:58 wazuh-modulesd[29023] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:26:58 wazuh-modulesd[29023] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:26:58 wazuh-modulesd[29023] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:26:58 wazuh-modulesd[29023] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883282 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.98 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:27:06 wazuh-modulesd[29115] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:27:06 wazuh-modulesd[29115] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:27:06 wazuh-modulesd[29115] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:27:06 wazuh-modulesd[29115] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:27:06 wazuh-modulesd[29115] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:27:06 wazuh-modulesd[29115] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:27:06 wazuh-modulesd[29115] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883380 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 12.04 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:27:16 wazuh-modulesd[29215] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:27:16 wazuh-modulesd[29215] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:27:16 wazuh-modulesd[29215] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:27:16 wazuh-modulesd[29215] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:27:16 wazuh-modulesd[29215] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:27:16 wazuh-modulesd[29215] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883622 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 12.03 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:27:37 wazuh-modulesd[29405] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:27:37 wazuh-modulesd[29405] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:27:37 wazuh-modulesd[29405] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:27:37 wazuh-modulesd[29405] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:27:37 wazuh-modulesd[29405] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2022/08/11 16:27:37 wazuh-modulesd[29405] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883716 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 13.49 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:27:49 wazuh-modulesd[29505] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:27:49 wazuh-modulesd[29505] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:27:49 wazuh-modulesd[29505] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:27:49 wazuh-modulesd[29505] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:27:49 wazuh-modulesd[29505] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 16:27:49 wazuh-modulesd[29505] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883811 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 9.87 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:01 wazuh-modulesd[29614] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:01 wazuh-modulesd[29614] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:01 wazuh-modulesd[29614] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:01 wazuh-modulesd[29614] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:01 wazuh-modulesd[29614] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:28:01 wazuh-modulesd[29614] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.883913 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 12.01 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:12 wazuh-modulesd[29702] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:12 wazuh-modulesd[29702] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:12 wazuh-modulesd[29702] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:12 wazuh-modulesd[29702] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:12 wazuh-modulesd[29702] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:28:12 wazuh-modulesd[29702] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:28:12 wazuh-modulesd[29702] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884011 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 8.86 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:23 wazuh-modulesd[29798] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:23 wazuh-modulesd[29798] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:23 wazuh-modulesd[29798] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:23 wazuh-modulesd[29798] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:23 wazuh-modulesd[29798] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:28:23 wazuh-modulesd[29798] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884239 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 9.87 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:39 wazuh-modulesd[29976] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:39 wazuh-modulesd[29976] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:39 wazuh-modulesd[29976] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:39 wazuh-modulesd[29976] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:39 wazuh-modulesd[29976] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas2_feed.json' | Url: 'none' | Timeout: 300s 2022/08/11 16:28:39 wazuh-modulesd[29976] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884370 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 10.13 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:49 wazuh-modulesd[30076] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:49 wazuh-modulesd[30076] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:49 wazuh-modulesd[30076] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:49 wazuh-modulesd[30076] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:49 wazuh-modulesd[30076] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2022/08/11 16:28:49 wazuh-modulesd[30076] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884469 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 9.97 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:28:59 wazuh-modulesd[30176] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:28:59 wazuh-modulesd[30176] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:28:59 wazuh-modulesd[30176] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:28:59 wazuh-modulesd[30176] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:28:59 wazuh-modulesd[30176] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:28:59 wazuh-modulesd[30176] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884567 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 22.55 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:29:09 wazuh-modulesd[30276] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:29:09 wazuh-modulesd[30276] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:29:09 wazuh-modulesd[30276] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:29:09 wazuh-modulesd[30276] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:29:09 wazuh-modulesd[30276] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:29:09 wazuh-modulesd[30276] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:29:09 wazuh-modulesd[30276] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884665 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 18.47 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:29:31 wazuh-modulesd[30388] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:29:31 wazuh-modulesd[30388] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:29:31 wazuh-modulesd[30388] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:29:31 wazuh-modulesd[30388] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:29:31 wazuh-modulesd[30388] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:29:31 wazuh-modulesd[30388] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884761 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 22.59 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:29:50 wazuh-modulesd[30488] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:29:50 wazuh-modulesd[30488] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:29:50 wazuh-modulesd[30488] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:29:50 wazuh-modulesd[30488] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:29:50 wazuh-modulesd[30488] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:29:50 wazuh-modulesd[30488] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:29:50 wazuh-modulesd[30488] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884868 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 22.52 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:30:12 wazuh-modulesd[30588] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:30:12 wazuh-modulesd[30588] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:30:12 wazuh-modulesd[30588] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:30:12 wazuh-modulesd[30588] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:30:12 wazuh-modulesd[30588] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:30:12 wazuh-modulesd[30588] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.884966 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 8.40 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:30:37 wazuh-modulesd[30699] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:30:37 wazuh-modulesd[30699] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:30:37 wazuh-modulesd[30699] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:30:37 wazuh-modulesd[30699] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:30:37 wazuh-modulesd[30699] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:30:37 wazuh-modulesd[30699] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:30:37 wazuh-modulesd[30699] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885063 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 7.37 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:30:43 wazuh-modulesd[30791] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:30:43 wazuh-modulesd[30791] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:30:43 wazuh-modulesd[30791] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:30:43 wazuh-modulesd[30791] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:30:43 wazuh-modulesd[30791] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:30:43 wazuh-modulesd[30791] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:30:43 wazuh-modulesd[30791] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885174 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 7.00 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:30:51 wazuh-modulesd[30885] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:30:51 wazuh-modulesd[30885] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:30:51 wazuh-modulesd[30885] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:30:51 wazuh-modulesd[30885] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:30:51 wazuh-modulesd[30885] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:30:51 wazuh-modulesd[30885] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:30:51 wazuh-modulesd[30885] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885293 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 20.03 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:30:58 wazuh-modulesd[30977] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:30:58 wazuh-modulesd[30977] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:30:58 wazuh-modulesd[30977] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:30:58 wazuh-modulesd[30977] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:30:58 wazuh-modulesd[30977] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:30:58 wazuh-modulesd[30977] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:30:58 wazuh-modulesd[30977] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-08-11 16:31:11,949 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2022-08-11 16:31:11,950 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:31:11,950 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.885420 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 12.42 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:31:18 wazuh-modulesd[31086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:31:18 wazuh-modulesd[31086] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:31:18 wazuh-modulesd[31086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:31:18 wazuh-modulesd[31086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:31:18 wazuh-modulesd[31086] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:31:18 wazuh-modulesd[31086] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:31:18 wazuh-modulesd[31086] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885520 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 14.09 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:31:30 wazuh-modulesd[31194] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:31:30 wazuh-modulesd[31194] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:31:30 wazuh-modulesd[31194] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:31:30 wazuh-modulesd[31194] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:31:30 wazuh-modulesd[31194] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:31:30 wazuh-modulesd[31194] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:31:30 wazuh-modulesd[31194] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885620 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 7.94 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:31:45 wazuh-modulesd[31291] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:31:45 wazuh-modulesd[31291] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:31:45 wazuh-modulesd[31291] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:31:45 wazuh-modulesd[31291] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:31:45 wazuh-modulesd[31291] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:31:45 wazuh-modulesd[31291] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:31:45 wazuh-modulesd[31291] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885736 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 22.48 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:31:53 wazuh-modulesd[31383] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:31:53 wazuh-modulesd[31383] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:31:53 wazuh-modulesd[31383] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:31:53 wazuh-modulesd[31383] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:31:53 wazuh-modulesd[31383] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:31:53 wazuh-modulesd[31383] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:31:53 wazuh-modulesd[31383] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2022-08-11 16:32:08,930 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2022-08-11 16:32:08,931 - wazuh_testing - ERROR - Results accumulated: 0 2022-08-11 16:32:08,931 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR wazuh_testing:monitoring.py:465 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR wazuh_testing:monitoring.py:466 Results accumulated: 0 ERROR wazuh_testing:monitoring.py:468 Results expected: 1
Passed 2022-08-11 16:33:26.885833 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 18.95 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:32:15 wazuh-modulesd[31477] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:32:15 wazuh-modulesd[31477] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:32:15 wazuh-modulesd[31477] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:32:15 wazuh-modulesd[31477] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:32:15 wazuh-modulesd[31477] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:32:15 wazuh-modulesd[31477] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:32:15 wazuh-modulesd[31477] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.885931 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 13.96 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:32:34 wazuh-modulesd[31571] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:32:34 wazuh-modulesd[31571] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:32:34 wazuh-modulesd[31571] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:32:34 wazuh-modulesd[31571] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:32:34 wazuh-modulesd[31571] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:32:34 wazuh-modulesd[31571] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:32:34 wazuh-modulesd[31571] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.886027 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 9.35 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:32:48 wazuh-modulesd[31665] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:32:48 wazuh-modulesd[31665] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:32:48 wazuh-modulesd[31665] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:32:48 wazuh-modulesd[31665] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:32:48 wazuh-modulesd[31665] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:32:48 wazuh-modulesd[31665] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:32:48 wazuh-modulesd[31665] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.886128 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 7.99 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:32:58 wazuh-modulesd[31762] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:32:58 wazuh-modulesd[31762] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:32:58 wazuh-modulesd[31762] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:32:58 wazuh-modulesd[31762] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:32:58 wazuh-modulesd[31762] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:32:58 wazuh-modulesd[31762] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:32:58 wazuh-modulesd[31762] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.886226 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 8.00 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:33:05 wazuh-modulesd[31847] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:33:05 wazuh-modulesd[31847] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:33:05 wazuh-modulesd[31847] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:33:05 wazuh-modulesd[31847] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:33:05 wazuh-modulesd[31847] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:33:05 wazuh-modulesd[31847] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:33:05 wazuh-modulesd[31847] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.886321 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 8.95 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:33:15 wazuh-modulesd[31940] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:33:15 wazuh-modulesd[31940] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:33:15 wazuh-modulesd[31940] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:33:15 wazuh-modulesd[31940] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:33:15 wazuh-modulesd[31940] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:33:15 wazuh-modulesd[31940] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:33:15 wazuh-modulesd[31940] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2022-08-11 16:33:26.886444 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 9.44 server 1
-----------------------------Captured stderr setup------------------------------
2022/08/11 16:33:23 wazuh-modulesd[32037] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2022/08/11 16:33:23 wazuh-modulesd[32037] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2022/08/11 16:33:23 wazuh-modulesd[32037] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2022/08/11 16:33:23 wazuh-modulesd[32037] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2022/08/11 16:33:23 wazuh-modulesd[32037] wmodules-vuln-detector.c:662 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2022/08/11 16:33:23 wazuh-modulesd[32037] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2022/08/11 16:33:23 wazuh-modulesd[32037] wmodules-vuln-detector.c:720 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/vagrant/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s