R6.html

Report generated on 31-Jul-2023 at 18:33:05 by pytest-html v2.0.1

Environment

Packages {'pytest': '6.2.2', 'pluggy': '0.13.1'}
Platform Linux-5.19.0-46-generic-x86_64-with-glibc2.35
Plugins {'metadata': '2.0.4', 'html': '2.0.1', 'testinfra': '5.0.0'}
Python 3.9.17

Summary

299 tests ran in 3514.63 seconds.

296 passed, 2 skipped, 1 failed, 1 errors, 2 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py 0 26 0 0
test_vulnerability_detector/test_feeds/test_cpe_indexing.py 0 18 0 0
test_vulnerability_detector/test_feeds/test_download_feeds.py 1 23 1 0
test_vulnerability_detector/test_feeds/test_duplicate_feeds.py 0 12 0 0
test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py 0 8 1 0
test_vulnerability_detector/test_feeds/test_msu_inventory.py 0 1 0 0
test_vulnerability_detector/test_feeds/test_validate_feed_content.py 0 45 0 1
test_vulnerability_detector/test_general_settings/test_enabled.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_interval.py 0 4 0 0
test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py 0 1 0 0
test_vulnerability_detector/test_general_settings/test_retry_interval.py 0 2 0 0
test_vulnerability_detector/test_general_settings/test_run_on_start.py 0 2 0 0
test_vulnerability_detector/test_providers/test_enabled.py 0 50 0 0
test_vulnerability_detector/test_providers/test_missing_os.py 0 9 0 0
test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py 0 3 0 0
test_vulnerability_detector/test_providers/test_os.py 0 25 0 0
test_vulnerability_detector/test_providers/test_update_from_year.py 0 7 0 0
test_vulnerability_detector/test_providers/test_update_interval.py 0 8 0 0
test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py 0 14 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py 0 6 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py 0 1 0 0
test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py 0 8 0 0
test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py 0 2 0 0
test_vulnerability_detector/test_scan_types/test_full_scan_type.py 0 4 0 0
test_vulnerability_detector/test_scan_types/test_partial_scan_type.py 0 4 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py 0 1 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py 0 2 0 0
test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py 0 2 0 0

Results

Result Time Test Description Duration Markers Links Tier
Error 2023-07-31 21:10:37.231055 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux0]::setup description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.66 2
metadata = {'decompressed_file': '/tmp/rhel5.xml', 'description': 'Red Hat Enterprise Linux provider', 'expected_format': 'application/x-bzip2', 'extension': 'bz2', ...}

@pytest.fixture
def manage_file(metadata):
"""Download and clean test files.

Args:
metadata (dict): Feed information which comes from metadata test case.
"""
# Download the file
file.download_file(source_url=metadata['url'], dest_path=metadata['path'])

# Decompress files
if 'application/gzip' in metadata['expected_format']:
file.decompress_gzip(gzip_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])
elif 'application/x-bzip2' in metadata['expected_format']:
> file.decompress_bz2(bz2_file_path=metadata['path'], dest_file_path=metadata['decompressed_file'])

test_vulnerability_detector/test_feeds/test_validate_feed_content.py:122:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/file.py:369: in decompress_bz2
dest.write(bz2.decompress(source.read()))
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

data = b'<!doctype html>\n<html class="no-js" lang="en">\n <head>\n <meta charset="utf-8">\n <meta http-equi...class="img-fluid" alt="Red Hat Summit"></a>\n </div>\n </div>\n </div>\n</footer>\n\n\n </body>\n</html>\n'

def decompress(data):
"""Decompress a block of data.

For incremental decompression, use a BZ2Decompressor object instead.
"""
results = []
while data:
decomp = BZ2Decompressor()
try:
> res = decomp.decompress(data)
E OSError: Invalid data stream

/usr/lib/python3.9/bz2.py:347: OSError
Failed 2023-07-31 20:53:22.335768 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL5] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 150.70 2

Test function details

Extended Summary

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.
wazuh_min_version: 4.4.0
tier: 2
parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.
assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.
input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.
expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'

Parameters

configuration = {'metadata': {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Red Hat Enterprise Linux provider', 'download_timeout': 150, 'name': 'RHEL5', 'provider_json_name': 'JSON Red Hat Enterprise Linux', ...}, set_wazuh_configuration_vdt = None
truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')

# Check that the feed update has started
evm.check_provider_database_update_start_log(metadata['provider_name'])
# Check that the feed has been updated successfully
> evm.check_provider_database_update_finish_log(provider_name=metadata['provider_name'],
timeout=metadata['download_timeout'])

test_vulnerability_detector/test_feeds/test_download_feeds.py:142:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:144: in check_provider_database_update_finish_log
check_vuln_detector_event(file_monitor=log_monitor, timeout=timeout,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/modules/vulnerability_detector/event_monitor.py:54: in check_vuln_detector_event
file_monitor.start(timeout=timeout, update_position=update_position, accum_results=accum_results,
/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:202: in start
self._result = monitor.start(timeout=timeout, callback=callback, accum_results=accum_results,
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

self = <wazuh_testing.tools.monitoring.QueueMonitor object at 0x7f87b11b9310>, timeout = 150, callback = <function make_vuln_callback.<locals>.<lambda> at 0x7f87b11f2700>, accum_results = 1
update_position = True, timeout_extra = 0, error_message = 'Could not find Red Hat Enterprise Linux 5 feed finished log'

def start(self, timeout=-1, callback=_callback_default, accum_results=1, update_position=True, timeout_extra=0,
error_message=''):
"""Start the queue monitoring until the stop method is called."""
if not self._continue:
self._continue = True
self._abort = False
result = None

while self._continue:
if self._abort:
self.stop()
if error_message:
logger.error(error_message)
logger.error(f"Results accumulated: "
f"{len(result) if isinstance(result, list) else 0}")
logger.error(f"Results expected: {accum_results}")
> raise TimeoutError(error_message)
E TimeoutError: Could not find Red Hat Enterprise Linux 5 feed finished log

/usr/local/lib/python3.9/dist-packages/wazuh_testing-4.6.0-py3.9.egg/wazuh_testing/tools/monitoring.py:470: TimeoutError
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:51 wazuh-modulesd[311498] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:51 wazuh-modulesd[311498] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:51 wazuh-modulesd[311498] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:51 wazuh-modulesd[311498] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:51 wazuh-modulesd[311498] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 17:53:22,202 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 feed finished log 2023-07-31 17:53:22,202 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:53:22,202 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 5 feed finished log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
XFailed 2023-07-31 20:54:48.658862 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BIONIC] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 0.00 2
configuration = {'metadata': {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu...led': {'value': 'yes'}}], 'section': 'wodle'}, {'elements': [{'disabled': {'value': 'yes'}}], 'section': 'auth'}, ...]}
metadata = {'description': 'Canonical provider', 'download_timeout': 120, 'name': 'BIONIC', 'provider_name': 'Ubuntu Bionic', ...}, set_wazuh_configuration_vdt = None, truncate_monitored_files = None
clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_download_feeds(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check if modulesd downloads successfully the feeds from different providers and os, and check that
the feed update date does not exceed a set limit.

test_phases:
- Set a custom Wazuh configuration.
- Restart wazuh-modulesd.
- Check in log that the database provider has been updated successfully.
- Check that the timestamp of the feed metadata does not exceed the established threshold limit.

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Wazuh configuration data. Needed for set_wazuh_configuration fixture.
- metadata:
type: dict
brief: Wazuh configuration metadata
- set_wazuh_configuration_vdt:
type: fixture
brief: Set the wazuh configuration according to the configuration data.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all the CVE tables before and after running the test.
- restart_modulesd_function:
type: fixture
brief: Restart the wazuh-modulesd daemon.

assertions:
- Check that it starts the feed download.
- Check that the feed is downloaded successfully.
- Check that the feed update date does not exceed a set limit.

input_description:
- The `configuration_download_feeds.yaml` file provides the module configuration for this test.
- The `cases_download_feeds` file provides the test cases.

expected_output:
- r'Starting .* database update'
- r'The update of the .* feed finished successfully'
'''
if metadata['provider_os'] == 'BIONIC':
> pytest.xfail(reason='Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556')
E _pytest.outcomes.XFailed: Ubuntu Bionic feed parsing error - Wazuh/Wazuh Issue #13556

test_vulnerability_detector/test_feeds/test_download_feeds.py:137: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:54:48 wazuh-modulesd[313301] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:54:48 wazuh-modulesd[313301] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:54:48 wazuh-modulesd[313301] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:54:48 wazuh-modulesd[313301] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:54:48 wazuh-modulesd[313301] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
XFailed 2023-07-31 21:08:43.036907 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[NVD - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 0.00 server 2
configuration = {'sections': [{'elements': [{'enabled': {'value': 'yes'}}, {'run_on_start': {'value': 'yes'}}, {'provider': {'attribut...check'}, {'attributes': [{'name': 'syscollector'}], 'elements': [{'disabled': {'value': 'yes'}}], 'section': 'wodle'}]}
metadata = {'custom_feed_url': 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3', 'description': 'Ch...and parsing of JPG file as invalid feed in the NVD', 'name': 'NVD - MP3', 'provider_feed_names': ['nvd provider'], ...}
set_wazuh_configuration_vdt = None, truncate_monitored_files = None, clean_cve_tables_func = None, restart_modulesd_function = None

@pytest.mark.tier(level=2)
@pytest.mark.parametrize('configuration, metadata', zip(configurations, configuration_metadata), ids=case_ids)
def test_import_invalid_feed_type(configuration, metadata, set_wazuh_configuration_vdt, truncate_monitored_files,
clean_cve_tables_func, restart_modulesd_function):
'''
description: Check the vulnerability detector behavior when importing unexpected file types as feeds.

test_phases:
- Set a custom Wazuh configuration, with custom URL feeds which refer to files of unexpected type.
- Check the error when updating the provider data.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

wazuh_min_version: 4.4.0

tier: 2

parameters:
- configuration:
type: dict
brief: Configuration loaded from `configuration_template`.
- metadata:
type: dict
brief: Test case metadata.
- set_wazuh_configuration_vdt:
type: fixture
brief: Set wazuh configuration.
- truncate_monitored_files:
type: fixture
brief: Truncate all the log files and json alerts files before and after the test execution.
- clean_cve_tables_func:
type: fixture
brief: Clean all CVE tables.
- restart_modulesd_function:
type: fixture
brief: Restart wazuh-modulesd daemon before starting a test, and stop it after finishing.

assertions:
- Check the error when updating the provider database.
- Check the error when updating the CVE database.
- Check that no junk data has been inserted into the database.
- Check that wazuh-modulesd is running (it has not crashed after parsing unexpected file types).

input_description:
- The `configuration_import_invalid_feed_type.yaml` file provides the module configuration for this test.
- The `cases_import_invalid_feed_type` file provides the test cases.

expected_output:
- r"Failed when updating '{provider_feed_name}' database"
- r"ERROR: .* CVE database could not be updated."
'''
if metadata['target'] == 'nvd':
> pytest.xfail(reason='no error reported when importing invalid NVD feed. '
'https://github.com/wazuh/wazuh/issues/5210')
E _pytest.outcomes.XFailed: no error reported when importing invalid NVD feed. https://github.com/wazuh/wazuh/issues/5210

test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py:145: XFailed
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:43 wazuh-modulesd[321930] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:43 wazuh-modulesd[321930] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:43 wazuh-modulesd[321930] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:43 wazuh-modulesd[321930] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:43 wazuh-modulesd[321930] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Update since: 2010 | Timeout: 300s
Skipped 2023-07-31 21:24:06.821795 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 0.00 server 1
('/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py', 146, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:24:06 wazuh-modulesd[341086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:24:06 wazuh-modulesd[341086] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:24:06 wazuh-modulesd[341086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:24:06 wazuh-modulesd[341086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:24:06 wazuh-modulesd[341086] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:24:06 wazuh-modulesd[341086] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Skipped 2023-07-31 21:25:29.303206 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Canonical] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 0.00 server 1
('/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py', 145, 'Skipped: OVAL does not have any vulnerability yet, it is not possible to scan the Ubuntu 22 agent.')
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:25:29 wazuh-modulesd[343086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:25:29 wazuh-modulesd[343086] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:25:29 wazuh-modulesd[343086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:25:29 wazuh-modulesd[343086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:25:29 wazuh-modulesd[343086] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:25:29 wazuh-modulesd[343086] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:34:39.837261 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong source vendor fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:34:38 wazuh-modulesd[302845] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:34:38 wazuh-modulesd[302845] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:34:38 wazuh-modulesd[302845] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:34:38 wazuh-modulesd[302845] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:34:38 wazuh-modulesd[302845] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:34:38 wazuh-modulesd[302845] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:34:49.129367 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong translation product fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:34:48 wazuh-modulesd[303000] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:34:48 wazuh-modulesd[303000] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:34:48 wazuh-modulesd[303000] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:34:48 wazuh-modulesd[303000] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:34:48 wazuh-modulesd[303000] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:34:48 wazuh-modulesd[303000] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:35:03.930610 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong version field] description: Check for invalid tags in the cpe_helper.json file. 6.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:34:57 wazuh-modulesd[303135] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:34:57 wazuh-modulesd[303135] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:34:57 wazuh-modulesd[303135] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:34:57 wazuh-modulesd[303135] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:34:57 wazuh-modulesd[303135] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:34:57 wazuh-modulesd[303135] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:35:13.448802 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong format_version fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:35:12 wazuh-modulesd[303306] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:35:12 wazuh-modulesd[303306] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:35:12 wazuh-modulesd[303306] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:35:12 wazuh-modulesd[303306] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:35:12 wazuh-modulesd[303306] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:35:12 wazuh-modulesd[303306] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:35:22.520190 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong update_date fields] description: Check for invalid tags in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:35:21 wazuh-modulesd[303436] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:35:21 wazuh-modulesd[303436] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:35:21 wazuh-modulesd[303436] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:35:21 wazuh-modulesd[303436] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:35:21 wazuh-modulesd[303436] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:35:21 wazuh-modulesd[303436] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:37:10.919807 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_tags[Wrong target field] description: Check for invalid tags in the cpe_helper.json file. 100.11 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:35:30 wazuh-modulesd[303581] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:35:30 wazuh-modulesd[303581] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:35:30 wazuh-modulesd[303581] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:35:30 wazuh-modulesd[303581] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:35:30 wazuh-modulesd[303581] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:35:30 wazuh-modulesd[303581] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 17:35:50,813 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-31 17:35:50,813 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:35:50,813 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:36:10,838 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-31 17:36:10,838 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:36:10,838 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:36:30,860 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-31 17:36:30,860 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:36:30,860 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:36:50,892 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-31 17:36:50,892 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:36:50,892 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:37:10,904 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-31 17:37:10,904 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:37:10,905 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 20:37:25.249186 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong version value] description: Check for invalid values in the cpe_helper.json file. 6.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:37:18 wazuh-modulesd[304289] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:37:18 wazuh-modulesd[304289] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:37:18 wazuh-modulesd[304289] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:37:18 wazuh-modulesd[304289] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:37:18 wazuh-modulesd[304289] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:37:18 wazuh-modulesd[304289] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:37:40.454687 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong update_date value] description: Check for invalid values in the cpe_helper.json file. 6.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:37:33 wazuh-modulesd[304446] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:37:33 wazuh-modulesd[304446] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:37:33 wazuh-modulesd[304446] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:37:33 wazuh-modulesd[304446] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:37:33 wazuh-modulesd[304446] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:37:33 wazuh-modulesd[304446] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:37:55.677997 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong target value] description: Check for invalid values in the cpe_helper.json file. 6.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:37:49 wazuh-modulesd[304607] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:37:49 wazuh-modulesd[304607] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:37:49 wazuh-modulesd[304607] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:37:49 wazuh-modulesd[304607] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:37:49 wazuh-modulesd[304607] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:37:49 wazuh-modulesd[304607] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:38:05.452242 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong format_version value] description: Check for invalid values in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:38:04 wazuh-modulesd[304794] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:38:04 wazuh-modulesd[304794] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:38:04 wazuh-modulesd[304794] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:38:04 wazuh-modulesd[304794] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:38:04 wazuh-modulesd[304794] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:38:04 wazuh-modulesd[304794] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:39:53.874874 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong source vendor value] description: Check for invalid values in the cpe_helper.json file. 100.13 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:38:13 wazuh-modulesd[304926] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:38:13 wazuh-modulesd[304926] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:38:13 wazuh-modulesd[304926] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:38:13 wazuh-modulesd[304926] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:38:13 wazuh-modulesd[304926] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:38:13 wazuh-modulesd[304926] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 17:38:33,759 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-31 17:38:33,759 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:38:33,759 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:38:53,792 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-31 17:38:53,792 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:38:53,792 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:39:13,808 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-31 17:39:13,808 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:39:13,808 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:39:33,833 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-31 17:39:33,834 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:39:33,834 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:39:53,856 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-31 17:39:53,856 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:39:53,856 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 20:41:42.882671 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong source product value] description: Check for invalid values in the cpe_helper.json file. 100.12 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:40:02 wazuh-modulesd[305480] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:40:02 wazuh-modulesd[305480] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:40:02 wazuh-modulesd[305480] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:40:02 wazuh-modulesd[305480] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:40:02 wazuh-modulesd[305480] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:40:02 wazuh-modulesd[305480] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 17:40:22,772 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-31 17:40:22,772 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:40:22,772 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:40:42,799 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-31 17:40:42,799 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:40:42,799 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:41:02,814 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-31 17:41:02,814 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:41:02,814 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:41:22,839 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-31 17:41:22,840 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:41:22,840 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:41:42,881 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-31 17:41:42,881 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:41:42,881 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 20:41:52.629712 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_wrong_values[Wrong action value] description: Check for invalid values in the cpe_helper.json file. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:41:51 wazuh-modulesd[306087] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:41:51 wazuh-modulesd[306087] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:41:51 wazuh-modulesd[306087] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:41:51 wazuh-modulesd[306087] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:41:51 wazuh-modulesd[306087] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:41:51 wazuh-modulesd[306087] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:42:07.422423 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing version field] description: Check for log when there is a missing field in the cpe_helper.json file. 6.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:42:00 wazuh-modulesd[306216] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:42:00 wazuh-modulesd[306216] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:42:00 wazuh-modulesd[306216] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:42:00 wazuh-modulesd[306216] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:42:00 wazuh-modulesd[306216] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:42:00 wazuh-modulesd[306216] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:42:20.673157 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing format_version field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:42:16 wazuh-modulesd[306378] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:42:16 wazuh-modulesd[306378] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:42:16 wazuh-modulesd[306378] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:42:16 wazuh-modulesd[306378] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:42:16 wazuh-modulesd[306378] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:42:16 wazuh-modulesd[306378] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:42:33.818222 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing update_date field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:42:29 wazuh-modulesd[306525] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:42:29 wazuh-modulesd[306525] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:42:29 wazuh-modulesd[306525] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:42:29 wazuh-modulesd[306525] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:42:29 wazuh-modulesd[306525] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:42:29 wazuh-modulesd[306525] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:44:22.605743 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing target field] description: Check for log when there is a missing field in the cpe_helper.json file. 100.11 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:42:42 wazuh-modulesd[306672] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:42:42 wazuh-modulesd[306672] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:42:42 wazuh-modulesd[306672] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:42:42 wazuh-modulesd[306672] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:42:42 wazuh-modulesd[306672] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:42:42 wazuh-modulesd[306672] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 17:43:02,497 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-31 17:43:02,497 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:43:02,497 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:43:22,518 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-31 17:43:22,518 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:43:22,518 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:43:42,539 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-31 17:43:42,540 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:43:42,540 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:44:02,562 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-31 17:44:02,562 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:44:02,563 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:44:22,587 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-31 17:44:22,587 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:44:22,587 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 20:46:10.931068 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing action field] description: Check for log when there is a missing field in the cpe_helper.json file. 100.12 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:44:30 wazuh-modulesd[307246] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:44:30 wazuh-modulesd[307246] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:44:30 wazuh-modulesd[307246] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:44:30 wazuh-modulesd[307246] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:44:30 wazuh-modulesd[307246] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:44:30 wazuh-modulesd[307246] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 17:44:50,815 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed 2023-07-31 17:44:50,816 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:44:50,816 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:45:10,845 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed 2023-07-31 17:45:10,845 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:45:10,845 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:45:30,858 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed 2023-07-31 17:45:30,859 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:45:30,859 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:45:50,885 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed 2023-07-31 17:45:50,885 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:45:50,885 - wazuh_testing - ERROR - Results expected: 1 2023-07-31 17:46:10,911 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed 2023-07-31 17:46:10,911 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 17:46:10,911 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-0.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-1.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-2.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-3.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1 ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: The CPE .*a:wazuh-mocking:custom-package-4.* from the agent '001' was indexed ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 20:46:24.006243 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing vendor field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:46:19 wazuh-modulesd[307830] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:46:19 wazuh-modulesd[307830] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:46:19 wazuh-modulesd[307830] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:46:19 wazuh-modulesd[307830] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:46:19 wazuh-modulesd[307830] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:46:19 wazuh-modulesd[307830] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:46:37.299232 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_missing_field[Missing product field] description: Check for log when there is a missing field in the cpe_helper.json file. 4.51 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:46:32 wazuh-modulesd[307976] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:46:32 wazuh-modulesd[307976] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:46:32 wazuh-modulesd[307976] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:46:32 wazuh-modulesd[307976] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:46:32 wazuh-modulesd[307976] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:46:32 wazuh-modulesd[307976] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:46:51.260492 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing vendor field] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:46:45 wazuh-modulesd[308134] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:46:45 wazuh-modulesd[308134] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:46:45 wazuh-modulesd[308134] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:46:45 wazuh-modulesd[308134] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:46:45 wazuh-modulesd[308134] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:46:45 wazuh-modulesd[308134] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:47:04.955748 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing vendor and version fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:46:59 wazuh-modulesd[308300] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:46:59 wazuh-modulesd[308300] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:46:59 wazuh-modulesd[308300] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:46:59 wazuh-modulesd[308300] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:46:59 wazuh-modulesd[308300] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:46:59 wazuh-modulesd[308300] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:47:18.423647 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing set_version_if_product_matches action field] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:47:13 wazuh-modulesd[308453] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:47:13 wazuh-modulesd[308453] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:47:13 wazuh-modulesd[308453] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:47:13 wazuh-modulesd[308453] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:47:13 wazuh-modulesd[308453] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:47:13 wazuh-modulesd[308453] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:47:33.066752 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Replace_vendor instead of set_version_if_product_matches action fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:47:28 wazuh-modulesd[308623] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:47:28 wazuh-modulesd[308623] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:47:28 wazuh-modulesd[308623] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:47:28 wazuh-modulesd[308623] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:47:28 wazuh-modulesd[308623] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:47:28 wazuh-modulesd[308623] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:47:47.875326 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_fields[Missing all source fields] description: Check if the packages are indexed in the database by checking the respective log in the ossec.log file,. and if the alert of the vulnerable package comes out when some tag are empty. 6.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:47:41 wazuh-modulesd[308770] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:47:41 wazuh-modulesd[308770] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:47:41 wazuh-modulesd[308770] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:47:41 wazuh-modulesd[308770] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:47:41 wazuh-modulesd[308770] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:47:41 wazuh-modulesd[308770] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:00.859155 test_vulnerability_detector/test_cpe_helper/test_cpe_helper.py::test_cpe_indexing_empty_vendor_version[Missing all the source fields and version translation field] description: Check that when vendor and version tags are empty, and the action tag is not the correct to. extract the version field, the package cannot be indexed. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:47:56 wazuh-modulesd[308952] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:47:56 wazuh-modulesd[308952] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:47:56 wazuh-modulesd[308952] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:47:56 wazuh-modulesd[308952] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:47:56 wazuh-modulesd[308952] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:47:56 wazuh-modulesd[308952] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_cpe_helper/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:12.573067 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_packages[WINDOWS] description: Check that the CPE helper info related to the packages data is indexed. 2.01 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:48:10 wazuh-modulesd[309121] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:48:10 wazuh-modulesd[309121] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:48:10 wazuh-modulesd[309121] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:48:10 wazuh-modulesd[309121] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:48:10 wazuh-modulesd[309121] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:22.851804 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_XP] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:48:21 wazuh-modulesd[309274] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:48:21 wazuh-modulesd[309274] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:48:21 wazuh-modulesd[309274] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:48:21 wazuh-modulesd[309274] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:48:21 wazuh-modulesd[309274] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:48:21 wazuh-modulesd[309274] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:32.099752 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_VISTA] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:48:31 wazuh-modulesd[309412] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:48:31 wazuh-modulesd[309412] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:48:31 wazuh-modulesd[309412] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:48:31 wazuh-modulesd[309412] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:48:31 wazuh-modulesd[309412] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:48:31 wazuh-modulesd[309412] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:41.171251 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_7] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:48:40 wazuh-modulesd[309559] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:48:40 wazuh-modulesd[309559] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:48:40 wazuh-modulesd[309559] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:48:40 wazuh-modulesd[309559] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:48:40 wazuh-modulesd[309559] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:48:40 wazuh-modulesd[309559] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:50.444429 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:48:49 wazuh-modulesd[309708] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:48:49 wazuh-modulesd[309708] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:48:49 wazuh-modulesd[309708] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:48:49 wazuh-modulesd[309708] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:48:49 wazuh-modulesd[309708] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:48:49 wazuh-modulesd[309708] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:48:59.256441 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_8_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:48:58 wazuh-modulesd[309835] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:48:58 wazuh-modulesd[309835] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:48:58 wazuh-modulesd[309835] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:48:58 wazuh-modulesd[309835] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:48:58 wazuh-modulesd[309835] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:48:58 wazuh-modulesd[309835] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:49:08.551715 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_10] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:49:07 wazuh-modulesd[309963] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:49:07 wazuh-modulesd[309963] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:49:07 wazuh-modulesd[309963] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:49:07 wazuh-modulesd[309963] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:49:07 wazuh-modulesd[309963] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:49:07 wazuh-modulesd[309963] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:49:17.840003 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_11] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:49:16 wazuh-modulesd[310092] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:49:16 wazuh-modulesd[310092] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:49:16 wazuh-modulesd[310092] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:49:16 wazuh-modulesd[310092] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:49:16 wazuh-modulesd[310092] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:49:16 wazuh-modulesd[310092] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:49:26.840701 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:49:25 wazuh-modulesd[310220] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:49:25 wazuh-modulesd[310220] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:49:25 wazuh-modulesd[310220] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:49:25 wazuh-modulesd[310220] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:49:25 wazuh-modulesd[310220] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:49:25 wazuh-modulesd[310220] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:49:35.574156 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2003_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:49:34 wazuh-modulesd[310350] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:49:34 wazuh-modulesd[310350] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:49:34 wazuh-modulesd[310350] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:49:34 wazuh-modulesd[310350] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:49:34 wazuh-modulesd[310350] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:49:34 wazuh-modulesd[310350] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:49:44.846913 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:49:43 wazuh-modulesd[310477] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:49:43 wazuh-modulesd[310477] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:49:43 wazuh-modulesd[310477] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:49:43 wazuh-modulesd[310477] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:49:43 wazuh-modulesd[310477] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:49:43 wazuh-modulesd[310477] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:49:54.101386 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2008_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:49:53 wazuh-modulesd[310609] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:49:53 wazuh-modulesd[310609] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:49:53 wazuh-modulesd[310609] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:49:53 wazuh-modulesd[310609] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:49:53 wazuh-modulesd[310609] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:49:53 wazuh-modulesd[310609] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:50:03.366912 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:02 wazuh-modulesd[310737] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:02 wazuh-modulesd[310737] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:02 wazuh-modulesd[310737] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:02 wazuh-modulesd[310737] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:02 wazuh-modulesd[310737] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:50:02 wazuh-modulesd[310737] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:50:12.590600 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2012_R2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:11 wazuh-modulesd[310865] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:11 wazuh-modulesd[310865] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:11 wazuh-modulesd[310865] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:11 wazuh-modulesd[310865] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:11 wazuh-modulesd[310865] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:50:11 wazuh-modulesd[310865] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:50:21.682731 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2016] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:20 wazuh-modulesd[310994] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:20 wazuh-modulesd[310994] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:20 wazuh-modulesd[310994] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:20 wazuh-modulesd[310994] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:20 wazuh-modulesd[310994] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:50:20 wazuh-modulesd[310994] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:50:30.648797 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2019] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:29 wazuh-modulesd[311121] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:29 wazuh-modulesd[311121] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:29 wazuh-modulesd[311121] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:29 wazuh-modulesd[311121] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:29 wazuh-modulesd[311121] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:50:29 wazuh-modulesd[311121] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:50:39.608020 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_1] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 1.00 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:38 wazuh-modulesd[311250] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:38 wazuh-modulesd[311250] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:38 wazuh-modulesd[311250] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:38 wazuh-modulesd[311250] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:38 wazuh-modulesd[311250] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:50:38 wazuh-modulesd[311250] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:50:48.366155 test_vulnerability_detector/test_feeds/test_cpe_indexing.py::test_cpe_indexing_system[WINDOWS_SERVER_2022_2] description: Check that the CPE helper info related to the system data is indexed. Tested for each Windows version. 0.50 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:50:47 wazuh-modulesd[311406] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:50:47 wazuh-modulesd[311406] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:50:47 wazuh-modulesd[311406] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:50:47 wazuh-modulesd[311406] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:50:47 wazuh-modulesd[311406] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 17:50:47 wazuh-modulesd[311406] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 20:53:42.555379 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL6] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 17.03 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:53:25 wazuh-modulesd[312360] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:53:25 wazuh-modulesd[312360] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:53:25 wazuh-modulesd[312360] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:53:25 wazuh-modulesd[312360] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:53:25 wazuh-modulesd[312360] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:54:01.091964 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL7] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 15.02 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:53:46 wazuh-modulesd[312577] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:53:46 wazuh-modulesd[312577] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:53:46 wazuh-modulesd[312577] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:53:46 wazuh-modulesd[312577] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:53:46 wazuh-modulesd[312577] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:54:18.225428 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[RHEL8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 13.52 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:54:04 wazuh-modulesd[312774] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:54:04 wazuh-modulesd[312774] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:54:04 wazuh-modulesd[312774] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:54:04 wazuh-modulesd[312774] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:54:04 wazuh-modulesd[312774] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:54:31.783201 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[TRUSTY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.01 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:54:21 wazuh-modulesd[312988] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:54:21 wazuh-modulesd[312988] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:54:21 wazuh-modulesd[312988] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:54:21 wazuh-modulesd[312988] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:54:21 wazuh-modulesd[312988] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:54:45.231281 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[XENIAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.01 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:54:35 wazuh-modulesd[313147] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:54:35 wazuh-modulesd[313147] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:54:35 wazuh-modulesd[313147] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:54:35 wazuh-modulesd[313147] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:54:35 wazuh-modulesd[313147] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:55:01.898720 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[FOCAL] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.01 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:54:51 wazuh-modulesd[313393] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:54:51 wazuh-modulesd[313393] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:54:51 wazuh-modulesd[313393] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:54:51 wazuh-modulesd[313393] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:54:51 wazuh-modulesd[313393] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:55:13.327663 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[JAMMY] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 8.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:55:05 wazuh-modulesd[313549] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:55:05 wazuh-modulesd[313549] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:55:05 wazuh-modulesd[313549] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:55:05 wazuh-modulesd[313549] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:55:05 wazuh-modulesd[313549] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:55:28.935630 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BUSTER] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 12.27 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:55:16 wazuh-modulesd[313719] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:55:16 wazuh-modulesd[313719] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:55:16 wazuh-modulesd[313719] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:55:16 wazuh-modulesd[313719] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:55:16 wazuh-modulesd[313719] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:55:44.583511 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[BULLSEYE] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 12.35 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:55:32 wazuh-modulesd[313881] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:55:32 wazuh-modulesd[313881] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:55:32 wazuh-modulesd[313881] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:55:32 wazuh-modulesd[313881] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:55:32 wazuh-modulesd[313881] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:55:52.998576 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ARCH] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.04 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:55:47 wazuh-modulesd[314048] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:55:47 wazuh-modulesd[314048] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:55:47 wazuh-modulesd[314048] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:55:47 wazuh-modulesd[314048] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:55:47 wazuh-modulesd[314048] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/31 17:55:47 wazuh-modulesd[314048] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 20:55:58.555638 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:55:56 wazuh-modulesd[314195] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:55:56 wazuh-modulesd[314195] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:55:56 wazuh-modulesd[314195] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:55:56 wazuh-modulesd[314195] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:55:56 wazuh-modulesd[314195] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:56:04.205703 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:56:01 wazuh-modulesd[314313] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:56:01 wazuh-modulesd[314313] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:56:01 wazuh-modulesd[314313] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:56:01 wazuh-modulesd[314313] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:56:01 wazuh-modulesd[314313] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 20:56:09.829235 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[ALAS-2022] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:56:07 wazuh-modulesd[314487] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:56:07 wazuh-modulesd[314487] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:56:07 wazuh-modulesd[314487] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:56:07 wazuh-modulesd[314487] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:56:07 wazuh-modulesd[314487] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:02:05.774060 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[NVD] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 352.72 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 17:56:13 wazuh-modulesd[314623] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 17:56:13 wazuh-modulesd[314623] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 17:56:13 wazuh-modulesd[314623] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 17:56:13 wazuh-modulesd[314623] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 17:56:13 wazuh-modulesd[314623] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/31 17:56:13 wazuh-modulesd[314623] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:02:21.011213 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[MSU] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 5.34 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:02:15 wazuh-modulesd[317193] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:02:15 wazuh-modulesd[317193] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:02:15 wazuh-modulesd[317193] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:02:15 wazuh-modulesd[317193] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:02:15 wazuh-modulesd[317193] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/31 18:02:15 wazuh-modulesd[317193] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:02:35.240290 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 10.51 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:02:24 wazuh-modulesd[317340] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:02:24 wazuh-modulesd[317340] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:02:24 wazuh-modulesd[317340] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:02:24 wazuh-modulesd[317340] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:02:24 wazuh-modulesd[317340] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:03:04.938703 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 26.03 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:02:38 wazuh-modulesd[317503] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:02:38 wazuh-modulesd[317503] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:02:38 wazuh-modulesd[317503] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:02:38 wazuh-modulesd[317503] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:02:38 wazuh-modulesd[317503] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:03:50.862554 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 41.32 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:03:09 wazuh-modulesd[317793] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:03:09 wazuh-modulesd[317793] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:03:09 wazuh-modulesd[317793] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:03:09 wazuh-modulesd[317793] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:03:09 wazuh-modulesd[317793] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:03:58.381980 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 2.00 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:03:56 wazuh-modulesd[318092] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:03:56 wazuh-modulesd[318092] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:03:56 wazuh-modulesd[318092] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:03:56 wazuh-modulesd[318092] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:03:56 wazuh-modulesd[318092] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:04:07.654915 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 6.01 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:04:01 wazuh-modulesd[318193] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:04:01 wazuh-modulesd[318193] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:04:01 wazuh-modulesd[318193] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:04:01 wazuh-modulesd[318193] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:04:01 wazuh-modulesd[318193] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:04:34.639438 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 23.33 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:04:11 wazuh-modulesd[318316] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:04:11 wazuh-modulesd[318316] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:04:11 wazuh-modulesd[318316] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:04:11 wazuh-modulesd[318316] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:04:11 wazuh-modulesd[318316] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:04:46.358448 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[AlmaLinux 8] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 7.01 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:04:39 wazuh-modulesd[318585] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:04:39 wazuh-modulesd[318585] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:04:39 wazuh-modulesd[318585] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:04:39 wazuh-modulesd[318585] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:04:39 wazuh-modulesd[318585] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:04:53.714555 test_vulnerability_detector/test_feeds/test_download_feeds.py::test_download_feeds[AlmaLinux 9] description: Check if modulesd downloads successfully the feeds from different providers and os, and check that. the feed update date does not exceed a set limit. 4.02 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:04:49 wazuh-modulesd[318782] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:04:49 wazuh-modulesd[318782] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:04:49 wazuh-modulesd[318782] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:04:49 wazuh-modulesd[318782] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:04:49 wazuh-modulesd[318782] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (9) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:05:09.666889 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[RedHat] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.74 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:04:56 wazuh-modulesd[318911] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:04:56 wazuh-modulesd[318911] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:04:56 wazuh-modulesd[318911] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:04:56 wazuh-modulesd[318911] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:04:56 wazuh-modulesd[318911] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:04:56 wazuh-modulesd[318911] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-07-31 21:05:24.907297 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Debian] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:05:12 wazuh-modulesd[319094] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:05:12 wazuh-modulesd[319094] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:05:12 wazuh-modulesd[319094] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:05:12 wazuh-modulesd[319094] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:05:12 wazuh-modulesd[319094] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (Buster) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:05:40.420708 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Trusty] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.31 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:05:28 wazuh-modulesd[319268] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:05:28 wazuh-modulesd[319268] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:05:28 wazuh-modulesd[319268] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:05:28 wazuh-modulesd[319268] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:05:28 wazuh-modulesd[319268] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:05:55.942692 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Xenial] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.35 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:05:43 wazuh-modulesd[319447] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:05:43 wazuh-modulesd[319447] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:05:43 wazuh-modulesd[319447] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:05:43 wazuh-modulesd[319447] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:05:43 wazuh-modulesd[319447] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:06:11.748535 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Bionic] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.59 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:05:59 wazuh-modulesd[319651] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:05:59 wazuh-modulesd[319651] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:05:59 wazuh-modulesd[319651] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:05:59 wazuh-modulesd[319651] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:05:59 wazuh-modulesd[319651] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:06:27.246233 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Focal] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.31 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:06:14 wazuh-modulesd[319883] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:06:14 wazuh-modulesd[319883] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:06:14 wazuh-modulesd[319883] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:06:14 wazuh-modulesd[319883] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:06:14 wazuh-modulesd[319883] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:06:42.742282 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Ubuntu Jammy] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.31 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:06:30 wazuh-modulesd[320070] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:06:30 wazuh-modulesd[320070] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:06:30 wazuh-modulesd[320070] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:06:30 wazuh-modulesd[320070] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:06:30 wazuh-modulesd[320070] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/canonical/custom_canonical_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:06:58.261842 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[ALAS] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.31 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:06:45 wazuh-modulesd[320251] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:06:45 wazuh-modulesd[320251] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:06:45 wazuh-modulesd[320251] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:06:45 wazuh-modulesd[320251] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:06:45 wazuh-modulesd[320251] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/alas/custom_alas_feed.json' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:07:14.497745 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[Arch] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 13.05 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:07:01 wazuh-modulesd[320438] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:07:01 wazuh-modulesd[320438] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:07:01 wazuh-modulesd[320438] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:07:01 wazuh-modulesd[320438] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:07:01 wazuh-modulesd[320438] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/31 18:07:01 wazuh-modulesd[320438] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:07:29.769271 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[MSU] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.09 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:07:17 wazuh-modulesd[320612] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:07:17 wazuh-modulesd[320612] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:07:17 wazuh-modulesd[320612] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:07:17 wazuh-modulesd[320612] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:07:17 wazuh-modulesd[320612] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/31 18:07:17 wazuh-modulesd[320612] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/msu/custom_msu.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:07:45.316577 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[SUSE] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.35 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:07:32 wazuh-modulesd[320811] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:07:32 wazuh-modulesd[320811] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:07:32 wazuh-modulesd[320811] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:07:32 wazuh-modulesd[320811] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:07:32 wazuh-modulesd[320811] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:08:00.841126 test_vulnerability_detector/test_feeds/test_duplicate_feeds.py::test_duplicate_feeds[AlmaLinux] description: Check that the vulnerabilities are not repeated in the database when they are indexed from the feeds. 12.35 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:07:48 wazuh-modulesd[321016] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:07:48 wazuh-modulesd[321016] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:07:48 wazuh-modulesd[321016] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:07:48 wazuh-modulesd[321016] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:07:48 wazuh-modulesd[321016] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 10s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_feeds/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:08:07.381354 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[RHEL - PDF] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.36 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:04 wazuh-modulesd[321205] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:04 wazuh-modulesd[321205] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:04 wazuh-modulesd[321205] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:04 wazuh-modulesd[321205] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:04 wazuh-modulesd[321205] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Timeout: 300s 2023/07/31 18:08:04 wazuh-modulesd[321205] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.pdf' | Update since: 1999 | Timeout: 300s
Passed 2023-07-31 21:08:13.610387 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Debian - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.06 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:10 wazuh-modulesd[321326] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:10 wazuh-modulesd[321326] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:10 wazuh-modulesd[321326] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:10 wazuh-modulesd[321326] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:10 wazuh-modulesd[321326] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-31 21:08:20.851332 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Canonical - MP3] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.06 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:16 wazuh-modulesd[321446] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:16 wazuh-modulesd[321446] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:16 wazuh-modulesd[321446] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:16 wazuh-modulesd[321446] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:16 wazuh-modulesd[321446] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.mp3' | Timeout: 300s
Passed 2023-07-31 21:08:27.094329 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[ALAS - DOC] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:24 wazuh-modulesd[321573] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:24 wazuh-modulesd[321573] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:24 wazuh-modulesd[321573] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:24 wazuh-modulesd[321573] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:24 wazuh-modulesd[321573] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.doc' | Timeout: 300s
Passed 2023-07-31 21:08:34.321476 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[Arch - AVI] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 4.06 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:30 wazuh-modulesd[321690] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:30 wazuh-modulesd[321690] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:30 wazuh-modulesd[321690] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:30 wazuh-modulesd[321690] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:30 wazuh-modulesd[321690] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.avi' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:08:39.845111 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[MSU - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 2.35 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:37 wazuh-modulesd[321811] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:37 wazuh-modulesd[321811] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:37 wazuh-modulesd[321811] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:37 wazuh-modulesd[321811] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:37 wazuh-modulesd[321811] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:08:49.280884 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[SUSE - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.06 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:46 wazuh-modulesd[322018] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:46 wazuh-modulesd[322018] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:46 wazuh-modulesd[322018] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:46 wazuh-modulesd[322018] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:46 wazuh-modulesd[322018] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-31 21:08:55.536624 test_vulnerability_detector/test_feeds/test_import_invalid_feed_type.py::test_import_invalid_feed_type[AlmaLinux - JPG] description: Check the vulnerability detector behavior when importing unexpected file types as feeds. 3.05 server 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:52 wazuh-modulesd[322148] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:52 wazuh-modulesd[322148] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:52 wazuh-modulesd[322148] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:52 wazuh-modulesd[322148] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:52 wazuh-modulesd[322148] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'https://s3.amazonaws.com/ci.wazuh.com/qa/testing_files/dummy_files/dummy.jpg' | Timeout: 300s
Passed 2023-07-31 21:09:09.003716 test_vulnerability_detector/test_feeds/test_msu_inventory.py::test_msu_catalog_patches[check_patches_with_no_cve_present] description: Check that patch information is added to the feed from the catalog for patches not directly related. to a Vulnerability. 10.30 2
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:08:58 wazuh-modulesd[322265] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:08:58 wazuh-modulesd[322265] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:08:58 wazuh-modulesd[322265] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:08:58 wazuh-modulesd[322265] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:08:58 wazuh-modulesd[322265] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/31 18:08:58 wazuh-modulesd[322265] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:09:12.210000 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Red Hat Enterprise Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.00 2
No log output captured.
Passed 2023-07-31 21:09:17.104849 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Debian] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.52 2
No log output captured.
Passed 2023-07-31 21:09:18.800635 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Arch Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.00 2
No log output captured.
Passed 2023-07-31 21:09:18.972241 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[Amazon Linux] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.01 2
No log output captured.
Passed 2023-07-31 21:09:19.915750 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[MSU] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.38 2
No log output captured.
Passed 2023-07-31 21:09:22.667193 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2002] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.22 2
No log output captured.
Passed 2023-07-31 21:09:24.130071 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2003] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.05 2
No log output captured.
Passed 2023-07-31 21:09:25.977144 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2004] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.08 2
No log output captured.
Passed 2023-07-31 21:09:28.014334 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2005] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.22 2
No log output captured.
Passed 2023-07-31 21:09:30.797109 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2006] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.30 2
No log output captured.
Passed 2023-07-31 21:09:33.251925 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2007] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.29 2
No log output captured.
Passed 2023-07-31 21:09:36.094865 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2008] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.37 2
No log output captured.
Passed 2023-07-31 21:09:39.278015 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2009] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.33 2
No log output captured.
Passed 2023-07-31 21:09:42.057298 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2010] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.58 2
No log output captured.
Passed 2023-07-31 21:09:44.668497 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2011] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.47 2
No log output captured.
Passed 2023-07-31 21:09:47.337993 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2012] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.41 2
No log output captured.
Passed 2023-07-31 21:09:50.398018 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2013] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.47 2
No log output captured.
Passed 2023-07-31 21:09:53.377964 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2014] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.51 2
No log output captured.
Passed 2023-07-31 21:09:56.275723 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2015] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.44 2
No log output captured.
Passed 2023-07-31 21:09:59.699588 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2016] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.59 2
No log output captured.
Passed 2023-07-31 21:10:03.918445 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2017] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.93 2
No log output captured.
Passed 2023-07-31 21:10:08.225539 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2018] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.00 2
No log output captured.
Passed 2023-07-31 21:10:14.835016 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2019] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.11 2
No log output captured.
Passed 2023-07-31 21:10:20.431680 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2020] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.44 2
No log output captured.
Passed 2023-07-31 21:10:26.507992 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2021] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.70 2
No log output captured.
Passed 2023-07-31 21:10:32.867646 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2022] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 1.72 2
No log output captured.
Passed 2023-07-31 21:10:36.550659 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_json_feed_content[NVD-2023] description: Check if the downloaded JSON feeds have the expected format and are JSON parseable. 0.65 2
No log output captured.
Passed 2023-07-31 21:10:39.826471 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.50 2
No log output captured.
Passed 2023-07-31 21:10:42.754525 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux2] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.74 2
No log output captured.
Passed 2023-07-31 21:10:46.150766 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Red Hat Enterprise Linux3] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.41 2
No log output captured.
Passed 2023-07-31 21:10:50.210113 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Jammy] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.78 2
No log output captured.
Passed 2023-07-31 21:10:55.530453 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Focal] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.64 2
No log output captured.
Passed 2023-07-31 21:11:00.898889 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Bionic] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.53 2
No log output captured.
Passed 2023-07-31 21:11:05.736277 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Xenial] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.33 2
No log output captured.
Passed 2023-07-31 21:11:10.551281 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Canonical Trusty] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.30 2
No log output captured.
Passed 2023-07-31 21:11:13.748247 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian0] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.06 2
No log output captured.
Passed 2023-07-31 21:11:16.955543 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[Debian1] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.09 2
No log output captured.
Passed 2023-07-31 21:11:17.220151 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.23 2
No log output captured.
Passed 2023-07-31 21:11:18.308103 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.02 2
No log output captured.
Passed 2023-07-31 21:11:22.181477 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Desktop 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.60 2
No log output captured.
Passed 2023-07-31 21:11:23.677197 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 11] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 1.37 2
No log output captured.
Passed 2023-07-31 21:11:27.560989 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 12] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 3.59 2
No log output captured.
Passed 2023-07-31 21:11:34.161574 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[SUSE Linux Enterprise Server 15] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 6.11 2
No log output captured.
Passed 2023-07-31 21:11:36.990301 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[AlmaLinux 8] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.25 2
No log output captured.
Passed 2023-07-31 21:11:38.897260 test_vulnerability_detector/test_feeds/test_validate_feed_content.py::test_validate_xml_feed_content[AlmaLinux 9] description: Check if the downloaded XML feeds have the expected format and are XML parseable. 0.05 2
No log output captured.
Passed 2023-07-31 21:11:49.476963 test_vulnerability_detector/test_general_settings/test_enabled.py::test_enabled[enabled] description: Check that vulnerability detector is started when is set enabled yes. 10.53 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:11:38 wazuh-modulesd[323276] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:11:38 wazuh-modulesd[323276] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:11:38 wazuh-modulesd[323276] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:11:38 wazuh-modulesd[323276] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:11:48,960 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... 2023-07-31 18:11:48,975 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:11:48,975 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: DEBUG: Module disabled. Exiting... ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:11:50.042822 test_vulnerability_detector/test_general_settings/test_enabled.py::test_disabled[disabled] description: Check that vulnerability detector is not started when is set enabled no. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:11:49 wazuh-modulesd[323369] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:11:49 wazuh-modulesd[323369] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:11:49 wazuh-modulesd[323369] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:11:49 wazuh-modulesd[323369] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-31 21:11:52.184328 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5s] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:11:51 wazuh-modulesd[323434] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:11:51 wazuh-modulesd[323434] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:11:51 wazuh-modulesd[323434] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:11:51 wazuh-modulesd[323434] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-31 21:11:53.277593 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5m] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:11:52 wazuh-modulesd[323466] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:11:52 wazuh-modulesd[323466] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:11:52 wazuh-modulesd[323466] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:11:52 wazuh-modulesd[323466] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-31 21:11:54.346898 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5h] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:11:53 wazuh-modulesd[323498] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:11:53 wazuh-modulesd[323498] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:11:53 wazuh-modulesd[323498] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:11:53 wazuh-modulesd[323498] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-31 21:11:55.414499 test_vulnerability_detector/test_general_settings/test_interval.py::test_interval_scan[5d] description: Check that the time specified in the interval is correct at the time of sleeping the scan thread. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:11:54 wazuh-modulesd[323530] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:11:54 wazuh-modulesd[323530] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:11:54 wazuh-modulesd[323530] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:11:54 wazuh-modulesd[323530] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
Passed 2023-07-31 21:12:25.224743 test_vulnerability_detector/test_general_settings/test_min_full_scan_interval.py::test_min_full_scan_interval[5 seconds] description: Check that the full scan is started after passing the min_full_scan_interval time. 20.49 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:12:04 wazuh-modulesd[323678] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:12:04 wazuh-modulesd[323678] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:12:04 wazuh-modulesd[323678] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:12:04 wazuh-modulesd[323678] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:12:04 wazuh-modulesd[323678] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:12:04 wazuh-modulesd[323678] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:12:04 wazuh-modulesd[323678] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:12:40.086065 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval[5s] description: Check if the `retry_interval ` option is working correctly. To do this,. it checks the `ossec.log` file for the message indicating that Vulnerability Detector will sleep before. attempting to scan the pending agents (forcing the retry interval action). After this, the DBs are. synchronized and the scan (log) is checked to ensure that it is performed normally. 5.55 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:12:34 wazuh-modulesd[323969] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:12:34 wazuh-modulesd[323969] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:12:34 wazuh-modulesd[323969] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:12:34 wazuh-modulesd[323969] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:12:34 wazuh-modulesd[323969] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:12:34 wazuh-modulesd[323969] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:12:34 wazuh-modulesd[323969] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:13:10.455390 test_vulnerability_detector/test_general_settings/test_retry_interval.py::test_retry_interval_max_retries[5s] description: Check if after exceeding the maximum number of retries for a scan (`retry_interval`) the. corresponding message is displayed indicating that the software could not be obtained for the agent. and that it will be retried at the next scan (waiting for its time interval). 21.06 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:12:49 wazuh-modulesd[324136] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:12:49 wazuh-modulesd[324136] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:12:49 wazuh-modulesd[324136] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:12:49 wazuh-modulesd[324136] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:12:49 wazuh-modulesd[324136] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:12:49 wazuh-modulesd[324136] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:12:49 wazuh-modulesd[324136] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:13:14.391621 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_enabled[enabled] description: Check that when run_on_start is enabled, the vulnerability scan starts (indicated in the log). 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:13 wazuh-modulesd[324332] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:13 wazuh-modulesd[324332] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:13 wazuh-modulesd[324332] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:13 wazuh-modulesd[324332] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:13 wazuh-modulesd[324332] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:13:27.670786 test_vulnerability_detector/test_general_settings/test_run_on_start.py::test_run_on_start_disabled[disabled] description: Check that when run_on_start is disabled, the vulnerability scan does not start (log does not appear). 10.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:17 wazuh-modulesd[324441] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:17 wazuh-modulesd[324441] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:17 wazuh-modulesd[324441] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:17 wazuh-modulesd[324441] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:17 wazuh-modulesd[324441] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_general_settings/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 18:13:27,662 - wazuh_testing - ERROR - Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan 2023-07-31 18:13:27,662 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:13:27,662 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find this event in /var/ossec/logs/ossec.log: Starting vulnerability scan ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:13:30.778309 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 1] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:29 wazuh-modulesd[324557] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:29 wazuh-modulesd[324557] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:29 wazuh-modulesd[324557] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:29 wazuh-modulesd[324557] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:29 wazuh-modulesd[324557] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:31.850722 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:30 wazuh-modulesd[324591] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:30 wazuh-modulesd[324591] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:30 wazuh-modulesd[324591] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:30 wazuh-modulesd[324591] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:30 wazuh-modulesd[324591] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:32.908493 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Amazon Linux 2022] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:31 wazuh-modulesd[324624] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:31 wazuh-modulesd[324624] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:31 wazuh-modulesd[324624] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:31 wazuh-modulesd[324624] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:31 wazuh-modulesd[324624] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:33.970307 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Focal] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:32 wazuh-modulesd[324660] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:32 wazuh-modulesd[324660] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:32 wazuh-modulesd[324660] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:32 wazuh-modulesd[324660] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:32 wazuh-modulesd[324660] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:35.030702 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Bionic] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:34 wazuh-modulesd[324694] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:34 wazuh-modulesd[324694] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:34 wazuh-modulesd[324694] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:34 wazuh-modulesd[324694] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:34 wazuh-modulesd[324694] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:36.086617 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Xenial] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:35 wazuh-modulesd[324727] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:35 wazuh-modulesd[324727] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:35 wazuh-modulesd[324727] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:35 wazuh-modulesd[324727] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:35 wazuh-modulesd[324727] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:37.158293 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Trusty] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:36 wazuh-modulesd[324759] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:36 wazuh-modulesd[324759] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:36 wazuh-modulesd[324759] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:36 wazuh-modulesd[324759] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:36 wazuh-modulesd[324759] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:38.214282 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Ubuntu Jammy] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:37 wazuh-modulesd[324807] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:37 wazuh-modulesd[324807] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:37 wazuh-modulesd[324807] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:37 wazuh-modulesd[324807] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:37 wazuh-modulesd[324807] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:38.781164 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.50 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:38 wazuh-modulesd[324840] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:38 wazuh-modulesd[324840] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:38 wazuh-modulesd[324840] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:38 wazuh-modulesd[324840] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:38 wazuh-modulesd[324840] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:39.848947 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 7] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:38 wazuh-modulesd[324868] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:38 wazuh-modulesd[324868] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:38 wazuh-modulesd[324868] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:38 wazuh-modulesd[324868] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:38 wazuh-modulesd[324868] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:40.940116 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 6] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:39 wazuh-modulesd[324900] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:39 wazuh-modulesd[324900] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:39 wazuh-modulesd[324900] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:39 wazuh-modulesd[324900] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:39 wazuh-modulesd[324900] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:41.525274 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[RHEL 5] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.50 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:41 wazuh-modulesd[324936] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:41 wazuh-modulesd[324936] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:41 wazuh-modulesd[324936] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:41 wazuh-modulesd[324936] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:41 wazuh-modulesd[324936] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:42.583372 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Bullseye] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:41 wazuh-modulesd[324965] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:41 wazuh-modulesd[324965] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:41 wazuh-modulesd[324965] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:41 wazuh-modulesd[324965] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:41 wazuh-modulesd[324965] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:43.645302 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Debian Buster] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:42 wazuh-modulesd[325009] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:42 wazuh-modulesd[325009] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:42 wazuh-modulesd[325009] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:42 wazuh-modulesd[325009] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:42 wazuh-modulesd[325009] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:44.717927 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[Arch Linux] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:43 wazuh-modulesd[325042] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:43 wazuh-modulesd[325042] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:43 wazuh-modulesd[325042] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:43 wazuh-modulesd[325042] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:43 wazuh-modulesd[325042] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/31 18:13:43 wazuh-modulesd[325042] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:13:45.791768 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[NVD] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:44 wazuh-modulesd[325074] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:44 wazuh-modulesd[325074] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:44 wazuh-modulesd[325074] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:44 wazuh-modulesd[325074] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:44 wazuh-modulesd[325074] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/31 18:13:44 wazuh-modulesd[325074] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-07-31 21:13:46.364335 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[MSU] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 0.50 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:45 wazuh-modulesd[325107] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:45 wazuh-modulesd[325107] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:45 wazuh-modulesd[325107] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:45 wazuh-modulesd[325107] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:45 wazuh-modulesd[325107] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/31 18:13:45 wazuh-modulesd[325107] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:13:47.472383 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:46 wazuh-modulesd[325142] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:46 wazuh-modulesd[325142] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:46 wazuh-modulesd[325142] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:46 wazuh-modulesd[325142] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:46 wazuh-modulesd[325142] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:48.530531 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:47 wazuh-modulesd[325186] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:47 wazuh-modulesd[325186] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:47 wazuh-modulesd[325186] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:47 wazuh-modulesd[325186] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:47 wazuh-modulesd[325186] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:49.590023 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:48 wazuh-modulesd[325229] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:48 wazuh-modulesd[325229] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:48 wazuh-modulesd[325229] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:48 wazuh-modulesd[325229] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:48 wazuh-modulesd[325229] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:50.649433 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:49 wazuh-modulesd[325272] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:49 wazuh-modulesd[325272] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:49 wazuh-modulesd[325272] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:49 wazuh-modulesd[325272] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:49 wazuh-modulesd[325272] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:51.713216 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:50 wazuh-modulesd[325303] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:50 wazuh-modulesd[325303] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:50 wazuh-modulesd[325303] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:50 wazuh-modulesd[325303] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:50 wazuh-modulesd[325303] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:52.770578 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:51 wazuh-modulesd[325334] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:51 wazuh-modulesd[325334] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:51 wazuh-modulesd[325334] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:51 wazuh-modulesd[325334] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:51 wazuh-modulesd[325334] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:53.826430 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[ALMALINUX 8] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:52 wazuh-modulesd[325365] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:52 wazuh-modulesd[325365] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:52 wazuh-modulesd[325365] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:52 wazuh-modulesd[325365] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:52 wazuh-modulesd[325365] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:54.884621 test_vulnerability_detector/test_providers/test_enabled.py::test_enabled[ALMALINUX 9] description: Check if modulesd downloads the feeds from different providers when enabled is set to yes. 1.00 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:53 wazuh-modulesd[325397] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:53 wazuh-modulesd[325397] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:53 wazuh-modulesd[325397] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:53 wazuh-modulesd[325397] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:13:53 wazuh-modulesd[325397] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (9) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:13:59.948449 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 1] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:54 wazuh-modulesd[325429] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:54 wazuh-modulesd[325429] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:54 wazuh-modulesd[325429] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:54 wazuh-modulesd[325429] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:13:59,945 - wazuh_testing - ERROR - Could not find Amazon Linux 1 update starting log 2023-07-31 18:13:59,945 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:13:59,945 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Amazon Linux 1 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:05.014075 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:13:59 wazuh-modulesd[325480] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:13:59 wazuh-modulesd[325480] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:13:59 wazuh-modulesd[325480] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:13:59 wazuh-modulesd[325480] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:05,012 - wazuh_testing - ERROR - Could not find Amazon Linux 2 update starting log 2023-07-31 18:14:05,013 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:05,013 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Amazon Linux 2 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:10.090108 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Amazon Linux 2022] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:05 wazuh-modulesd[325533] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:05 wazuh-modulesd[325533] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:05 wazuh-modulesd[325533] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:05 wazuh-modulesd[325533] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:10,087 - wazuh_testing - ERROR - Could not find Amazon Linux 2022 update starting log 2023-07-31 18:14:10,087 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:10,087 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Amazon Linux 2022 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:15.663840 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Focal] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.51 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:10 wazuh-modulesd[325580] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:10 wazuh-modulesd[325580] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:10 wazuh-modulesd[325580] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:10 wazuh-modulesd[325580] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:15,161 - wazuh_testing - ERROR - Could not find Ubuntu Focal update starting log 2023-07-31 18:14:15,162 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:15,162 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Focal update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:20.736561 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Bionic] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:15 wazuh-modulesd[325627] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:15 wazuh-modulesd[325627] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:15 wazuh-modulesd[325627] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:15 wazuh-modulesd[325627] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:20,733 - wazuh_testing - ERROR - Could not find Ubuntu Bionic update starting log 2023-07-31 18:14:20,734 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:20,734 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Bionic update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:25.798560 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Xenial] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:20 wazuh-modulesd[325676] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:20 wazuh-modulesd[325676] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:20 wazuh-modulesd[325676] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:20 wazuh-modulesd[325676] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:25,796 - wazuh_testing - ERROR - Could not find Ubuntu Xenial update starting log 2023-07-31 18:14:25,796 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:25,796 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Xenial update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:30.884169 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Trusty] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.02 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:25 wazuh-modulesd[325723] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:25 wazuh-modulesd[325723] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:25 wazuh-modulesd[325723] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:25 wazuh-modulesd[325723] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:30,881 - wazuh_testing - ERROR - Could not find Ubuntu Trusty update starting log 2023-07-31 18:14:30,881 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:30,881 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Trusty update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:35.957253 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Ubuntu Jammy] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:30 wazuh-modulesd[325784] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:30 wazuh-modulesd[325784] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:30 wazuh-modulesd[325784] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:30 wazuh-modulesd[325784] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:35,955 - wazuh_testing - ERROR - Could not find Ubuntu Jammy update starting log 2023-07-31 18:14:35,955 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:35,955 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Ubuntu Jammy update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:41.023174 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:36 wazuh-modulesd[325835] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:36 wazuh-modulesd[325835] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:36 wazuh-modulesd[325835] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:36 wazuh-modulesd[325835] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:41,020 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 8 update starting log 2023-07-31 18:14:41,020 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:41,020 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 8 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:46.108819 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 7] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:41 wazuh-modulesd[325884] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:41 wazuh-modulesd[325884] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:41 wazuh-modulesd[325884] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:41 wazuh-modulesd[325884] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:46,106 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 7 update starting log 2023-07-31 18:14:46,106 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:46,106 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 7 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:51.682923 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 6] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.51 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:46 wazuh-modulesd[325932] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:46 wazuh-modulesd[325932] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:46 wazuh-modulesd[325932] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:46 wazuh-modulesd[325932] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:51,180 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 6 update starting log 2023-07-31 18:14:51,180 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:51,194 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 6 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:14:56.758679 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[RHEL 5] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:51 wazuh-modulesd[325990] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:51 wazuh-modulesd[325990] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:51 wazuh-modulesd[325990] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:51 wazuh-modulesd[325990] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:14:56,755 - wazuh_testing - ERROR - Could not find Red Hat Enterprise Linux 5 update starting log 2023-07-31 18:14:56,755 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:14:56,755 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Red Hat Enterprise Linux 5 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:02.336308 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Bullseye] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.51 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:14:56 wazuh-modulesd[326037] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:14:56 wazuh-modulesd[326037] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:14:56 wazuh-modulesd[326037] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:14:56 wazuh-modulesd[326037] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:01,834 - wazuh_testing - ERROR - Could not find Debian Bullseye update starting log 2023-07-31 18:15:01,834 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:01,834 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Debian Bullseye update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:07.395695 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Debian Buster] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:02 wazuh-modulesd[326089] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:02 wazuh-modulesd[326089] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:02 wazuh-modulesd[326089] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:02 wazuh-modulesd[326089] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:07,393 - wazuh_testing - ERROR - Could not find Debian Buster update starting log 2023-07-31 18:15:07,393 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:07,393 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Debian Buster update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:12.972727 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[Arch Linux] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.52 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:07 wazuh-modulesd[326137] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:07 wazuh-modulesd[326137] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:07 wazuh-modulesd[326137] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:07 wazuh-modulesd[326137] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:12,456 - wazuh_testing - ERROR - Could not find Arch Linux update starting log 2023-07-31 18:15:12,456 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:12,471 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Arch Linux update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:18.033083 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[NVD] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:13 wazuh-modulesd[326188] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:13 wazuh-modulesd[326188] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:13 wazuh-modulesd[326188] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:13 wazuh-modulesd[326188] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:18,031 - wazuh_testing - ERROR - Could not find National Vulnerability Database update starting log 2023-07-31 18:15:18,032 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:18,032 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find National Vulnerability Database update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:23.105045 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[MSU] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:18 wazuh-modulesd[326236] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:18 wazuh-modulesd[326236] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:18 wazuh-modulesd[326236] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:18 wazuh-modulesd[326236] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:23,103 - wazuh_testing - ERROR - Could not find Microsoft Security Update update starting log 2023-07-31 18:15:23,103 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:23,104 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find Microsoft Security Update update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:28.179353 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:23 wazuh-modulesd[326285] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:23 wazuh-modulesd[326285] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:23 wazuh-modulesd[326285] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:23 wazuh-modulesd[326285] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:28,178 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 11 update starting log 2023-07-31 18:15:28,178 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:28,178 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 11 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:33.253744 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:28 wazuh-modulesd[326334] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:28 wazuh-modulesd[326334] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:28 wazuh-modulesd[326334] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:28 wazuh-modulesd[326334] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:33,251 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 12 update starting log 2023-07-31 18:15:33,252 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:33,252 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 12 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:38.331221 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Server 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:33 wazuh-modulesd[326401] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:33 wazuh-modulesd[326401] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:33 wazuh-modulesd[326401] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:33 wazuh-modulesd[326401] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:38,329 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Server 15 update starting log 2023-07-31 18:15:38,329 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:38,330 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Server 15 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:43.418315 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 11] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:38 wazuh-modulesd[326452] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:38 wazuh-modulesd[326452] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:38 wazuh-modulesd[326452] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:38 wazuh-modulesd[326452] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:43,416 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 11 update starting log 2023-07-31 18:15:43,416 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:43,417 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 11 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:48.979393 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 12] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.51 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:43 wazuh-modulesd[326499] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:43 wazuh-modulesd[326499] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:43 wazuh-modulesd[326499] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:43 wazuh-modulesd[326499] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:48,477 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 12 update starting log 2023-07-31 18:15:48,477 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:48,491 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 12 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:54.052421 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[SUSE Linux Enterprise Desktop 15] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:49 wazuh-modulesd[326550] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:49 wazuh-modulesd[326550] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:49 wazuh-modulesd[326550] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:49 wazuh-modulesd[326550] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:54,050 - wazuh_testing - ERROR - Could not find SUSE Linux Enterprise Desktop 15 update starting log 2023-07-31 18:15:54,050 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:54,050 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find SUSE Linux Enterprise Desktop 15 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:15:59.114150 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[ALMALINUX 8] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.01 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:54 wazuh-modulesd[326597] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:54 wazuh-modulesd[326597] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:54 wazuh-modulesd[326597] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:54 wazuh-modulesd[326597] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:15:59,111 - wazuh_testing - ERROR - Could not find AlmaLinux 8 update starting log 2023-07-31 18:15:59,112 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:15:59,112 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find AlmaLinux 8 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:16:04.675939 test_vulnerability_detector/test_providers/test_enabled.py::test_disabled[ALMALINUX 9] description: Check if modulesd does not download the feeds from different providers when enabled is set to no. 5.51 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:15:59 wazuh-modulesd[326655] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:15:59 wazuh-modulesd[326655] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:15:59 wazuh-modulesd[326655] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:15:59 wazuh-modulesd[326655] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf
------------------------------Captured stderr call------------------------------
2023-07-31 18:16:04,173 - wazuh_testing - ERROR - Could not find AlmaLinux 9 update starting log 2023-07-31 18:16:04,173 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:16:04,187 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find AlmaLinux 9 update starting log ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:16:09.730069 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Amazon Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 3.65 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-31 21:16:13.013235 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Canonical] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.10 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-31 21:16:17.163770 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Debian] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.08 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-31 21:16:30.715304 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Red Hat Enterprise Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 10.43 server 0
No log output captured.
Passed 2023-07-31 21:16:47.719576 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[National Vulnerability Database] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 14.01 server 0
No log output captured.
Passed 2023-07-31 21:17:04.797925 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Microsoft Security Update] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 14.03 server 0
No log output captured.
Passed 2023-07-31 21:17:21.343343 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[Arch Linux] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 13.09 server 0
No log output captured.
Passed 2023-07-31 21:17:27.172378 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[SUSE Linux Enterprise] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 2.81 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-31 21:17:30.397646 test_vulnerability_detector/test_providers/test_missing_os.py::test_providers_missing_os[ALMALINUX] description: Check if modulesd starts downloading the feeds without specifying the os version. To do this, it checks. if errors occur when the <os> tag is omitted in the configuration in providers that should have it and,. on the other hand, if the update of the feeds starts normally in providers that do not require this. tag. 1.05 server 0
------------------------------Captured stderr call------------------------------
Job for wazuh-manager.service failed because the control process exited with error code. See "systemctl status wazuh-manager.service" and "journalctl -xeu wazuh-manager.service" for details.
Passed 2023-07-31 21:17:52.369628 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[RedHat 8] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.95 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:17:47 wazuh-modulesd[331270] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:17:47 wazuh-modulesd[331270] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:17:47 wazuh-modulesd[331270] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:17:47 wazuh-modulesd[331270] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:17:47 wazuh-modulesd[331270] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:17:47 wazuh-modulesd[331270] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s
Passed 2023-07-31 21:17:59.964273 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[Debian Buster] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.39 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:17:55 wazuh-modulesd[331696] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:17:55 wazuh-modulesd[331696] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:17:55 wazuh-modulesd[331696] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:17:55 wazuh-modulesd[331696] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:17:55 wazuh-modulesd[331696] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:07.256205 test_vulnerability_detector/test_providers/test_multiple_provider_feeds.py::test_check_log_multiple_provider_feeds[ALMALINUX] description: Check if the <path> and <os path=...> options work properly according to the configuration. and check there are no conflicts when reading the feeds and inserting them in the database. 4.09 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:03 wazuh-modulesd[332116] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:03 wazuh-modulesd[332116] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:03 wazuh-modulesd[332116] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:03 wazuh-modulesd[332116] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:03 wazuh-modulesd[332116] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_providers/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:10.943150 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 1] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:10 wazuh-modulesd[332477] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:10 wazuh-modulesd[332477] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:10 wazuh-modulesd[332477] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:10 wazuh-modulesd[332477] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:10 wazuh-modulesd[332477] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:15.007284 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:13 wazuh-modulesd[332679] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:13 wazuh-modulesd[332679] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:13 wazuh-modulesd[332679] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:13 wazuh-modulesd[332679] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:13 wazuh-modulesd[332679] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:18.845691 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Amazon Linux 2022] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:18 wazuh-modulesd[332905] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:18 wazuh-modulesd[332905] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:18 wazuh-modulesd[332905] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:18 wazuh-modulesd[332905] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:18 wazuh-modulesd[332905] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:22.734687 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Trusty] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:21 wazuh-modulesd[333110] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:21 wazuh-modulesd[333110] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:21 wazuh-modulesd[333110] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:21 wazuh-modulesd[333110] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:21 wazuh-modulesd[333110] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (trusty) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:26.478325 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Xenial] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:25 wazuh-modulesd[333335] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:25 wazuh-modulesd[333335] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:25 wazuh-modulesd[333335] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:25 wazuh-modulesd[333335] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:25 wazuh-modulesd[333335] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (xenial) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:30.518671 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Bionic] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:29 wazuh-modulesd[333513] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:29 wazuh-modulesd[333513] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:29 wazuh-modulesd[333513] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:29 wazuh-modulesd[333513] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:29 wazuh-modulesd[333513] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (bionic) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:34.231579 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Focal] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:33 wazuh-modulesd[333732] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:33 wazuh-modulesd[333732] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:33 wazuh-modulesd[333732] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:33 wazuh-modulesd[333732] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:33 wazuh-modulesd[333732] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (focal) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:37.773608 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Ubuntu Jammy] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:37 wazuh-modulesd[333933] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:37 wazuh-modulesd[333933] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:37 wazuh-modulesd[333933] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:37 wazuh-modulesd[333933] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:37 wazuh-modulesd[333933] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:41.338893 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Buster] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:40 wazuh-modulesd[334128] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:40 wazuh-modulesd[334128] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:40 wazuh-modulesd[334128] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:40 wazuh-modulesd[334128] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:40 wazuh-modulesd[334128] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:45.366541 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Debian Bullseye] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:44 wazuh-modulesd[334327] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:44 wazuh-modulesd[334327] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:44 wazuh-modulesd[334327] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:44 wazuh-modulesd[334327] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:44 wazuh-modulesd[334327] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:49.110846 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 5] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:48 wazuh-modulesd[334549] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:48 wazuh-modulesd[334549] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:48 wazuh-modulesd[334549] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:48 wazuh-modulesd[334549] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:48 wazuh-modulesd[334549] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (5) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:52.451598 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 6] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:51 wazuh-modulesd[334739] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:51 wazuh-modulesd[334739] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:51 wazuh-modulesd[334739] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:51 wazuh-modulesd[334739] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:51 wazuh-modulesd[334739] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (6) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:18:56.482946 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 7] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:55 wazuh-modulesd[334938] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:55 wazuh-modulesd[334938] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:55 wazuh-modulesd[334938] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:55 wazuh-modulesd[334938] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:55 wazuh-modulesd[334938] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (7) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:00.711298 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Red Hat Enterprise Linux 8] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:18:59 wazuh-modulesd[335177] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:18:59 wazuh-modulesd[335177] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:18:59 wazuh-modulesd[335177] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:18:59 wazuh-modulesd[335177] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:18:59 wazuh-modulesd[335177] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:04.919519 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Arch Linux] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:03 wazuh-modulesd[335382] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:03 wazuh-modulesd[335382] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:03 wazuh-modulesd[335382] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:03 wazuh-modulesd[335382] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:03 wazuh-modulesd[335382] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/31 18:19:03 wazuh-modulesd[335382] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:19:09.137035 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[National Vulnerability Database] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:08 wazuh-modulesd[335576] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:08 wazuh-modulesd[335576] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:08 wazuh-modulesd[335576] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:08 wazuh-modulesd[335576] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:08 wazuh-modulesd[335576] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/31 18:19:08 wazuh-modulesd[335576] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-07-31 21:19:12.842744 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[Microsoft Security Update] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:12 wazuh-modulesd[335794] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:12 wazuh-modulesd[335794] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:12 wazuh-modulesd[335794] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:12 wazuh-modulesd[335794] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:12 wazuh-modulesd[335794] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/31 18:19:12 wazuh-modulesd[335794] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:19:16.411759 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 11] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:15 wazuh-modulesd[335993] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:15 wazuh-modulesd[335993] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:15 wazuh-modulesd[335993] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:15 wazuh-modulesd[335993] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:15 wazuh-modulesd[335993] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:20.462625 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 12] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:19 wazuh-modulesd[336181] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:19 wazuh-modulesd[336181] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:19 wazuh-modulesd[336181] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:19 wazuh-modulesd[336181] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:19 wazuh-modulesd[336181] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:24.654468 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Desktop 15] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:23 wazuh-modulesd[336373] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:23 wazuh-modulesd[336373] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:23 wazuh-modulesd[336373] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:23 wazuh-modulesd[336373] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:23 wazuh-modulesd[336373] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:28.365763 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 11] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:27 wazuh-modulesd[336734] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:27 wazuh-modulesd[336734] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:27 wazuh-modulesd[336734] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:27 wazuh-modulesd[336734] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:27 wazuh-modulesd[336734] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (11-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:31.915649 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 12] description: Check if modulesd downloads the feeds for each os. 0.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:31 wazuh-modulesd[336826] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:31 wazuh-modulesd[336826] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:31 wazuh-modulesd[336826] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:31 wazuh-modulesd[336826] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:31 wazuh-modulesd[336826] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (12-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:35.982042 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[SUSE Linux Enterprise Server 15] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:34 wazuh-modulesd[336918] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:34 wazuh-modulesd[336918] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:34 wazuh-modulesd[336918] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:34 wazuh-modulesd[336918] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:34 wazuh-modulesd[336918] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:39.709809 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[ALMALINUX 8] description: Check if modulesd downloads the feeds for each os. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:39 wazuh-modulesd[337012] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:39 wazuh-modulesd[337012] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:39 wazuh-modulesd[337012] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:39 wazuh-modulesd[337012] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:39 wazuh-modulesd[337012] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:43.875510 test_vulnerability_detector/test_providers/test_os.py::test_providers_os[ALMALINUX 9] description: Check if modulesd downloads the feeds for each os. 1.00 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:42 wazuh-modulesd[337102] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:42 wazuh-modulesd[337102] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:42 wazuh-modulesd[337102] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:42 wazuh-modulesd[337102] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:42 wazuh-modulesd[337102] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (9) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:47.595731 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[RedHat] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:47 wazuh-modulesd[337199] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:47 wazuh-modulesd[337199] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:47 wazuh-modulesd[337199] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:47 wazuh-modulesd[337199] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:47 wazuh-modulesd[337199] wmodules-vuln-detector.c:1015 at wm_vuldet_read_provider_content(): INFO: 'update_from_year' option at module 'vulnerability-detector' is deprecated. Use 'os' instead. 2023/07/31 18:19:47 wazuh-modulesd[337199] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:51.142563 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Canonical] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:50 wazuh-modulesd[337288] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:50 wazuh-modulesd[337288] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:50 wazuh-modulesd[337288] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:50 wazuh-modulesd[337288] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:50 wazuh-modulesd[337288] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'canonical' provider at 'vulnerability-detector' 2023/07/31 18:19:50 wazuh-modulesd[337288] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (20) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:54.688294 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[Debian] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:54 wazuh-modulesd[337381] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:54 wazuh-modulesd[337381] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:54 wazuh-modulesd[337381] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:54 wazuh-modulesd[337381] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:54 wazuh-modulesd[337381] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'debian' provider at 'vulnerability-detector' 2023/07/31 18:19:54 wazuh-modulesd[337381] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (10) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:19:58.241399 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[NVD] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:19:57 wazuh-modulesd[337470] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:19:57 wazuh-modulesd[337470] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:19:57 wazuh-modulesd[337470] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:19:57 wazuh-modulesd[337470] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:19:57 wazuh-modulesd[337470] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/31 18:19:57 wazuh-modulesd[337470] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: 'none' | Multi url: 'none' | Update since: 2023 | Timeout: 300s
Passed 2023-07-31 21:20:01.810333 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[MSU] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:01 wazuh-modulesd[337563] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:01 wazuh-modulesd[337563] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:01 wazuh-modulesd[337563] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:01 wazuh-modulesd[337563] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:01 wazuh-modulesd[337563] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'msu' provider at 'vulnerability-detector' 2023/07/31 18:20:01 wazuh-modulesd[337563] wmodules-vuln-detector.c:1018 at wm_vuldet_read_provider_content(): WARNING: 'update_from_year' option cannot be used for 'msu' provider. 2023/07/31 18:20:01 wazuh-modulesd[337563] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added msu feed. Interval: 3600s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:20:05.345453 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[SUSE] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:04 wazuh-modulesd[337653] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:04 wazuh-modulesd[337653] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:04 wazuh-modulesd[337653] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:04 wazuh-modulesd[337653] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:04 wazuh-modulesd[337653] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'suse' provider at 'vulnerability-detector' 2023/07/31 18:20:04 wazuh-modulesd[337653] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-desktop) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:20:08.878788 test_vulnerability_detector/test_providers/test_update_from_year.py::test_update_from_year[ALMALINUX] description: Check if vulnerability detector download feeds from the correct year based on `update_from_year`. option. 0.50 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:08 wazuh-modulesd[337745] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:08 wazuh-modulesd[337745] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:08 wazuh-modulesd[337745] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:08 wazuh-modulesd[337745] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:08 wazuh-modulesd[337745] wmodules-vuln-detector.c:1029 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'update_from_year' for 'almalinux' provider at 'vulnerability-detector' 2023/07/31 18:20:08 wazuh-modulesd[337745] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:20:17.428228 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Amazon Linux 2022] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:11 wazuh-modulesd[337834] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:11 wazuh-modulesd[337834] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:11 wazuh-modulesd[337834] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:11 wazuh-modulesd[337834] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:11 wazuh-modulesd[337834] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:20:26.003979 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[RedHat] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:20 wazuh-modulesd[337970] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:20 wazuh-modulesd[337970] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:20 wazuh-modulesd[337970] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:20 wazuh-modulesd[337970] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:20 wazuh-modulesd[337970] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:20:34.568983 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Ubuntu Jammy] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:29 wazuh-modulesd[338086] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:29 wazuh-modulesd[338086] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:29 wazuh-modulesd[338086] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:29 wazuh-modulesd[338086] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:29 wazuh-modulesd[338086] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added canonical (jammy) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:20:43.116083 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Debian] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:37 wazuh-modulesd[338195] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:37 wazuh-modulesd[338195] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:37 wazuh-modulesd[338195] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:37 wazuh-modulesd[338195] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:37 wazuh-modulesd[338195] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (buster) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:20:51.694993 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[NVD] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:46 wazuh-modulesd[338308] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:46 wazuh-modulesd[338308] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:46 wazuh-modulesd[338308] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:46 wazuh-modulesd[338308] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:46 wazuh-modulesd[338308] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'nvd' provider at 'vulnerability-detector' 2023/07/31 18:20:46 wazuh-modulesd[338308] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:21:00.740100 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[Arch_Linux] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:20:54 wazuh-modulesd[338417] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:20:54 wazuh-modulesd[338417] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:20:54 wazuh-modulesd[338417] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:20:54 wazuh-modulesd[338417] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:20:54 wazuh-modulesd[338417] wmodules-vuln-detector.c:1078 at wm_vuldet_read_provider_content(): WARNING: Invalid option 'os' for 'arch' provider at 'vulnerability-detector' 2023/07/31 18:20:54 wazuh-modulesd[338417] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 5s | Multi path: 'none' | Multi url: 'none' | Update since: 0 | Timeout: 300s
Passed 2023-07-31 21:21:09.492633 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[SUSE] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 5.51 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:21:03 wazuh-modulesd[338559] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:21:03 wazuh-modulesd[338559] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:21:03 wazuh-modulesd[338559] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:21:03 wazuh-modulesd[338559] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:21:03 wazuh-modulesd[338559] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:21:18.507366 test_vulnerability_detector/test_providers/test_update_interval.py::test_update_interval[ALMALINUX] description: Check if the provider feed starts updating the database after the interval time set in. <interval_update> tag. 6.01 server 0
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:21:12 wazuh-modulesd[338700] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:21:12 wazuh-modulesd[338700] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:21:12 wazuh-modulesd[338700] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:21:12 wazuh-modulesd[338700] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:21:12 wazuh-modulesd[338700] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 5s | Path: 'none' | Url: 'none' | Timeout: 300s
Passed 2023-07-31 21:21:30.314264 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[WINDOWS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 3.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:21:26 wazuh-modulesd[338849] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:21:26 wazuh-modulesd[338849] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:21:26 wazuh-modulesd[338849] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:21:26 wazuh-modulesd[338849] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:21:26 wazuh-modulesd[338849] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:21:42.620552 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_scan_nvd_vulnerabilities[MACOS] description: Check if the corresponding vulnerability alerts and logs are generated after scanning with an NVD feed. and custom vulnerable packages, using only the NVD feed.This is tested for macOS and Windows system. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:21:38 wazuh-modulesd[338999] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:21:38 wazuh-modulesd[338999] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:21:38 wazuh-modulesd[338999] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:21:38 wazuh-modulesd[338999] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:21:38 wazuh-modulesd[338999] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:21:51.934283 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[RHEL] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:21:50 wazuh-modulesd[339167] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:21:50 wazuh-modulesd[339167] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:21:50 wazuh-modulesd[339167] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:21:50 wazuh-modulesd[339167] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:21:50 wazuh-modulesd[339167] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:01.198475 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[UBUNTU] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:00 wazuh-modulesd[339298] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:00 wazuh-modulesd[339298] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:00 wazuh-modulesd[339298] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:00 wazuh-modulesd[339298] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:00 wazuh-modulesd[339298] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:10.499466 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[DEBIAN] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:09 wazuh-modulesd[339425] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:09 wazuh-modulesd[339425] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:09 wazuh-modulesd[339425] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:09 wazuh-modulesd[339425] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:09 wazuh-modulesd[339425] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:19.800701 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ARCH] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:18 wazuh-modulesd[339555] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:18 wazuh-modulesd[339555] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:18 wazuh-modulesd[339555] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:18 wazuh-modulesd[339555] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:18 wazuh-modulesd[339555] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:29.133016 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALAS] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:28 wazuh-modulesd[339686] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:28 wazuh-modulesd[339686] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:28 wazuh-modulesd[339686] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:28 wazuh-modulesd[339686] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:28 wazuh-modulesd[339686] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:38.287722 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:37 wazuh-modulesd[339813] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:37 wazuh-modulesd[339813] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:37 wazuh-modulesd[339813] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:37 wazuh-modulesd[339813] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:37 wazuh-modulesd[339813] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:47.530132 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:46 wazuh-modulesd[339941] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:46 wazuh-modulesd[339941] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:46 wazuh-modulesd[339941] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:46 wazuh-modulesd[339941] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:46 wazuh-modulesd[339941] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:22:56.825330 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLED15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:22:55 wazuh-modulesd[340069] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:22:55 wazuh-modulesd[340069] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:22:55 wazuh-modulesd[340069] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:22:55 wazuh-modulesd[340069] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:22:55 wazuh-modulesd[340069] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:23:06.152820 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES11] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:23:05 wazuh-modulesd[340221] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:23:05 wazuh-modulesd[340221] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:23:05 wazuh-modulesd[340221] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:23:05 wazuh-modulesd[340221] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:23:05 wazuh-modulesd[340221] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:23:16.387732 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES12] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:23:15 wazuh-modulesd[340365] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:23:15 wazuh-modulesd[340365] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:23:15 wazuh-modulesd[340365] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:23:15 wazuh-modulesd[340365] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:23:15 wazuh-modulesd[340365] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:23:25.339565 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[SLES15] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:23:24 wazuh-modulesd[340504] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:23:24 wazuh-modulesd[340504] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:23:24 wazuh-modulesd[340504] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:23:24 wazuh-modulesd[340504] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:23:24 wazuh-modulesd[340504] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:23:34.256271 test_vulnerability_detector/test_scan_results/test_scan_nvd_vulnerabilities.py::test_no_agent_data[ALMALINUX] description: Check that a Warning message is displayed when attempting to perform a vulnerability scan using only. the NVD feed for Linux systems. 1.00 server
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:23:33 wazuh-modulesd[340637] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:23:33 wazuh-modulesd[340637] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:23:33 wazuh-modulesd[340637] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:23:33 wazuh-modulesd[340637] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:23:33 wazuh-modulesd[340637] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:23:46.580784 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:23:42 wazuh-modulesd[340767] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:23:42 wazuh-modulesd[340767] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:23:42 wazuh-modulesd[340767] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:23:42 wazuh-modulesd[340767] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:23:42 wazuh-modulesd[340767] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:23:42 wazuh-modulesd[340767] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:23:42 wazuh-modulesd[340767] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:23:58.898346 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.02 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:23:54 wazuh-modulesd[340924] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:23:54 wazuh-modulesd[340924] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:23:54 wazuh-modulesd[340924] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:23:54 wazuh-modulesd[340924] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:23:54 wazuh-modulesd[340924] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:23:54 wazuh-modulesd[340924] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:24:18.499627 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:24:14 wazuh-modulesd[341239] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:24:14 wazuh-modulesd[341239] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:24:14 wazuh-modulesd[341239] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:24:14 wazuh-modulesd[341239] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:24:14 wazuh-modulesd[341239] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/31 18:24:14 wazuh-modulesd[341239] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:24:31.104415 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:24:26 wazuh-modulesd[341468] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:24:26 wazuh-modulesd[341468] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:24:26 wazuh-modulesd[341468] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:24:26 wazuh-modulesd[341468] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:24:26 wazuh-modulesd[341468] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 18:24:26 wazuh-modulesd[341468] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:24:42.561186 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 3.14 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:24:39 wazuh-modulesd[341629] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:24:39 wazuh-modulesd[341629] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:24:39 wazuh-modulesd[341629] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:24:39 wazuh-modulesd[341629] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:24:39 wazuh-modulesd[341629] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:24:39 wazuh-modulesd[341629] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:24:54.797941 test_vulnerability_detector/test_scan_results/test_scan_provider_and_nvd_vulnerabilities.py::test_scan_provider_and_nvd_vulnerabilities[ALMALINUX] description: Check if the vulnerability alerts are reported from NVD and OVAL feed sources. 3.08 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:24:51 wazuh-modulesd[342188] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:24:51 wazuh-modulesd[342188] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:24:51 wazuh-modulesd[342188] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:24:51 wazuh-modulesd[342188] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:24:51 wazuh-modulesd[342188] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:24:51 wazuh-modulesd[342188] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:25:08.399233 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[RHEL] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:25:03 wazuh-modulesd[342745] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:25:03 wazuh-modulesd[342745] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:25:03 wazuh-modulesd[342745] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:25:03 wazuh-modulesd[342745] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:25:03 wazuh-modulesd[342745] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:25:03 wazuh-modulesd[342745] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:25:03 wazuh-modulesd[342745] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:25:20.976551 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Debian] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 4.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:25:16 wazuh-modulesd[342929] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:25:16 wazuh-modulesd[342929] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:25:16 wazuh-modulesd[342929] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:25:16 wazuh-modulesd[342929] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:25:16 wazuh-modulesd[342929] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added debian (bullseye) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/debian/custom_debian_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:25:16 wazuh-modulesd[342929] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:25:42.245755 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALAS] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:25:37 wazuh-modulesd[343208] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:25:37 wazuh-modulesd[343208] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:25:37 wazuh-modulesd[343208] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:25:37 wazuh-modulesd[343208] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:25:37 wazuh-modulesd[343208] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/31 18:25:37 wazuh-modulesd[343208] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:25:55.536971 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[Arch] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 5.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:25:50 wazuh-modulesd[343359] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:25:50 wazuh-modulesd[343359] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:25:50 wazuh-modulesd[343359] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:25:50 wazuh-modulesd[343359] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:25:50 wazuh-modulesd[343359] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added arch feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/arch/custom_archlinux_feed.json' | Multi url: 'none' | Update since: 0 | Timeout: 300s 2023/07/31 18:25:50 wazuh-modulesd[343359] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:26:07.169391 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[SUSE] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 3.65 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:26:03 wazuh-modulesd[343521] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:26:03 wazuh-modulesd[343521] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:26:03 wazuh-modulesd[343521] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:26:03 wazuh-modulesd[343521] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:26:03 wazuh-modulesd[343521] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:26:03 wazuh-modulesd[343521] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:26:19.563321 test_vulnerability_detector/test_scan_results/test_scan_provider_vulnerabilities.py::test_scan_provider_vulnerabilities[ALMALINUX] description: Check if the vulnerability alerts are reported making vulnerabilities found only by OVAL and not NVD. 3.12 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:26:16 wazuh-modulesd[344127] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:26:16 wazuh-modulesd[344127] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:26:16 wazuh-modulesd[344127] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:26:16 wazuh-modulesd[344127] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:26:16 wazuh-modulesd[344127] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:26:16 wazuh-modulesd[344127] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_alternative_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:26:34.623884 test_vulnerability_detector/test_scan_results/test_scan_vulnerabilities_triaged_null.py::test_scan_triaged_null_vulnerabilities[RHEL] description: Check if a vulnerable package with triaged NULL, is detected with the partial scan. 6.05 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:26:28 wazuh-modulesd[344684] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:26:28 wazuh-modulesd[344684] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:26:28 wazuh-modulesd[344684] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:26:28 wazuh-modulesd[344684] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:26:28 wazuh-modulesd[344684] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:26:28 wazuh-modulesd[344684] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:26:28 wazuh-modulesd[344684] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:26:59.282174 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 16.59 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:26:42 wazuh-modulesd[344844] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:26:42 wazuh-modulesd[344844] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:26:42 wazuh-modulesd[344844] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:26:42 wazuh-modulesd[344844] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:26:42 wazuh-modulesd[344844] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:26:42 wazuh-modulesd[344844] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:26:42 wazuh-modulesd[344844] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:27:24.305626 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - ALAS 2022] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 17.08 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:27:07 wazuh-modulesd[345079] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:27:07 wazuh-modulesd[345079] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:27:07 wazuh-modulesd[345079] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:27:07 wazuh-modulesd[345079] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:27:07 wazuh-modulesd[345079] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/31 18:27:07 wazuh-modulesd[345079] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:27:49.692970 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 17.07 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:27:32 wazuh-modulesd[345362] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:27:32 wazuh-modulesd[345362] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:27:32 wazuh-modulesd[345362] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:27:32 wazuh-modulesd[345362] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:27:32 wazuh-modulesd[345362] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:27:32 wazuh-modulesd[345362] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:28:09.543288 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_update_package[Alert vulnerability removal - ALMALINUX] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory when a package is updated to a non-vulnerable version. 11.57 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:27:57 wazuh-modulesd[345611] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:27:57 wazuh-modulesd[345611] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:27:57 wazuh-modulesd[345611] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:27:57 wazuh-modulesd[345611] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:27:57 wazuh-modulesd[345611] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:27:57 wazuh-modulesd[345611] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:28:29.377097 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 11.57 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:28:17 wazuh-modulesd[345804] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:28:17 wazuh-modulesd[345804] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:28:17 wazuh-modulesd[345804] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:28:17 wazuh-modulesd[345804] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:28:17 wazuh-modulesd[345804] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:28:17 wazuh-modulesd[345804] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:28:17 wazuh-modulesd[345804] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:28:53.199774 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - ALAS 2022] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 15.57 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:28:37 wazuh-modulesd[345996] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:28:37 wazuh-modulesd[345996] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:28:37 wazuh-modulesd[345996] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:28:37 wazuh-modulesd[345996] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:28:37 wazuh-modulesd[345996] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added alas (amazon-linux-2022) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/alas/custom_alas_2022_feed.json' | Url: 'none' | Timeout: 300s 2023/07/31 18:28:37 wazuh-modulesd[345996] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:29:18.041200 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - SUSE] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 16.57 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:29:01 wazuh-modulesd[346207] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:29:01 wazuh-modulesd[346207] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:29:01 wazuh-modulesd[346207] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:29:01 wazuh-modulesd[346207] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:29:01 wazuh-modulesd[346207] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added suse (15-server) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/suse/custom_suse_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:29:01 wazuh-modulesd[346207] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:29:42.865171 test_vulnerability_detector/test_scan_results/test_scan_vulnerability_removal.py::test_vulnerability_removal_delete_package[Alert vulnerability removal - ALMALINUX] description: Check that the Vulnerability Detector module generates an alert when a vulnerability is removed from. the inventory. 16.57 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:29:26 wazuh-modulesd[346422] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:29:26 wazuh-modulesd[346422] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:29:26 wazuh-modulesd[346422] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:29:26 wazuh-modulesd[346422] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:29:26 wazuh-modulesd[346422] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added almalinux (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/almalinux/custom_alsa8_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:29:26 wazuh-modulesd[346422] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 10s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_results/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:29:51.577056 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_start[RHEL] description: Check that the baseline scan starts. 0.50 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:29:51 wazuh-modulesd[346697] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:29:51 wazuh-modulesd[346697] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:29:51 wazuh-modulesd[346697] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:29:51 wazuh-modulesd[346697] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:29:51 wazuh-modulesd[346697] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:29:51 wazuh-modulesd[346697] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:29:51 wazuh-modulesd[346697] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:30:01.888060 test_vulnerability_detector/test_scan_types/test_baseline_scan_type.py::test_baseline_scan_alert[RHEL] description: Check that the baseline scan detects vulnerabilities, and reports them as alerts. 2.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:29:59 wazuh-modulesd[346851] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:29:59 wazuh-modulesd[346851] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:29:59 wazuh-modulesd[346851] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:29:59 wazuh-modulesd[346851] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:29:59 wazuh-modulesd[346851] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:29:59 wazuh-modulesd[346851] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:29:59 wazuh-modulesd[346851] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:30:11.111995 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_start[RHEL] description: Check that the full scan starts. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:30:10 wazuh-modulesd[347007] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:30:10 wazuh-modulesd[347007] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:30:10 wazuh-modulesd[347007] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:30:10 wazuh-modulesd[347007] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:30:10 wazuh-modulesd[347007] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:30:10 wazuh-modulesd[347007] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:30:10 wazuh-modulesd[347007] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:30:31.675698 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_no_alert_after_no_changes[RHEL] description: Check that the full scan does not report previously reported vulnerabilities. 12.56 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:30:19 wazuh-modulesd[347141] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:30:19 wazuh-modulesd[347141] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:30:19 wazuh-modulesd[347141] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:30:19 wazuh-modulesd[347141] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:30:19 wazuh-modulesd[347141] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:30:19 wazuh-modulesd[347141] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:30:19 wazuh-modulesd[347141] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 18:30:31,666 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-07-31 18:30:31,666 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:30:31,666 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:30:46.495588 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_alert_after_changes[RHEL] description: Check that the full scan reports a new vulnerability from the latest scan. 6.56 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:30:39 wazuh-modulesd[347493] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:30:39 wazuh-modulesd[347493] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:30:39 wazuh-modulesd[347493] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:30:39 wazuh-modulesd[347493] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:30:39 wazuh-modulesd[347493] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:30:39 wazuh-modulesd[347493] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:30:39 wazuh-modulesd[347493] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:31:06.333501 test_vulnerability_detector/test_scan_types/test_full_scan_type.py::test_full_scan_remove_vulnerability_alert[RHEL] description: Check that the full scan reports removed vulnerabilities. 11.56 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:30:54 wazuh-modulesd[347674] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:30:54 wazuh-modulesd[347674] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:30:54 wazuh-modulesd[347674] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:30:54 wazuh-modulesd[347674] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:30:54 wazuh-modulesd[347674] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:30:54 wazuh-modulesd[347674] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:30:54 wazuh-modulesd[347674] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:31:15.616608 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_start[RHEL] description: Check that the partial scan starts. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:31:14 wazuh-modulesd[350615] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:31:14 wazuh-modulesd[350615] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:31:14 wazuh-modulesd[350615] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:31:14 wazuh-modulesd[350615] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:31:14 wazuh-modulesd[350615] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:31:14 wazuh-modulesd[350615] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:31:14 wazuh-modulesd[350615] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:31:39.626154 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_no_alert_after_no_changes[RHEL] description: Check that the partial scan does not report previously reported vulnerabilities. 16.02 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:31:23 wazuh-modulesd[350800] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:31:23 wazuh-modulesd[350800] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:31:23 wazuh-modulesd[350800] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:31:23 wazuh-modulesd[350800] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:31:23 wazuh-modulesd[350800] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:31:23 wazuh-modulesd[350800] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:31:23 wazuh-modulesd[350800] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
------------------------------Captured stderr call------------------------------
2023-07-31 18:31:39,615 - wazuh_testing - ERROR - Could not find the report which says that CVE-000 affects the package custom-package-0 2023-07-31 18:31:39,615 - wazuh_testing - ERROR - Results accumulated: 0 2023-07-31 18:31:39,615 - wazuh_testing - ERROR - Results expected: 1
-------------------------------Captured log call--------------------------------
ERROR  wazuh_testing:monitoring.py:466 Could not find the report which says that CVE-000 affects the package custom-package-0 ERROR  wazuh_testing:monitoring.py:467 Results accumulated: 0 ERROR  wazuh_testing:monitoring.py:469 Results expected: 1
Passed 2023-07-31 21:31:59.602554 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_alert_after_changes[RHEL] description: Check that the partial scan reports a new vulnerability from the latest scan. 11.52 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:31:48 wazuh-modulesd[351264] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:31:48 wazuh-modulesd[351264] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:31:48 wazuh-modulesd[351264] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:31:48 wazuh-modulesd[351264] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:31:48 wazuh-modulesd[351264] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:31:48 wazuh-modulesd[351264] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:31:48 wazuh-modulesd[351264] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:32:14.365734 test_vulnerability_detector/test_scan_types/test_partial_scan_type.py::test_partial_scan_remove_vulnerability_alert[RHEL] description: Check that the partial scan reports removed vulnerabilities. 6.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:32:07 wazuh-modulesd[351512] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:32:07 wazuh-modulesd[351512] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:32:07 wazuh-modulesd[351512] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:32:07 wazuh-modulesd[351512] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:32:07 wazuh-modulesd[351512] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:32:07 wazuh-modulesd[351512] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:32:07 wazuh-modulesd[351512] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_scan_types/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:32:24.599079 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_baseline_scan.py::test_vulnerability_inserted_baseline_scan[RHEL] description: Check that the baseline scan inserts the detected vulnerabilities 2.01 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:32:22 wazuh-modulesd[351668] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:32:22 wazuh-modulesd[351668] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:32:22 wazuh-modulesd[351668] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:32:22 wazuh-modulesd[351668] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:32:22 wazuh-modulesd[351668] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:32:22 wazuh-modulesd[351668] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:32:22 wazuh-modulesd[351668] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:32:35.087306 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_inserted_full_scan[RHEL] description: Check that the full scan inserts the detected vulnerabilities 2.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:32:32 wazuh-modulesd[351804] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:32:32 wazuh-modulesd[351804] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:32:32 wazuh-modulesd[351804] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:32:32 wazuh-modulesd[351804] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:32:32 wazuh-modulesd[351804] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:32:32 wazuh-modulesd[351804] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:32:32 wazuh-modulesd[351804] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:32:44.066137 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_full_scan.py::test_vulnerability_removed_full_scan[RHEL] description: Check that the full scan removes the obsolete vulnerabilities from the inventory. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:32:43 wazuh-modulesd[351946] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:32:43 wazuh-modulesd[351946] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:32:43 wazuh-modulesd[351946] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:32:43 wazuh-modulesd[351946] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:32:43 wazuh-modulesd[351946] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:32:43 wazuh-modulesd[351946] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:32:43 wazuh-modulesd[351946] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:32:54.826406 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_inserted_partial_scan[RHEL] description: Check that the partial scan inserts the detected vulnerabilities. 2.51 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:32:52 wazuh-modulesd[352074] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:32:52 wazuh-modulesd[352074] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:32:52 wazuh-modulesd[352074] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:32:52 wazuh-modulesd[352074] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:32:52 wazuh-modulesd[352074] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:32:52 wazuh-modulesd[352074] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:32:52 wazuh-modulesd[352074] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s
Passed 2023-07-31 21:33:03.748850 test_vulnerability_detector/test_vulnerability_inventory/test_vulnerability_inventory_partial_scan.py::test_vulnerability_removed_partial_scan[RHEL] description: Check that the partial scan removes the obsolete vulnerabilities from the inventory. 1.00 server 1
-----------------------------Captured stderr setup------------------------------
2023/07/31 18:33:02 wazuh-modulesd[352231] debug_op.c:70 at _log(): DEBUG: Logging module auto-initialized 2023/07/31 18:33:02 wazuh-modulesd[352231] main.c:77 at main(): DEBUG: Wazuh home directory: /var/ossec 2023/07/31 18:33:02 wazuh-modulesd[352231] wmodules-osquery-monitor.c:78 at wm_osquery_monitor_read(): DEBUG: Logpath read: /var/log/osquery/osqueryd.results.log 2023/07/31 18:33:02 wazuh-modulesd[352231] wmodules-osquery-monitor.c:84 at wm_osquery_monitor_read(): DEBUG: configPath read: /etc/osquery/osquery.conf 2023/07/31 18:33:02 wazuh-modulesd[352231] wmodules-vuln-detector.c:686 at wm_vuldet_read_provider(): DEBUG: Added redhat (8) feed. Interval: 3600s | Path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_oval_feed.xml' | Url: 'none' | Timeout: 300s 2023/07/31 18:33:02 wazuh-modulesd[352231] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added jredhat feed. Interval: 3600s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/redhat/custom_redhat_json_feed.json' | Multi url: 'none' | Update since: 1999 | Timeout: 300s 2023/07/31 18:33:02 wazuh-modulesd[352231] wmodules-vuln-detector.c:744 at wm_vuldet_read_provider(): DEBUG: Added nvd feed. Interval: 86400s | Multi path: '/home/mcervilla/Projects/wazuh-qa/tests/integration/test_vulnerability_detector/test_vulnerability_inventory/../data/feeds/nvd/custom_nvd_feed.json' | Multi url: 'none' | Update since: 2010 | Timeout: 300s