r19.html

Report generated on 22-Apr-2024 at 20:12:39 by pytest-html v3.1.1

Summary

9 tests ran in 1383.18 seconds.

7 passed, 0 skipped, 2 failed, 1 errors, 0 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_vulnerability_detector.py 2 7 0 1

Results

Result Test Description Duration Links
Error test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable]::setup 0.00
host = 'agent1', package_data = {'macos': {'amd64': 'http-proxy-0.7.0', 'arm64v8': 'http-proxy-0.7.0'}, 'windows': {'amd64': 'node-v19.5.0'}}
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400>

def get_package_url_for_host(host: str, package_data: Dict[str, Any], host_manager: HostManager) -> str:

host_os_name = host_manager.get_host_variables(host)['os'].split('_')[0]
host_os_arch = host_manager.get_host_variables(host)['architecture']
system = host_manager.get_host_variables(host)['os_name']

if system == 'linux':
system = host_manager.get_host_variables(host)['os'].split('_')[0]

try:
> package_id = package_data[host_os_name][host_os_arch]
E KeyError: 'ubuntu'

../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:174: KeyError

During handling of the above exception, another exception occurred:

preconditions = {'operation': 'install_package', 'package': {'macos': {'amd64': 'http-proxy-0.7.0', 'arm64v8': 'http-proxy-0.7.0'}, 'windows': {'amd64': 'node-v19.5.0'}}, 'target': 'agent'}
teardown = None, host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400>

@pytest.fixture(scope='function')
def setup(preconditions, teardown, host_manager) -> Generator[Dict, None, None]:
"""Fixture for running setup and teardown operations for the specified tests case
It returns a dictionary with the results of the preconditions and teardown operations

Args:
preconditions: Dictionary with the preconditions operations
teardown: Dictionary with the teardown operations
host_manager: An instance of the HostManager class containing information about hosts.

Returns:
Generator: Dictionary with the results of the preconditions and teardown operations
"""

logging.info("Running setup")
result = {}
failed_agents = []

if preconditions:
logging.info("Running preconditions")
> result = launch_parallel_operations(preconditions, host_manager)

test_vulnerability_detector/conftest.py:239:
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:424: in launch_parallel_operations
future.result()
/usr/lib/python3.10/concurrent/futures/_base.py:451: in result
return self.__get_result()
/usr/lib/python3.10/concurrent/futures/_base.py:403: in __get_result
raise self._exception
/usr/lib/python3.10/concurrent/futures/thread.py:58: in run
result = self.fn(*self.args, **self.kwargs)
../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:402: in launch_and_store_result
result = launch_remote_operation(host, task, manager)
../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:378: in launch_remote_operation
operation_result = globals()[operation](host, operation_data, host_manager)
../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:311: in install_package
package_url = get_package_url_for_host(host, operation_data['package'],
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _

host = 'agent1', package_data = {'macos': {'amd64': 'http-proxy-0.7.0', 'arm64v8': 'http-proxy-0.7.0'}, 'windows': {'amd64': 'node-v19.5.0'}}
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400>

def get_package_url_for_host(host: str, package_data: Dict[str, Any], host_manager: HostManager) -> str:

host_os_name = host_manager.get_host_variables(host)['os'].split('_')[0]
host_os_arch = host_manager.get_host_variables(host)['architecture']
system = host_manager.get_host_variables(host)['os_name']

if system == 'linux':
system = host_manager.get_host_variables(host)['os'].split('_')[0]

try:
package_id = package_data[host_os_name][host_os_arch]
package_data = load_packages_metadata()[package_id]
package_url = package_data['urls'][host_os_name][host_os_arch]

return package_url
except KeyError:
> raise ValueError(f"Package for {host_os_name} and {host_os_arch} not found. Maybe {host} OS is not supported.")
E ValueError: Package for ubuntu and amd64 not found. Maybe agent1 OS is not supported.

../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:180: ValueError
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package] 147.97

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7fccd05c0eb0>, request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package]>>
preconditions = None
body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...ntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}, 'target': 'agent'}
teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400>
record_property = <function record_property.<locals>.append_property at 0x7fccd0377010>

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup,
host_manager, record_property):
utc_now_timestamp = datetime.datetime.utcnow()
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

agents_not_scanned_first_scan = []
agents_to_check = [agent for agent in host_manager.get_group_hosts("agent")
if agent not in agents_not_scanned_first_scan]

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerability_alerts_check)
test_result.add_check(self.expected_vulnerability)

record_property("test_result", test_result)

# Install Vulnerable package
operations_result = launch_parallel_operations(body, host_manager, agents_not_scanned_first_scan)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
host_manager.control_environment("start", ["agent"], parallel=True)
time.sleep(AGENT_REGISTRATION_TIMEOUT * len(host_manager.get_group_hosts("agent")))

time.sleep(70)

if 'to' in body['package']:
package_data = [body['package']['to'], body['package']['from']]
else:
package_data = [body['package']]

vulnerabilities = get_vulnerabilities_index(host_manager, agents_to_check, package_data)
vulnerabilities_from_alerts = get_vulnerability_alerts(host_manager, agents_to_check, package_data,
test_timestamp)

expected_alerts = get_expected_alerts(host_manager, agents_to_check, body['operation'], body['package'])
expected_vulnerabilities = get_expected_index(host_manager, agents_to_check, body['operation'], body['package'])

logging.critical("Checking vulnerabilites")
test_result.validate_check(
"expected_vulnerabilities",
[Evidence("vulnerabilities", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities)],
)

test_result.validate_check(
"expected_vulnerability_alerts",
[Evidence("vulnerability_alerts", vulnerabilities_from_alerts),
Evidence("expected_vulnerability_alerts", expected_alerts)],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)
test_result.validate_check(
"no_errors", [Evidence("error_level_messages", errors_environment)]
)

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[install_package] failed
E
E Check no_errors succeeded
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerability_alerts failed
E . Evidences (['vulnerability_alerts', 'expected_vulnerability_alerts']) can be found in the report.
E
E Check expected_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fccd036f100>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fccd036f100>> = <wazuh_testing.end_to_end.TestResult object at 0x7fccd036f100>.get_test_result

test_vulnerability_detector/test_vulnerability_detector.py:765: AssertionError
-------------------------------Captured log setup-------------------------------
CRITICAL root:conftest.py:305 Enabling modulesd debug mode
-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'install_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}, 'absent': {}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:109 Vulnerabilities affected not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]} CRITICAL root:check_validators.py:110 Vulnerabilities mitigated not found: {} ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to False with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package_non_vulnerable] 113.23

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7fccd05c0880>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package_non_vulnerable]>>, preconditions = None
body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, '...u': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v19.5.0'}}, 'target': 'agent'}
teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400>
record_property = <function record_property.<locals>.append_property at 0x7fcccfa76170>

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup,
host_manager, record_property):
utc_now_timestamp = datetime.datetime.utcnow()
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

agents_not_scanned_first_scan = []
agents_to_check = [agent for agent in host_manager.get_group_hosts("agent")
if agent not in agents_not_scanned_first_scan]

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerability_alerts_check)
test_result.add_check(self.expected_vulnerability)

record_property("test_result", test_result)

# Install Vulnerable package
operations_result = launch_parallel_operations(body, host_manager, agents_not_scanned_first_scan)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
host_manager.control_environment("start", ["agent"], parallel=True)
time.sleep(AGENT_REGISTRATION_TIMEOUT * len(host_manager.get_group_hosts("agent")))

time.sleep(70)

if 'to' in body['package']:
package_data = [body['package']['to'], body['package']['from']]
else:
package_data = [body['package']]

vulnerabilities = get_vulnerabilities_index(host_manager, agents_to_check, package_data)
vulnerabilities_from_alerts = get_vulnerability_alerts(host_manager, agents_to_check, package_data,
test_timestamp)

expected_alerts = get_expected_alerts(host_manager, agents_to_check, body['operation'], body['package'])
expected_vulnerabilities = get_expected_index(host_manager, agents_to_check, body['operation'], body['package'])

logging.critical("Checking vulnerabilites")
test_result.validate_check(
"expected_vulnerabilities",
[Evidence("vulnerabilities", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities)],
)

test_result.validate_check(
"expected_vulnerability_alerts",
[Evidence("vulnerability_alerts", vulnerabilities_from_alerts),
Evidence("expected_vulnerability_alerts", expected_alerts)],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)
test_result.validate_check(
"no_errors", [Evidence("error_level_messages", errors_environment)]
)

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[install_package_non_vulnerable] failed
E
E Check no_errors succeeded
E Check operation_successfull_for_all_agents failed
E . Evidences (['operation_results']) can be found in the report.
E
E Check expected_vulnerability_alerts succeeded
E Check expected_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fcccfaa1690>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fcccfaa1690>> = <wazuh_testing.end_to_end.TestResult object at 0x7fcccfaa1690>.get_test_result

test_vulnerability_detector/test_vulnerability_detector.py:765: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:remote_operations_handler.py:318 Error installing package on agent1: Failed to install package in agent1: {'changed': False, 'msg': 'A later version is already installed'} CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'install_package': {'agent1': False}} CRITICAL root:check_validators.py:9 Operation install_package on agent1 failed ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': []}, 'absent': {}} ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_package] 124.00

Test function details

Extended Summary

Parameters

-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'remove_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': []} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}} CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] 208.35

Test function details

Extended Summary

Parameters

-------------------------------Captured log setup-------------------------------
CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}, 'absent': {}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')
-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64')]}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability0] 120.40

Test function details

Extended Summary

Parameters

-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64')]}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64')]}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability1] 120.74

Test function details

Extended Summary

Parameters

-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64')]}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64')]}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] 134.88

Test function details

Extended Summary

Parameters

-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.4.17', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.4.17', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': []}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64')]}} CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] 121.90

Test function details

Extended Summary

Parameters

-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64')]}, 'absent': {'agent1': []}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
Passed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] 152.50

Test function details

Extended Summary

Parameters

-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'remove_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': []} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {}, 'absent': {'agent1': []}} ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
CRITICAL root:conftest.py:313 Disabling modulesd debug mode