Report generated on 22-Apr-2024 at 20:12:39 by pytest-html v3.1.1
9 tests ran in 1383.18 seconds.
(Un)check the boxes to filter the results.
7 passed, 0 skipped, 2 failed, 1 errors, 0 expected failures, 0 unexpected passesTests | Failed | Success | XFail | Error |
---|---|---|---|---|
test_vulnerability_detector/test_vulnerability_detector.py | 2 | 7 | 0 | 1 |
Result | Test | Description | Duration | Links |
---|---|---|---|---|
No results found. Try to check the filters | ||||
Error | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable]::setup | 0.00 | ||
host = 'agent1', package_data = {'macos': {'amd64': 'http-proxy-0.7.0', 'arm64v8': 'http-proxy-0.7.0'}, 'windows': {'amd64': 'node-v19.5.0'}} host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400> def get_package_url_for_host(host: str, package_data: Dict[str, Any], host_manager: HostManager) -> str: host_os_name = host_manager.get_host_variables(host)['os'].split('_')[0] host_os_arch = host_manager.get_host_variables(host)['architecture'] system = host_manager.get_host_variables(host)['os_name'] if system == 'linux': system = host_manager.get_host_variables(host)['os'].split('_')[0] try: > package_id = package_data[host_os_name][host_os_arch] E KeyError: 'ubuntu' ../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:174: KeyError During handling of the above exception, another exception occurred: preconditions = {'operation': 'install_package', 'package': {'macos': {'amd64': 'http-proxy-0.7.0', 'arm64v8': 'http-proxy-0.7.0'}, 'windows': {'amd64': 'node-v19.5.0'}}, 'target': 'agent'} teardown = None, host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400> @pytest.fixture(scope='function') def setup(preconditions, teardown, host_manager) -> Generator[Dict, None, None]: """Fixture for running setup and teardown operations for the specified tests case It returns a dictionary with the results of the preconditions and teardown operations Args: preconditions: Dictionary with the preconditions operations teardown: Dictionary with the teardown operations host_manager: An instance of the HostManager class containing information about hosts. Returns: Generator: Dictionary with the results of the preconditions and teardown operations """ logging.info("Running setup") result = {} failed_agents = [] if preconditions: logging.info("Running preconditions") > result = launch_parallel_operations(preconditions, host_manager) test_vulnerability_detector/conftest.py:239: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ ../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:424: in launch_parallel_operations future.result() /usr/lib/python3.10/concurrent/futures/_base.py:451: in result return self.__get_result() /usr/lib/python3.10/concurrent/futures/_base.py:403: in __get_result raise self._exception /usr/lib/python3.10/concurrent/futures/thread.py:58: in run result = self.fn(*self.args, **self.kwargs) ../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:402: in launch_and_store_result result = launch_remote_operation(host, task, manager) ../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:378: in launch_remote_operation operation_result = globals()[operation](host, operation_data, host_manager) ../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:311: in install_package package_url = get_package_url_for_host(host, operation_data['package'], _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ host = 'agent1', package_data = {'macos': {'amd64': 'http-proxy-0.7.0', 'arm64v8': 'http-proxy-0.7.0'}, 'windows': {'amd64': 'node-v19.5.0'}} host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400> def get_package_url_for_host(host: str, package_data: Dict[str, Any], host_manager: HostManager) -> str: host_os_name = host_manager.get_host_variables(host)['os'].split('_')[0] host_os_arch = host_manager.get_host_variables(host)['architecture'] system = host_manager.get_host_variables(host)['os_name'] if system == 'linux': system = host_manager.get_host_variables(host)['os'].split('_')[0] try: package_id = package_data[host_os_name][host_os_arch] package_data = load_packages_metadata()[package_id] package_url = package_data['urls'][host_os_name][host_os_arch] return package_url except KeyError: > raise ValueError(f"Package for {host_os_name} and {host_os_arch} not found. Maybe {host} OS is not supported.") E ValueError: Package for ubuntu and amd64 not found. Maybe agent1 OS is not supported. ../../deps/wazuh_testing/wazuh_testing/end_to_end/remote_operations_handler.py:180: ValueError | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package] | 147.97 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts test_vulnerability_detector_scans_cases[install_package].log manager1_ossec.log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7fccd05c0eb0>, request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package]>> preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...ntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}, 'target': 'agent'} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400> record_property = <function record_property.<locals>.append_property at 0x7fccd0377010> @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property): utc_now_timestamp = datetime.datetime.utcnow() test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") agents_not_scanned_first_scan = [] agents_to_check = [agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_first_scan] test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerability_alerts_check) test_result.add_check(self.expected_vulnerability) record_property("test_result", test_result) # Install Vulnerable package operations_result = launch_parallel_operations(body, host_manager, agents_not_scanned_first_scan) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) host_manager.control_environment("start", ["agent"], parallel=True) time.sleep(AGENT_REGISTRATION_TIMEOUT * len(host_manager.get_group_hosts("agent"))) time.sleep(70) if 'to' in body['package']: package_data = [body['package']['to'], body['package']['from']] else: package_data = [body['package']] vulnerabilities = get_vulnerabilities_index(host_manager, agents_to_check, package_data) vulnerabilities_from_alerts = get_vulnerability_alerts(host_manager, agents_to_check, package_data, test_timestamp) expected_alerts = get_expected_alerts(host_manager, agents_to_check, body['operation'], body['package']) expected_vulnerabilities = get_expected_index(host_manager, agents_to_check, body['operation'], body['package']) logging.critical("Checking vulnerabilites") test_result.validate_check( "expected_vulnerabilities", [Evidence("vulnerabilities", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities)], ) test_result.validate_check( "expected_vulnerability_alerts", [Evidence("vulnerability_alerts", vulnerabilities_from_alerts), Evidence("expected_vulnerability_alerts", expected_alerts)], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", errors_environment)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[install_package] failed E E Check no_errors succeeded E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerability_alerts failed E . Evidences (['vulnerability_alerts', 'expected_vulnerability_alerts']) can be found in the report. E E Check expected_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fccd036f100>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fccd036f100>> = <wazuh_testing.end_to_end.TestResult object at 0x7fccd036f100>.get_test_result test_vulnerability_detector/test_vulnerability_detector.py:765: AssertionError -------------------------------Captured log setup------------------------------- CRITICAL root:conftest.py:305 Enabling modulesd debug mode -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'install_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}, 'absent': {}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:109 Vulnerabilities affected not found: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]} CRITICAL root:check_validators.py:110 Vulnerabilities mitigated not found: {} ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to False with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package_non_vulnerable] | 113.23 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts manager1_ossec.log expected_vulnerabilities manager1_alert.json test_vulnerability_detector_scans_cases[install_package_non_vulnerable].log agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7fccd05c0880> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package_non_vulnerable]>>, preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, '...u': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v19.5.0'}}, 'target': 'agent'} teardown = None, setup = [], host_manager = <wazuh_testing.tools.system.HostManager object at 0x7fccd05c0400> record_property = <function record_property.<locals>.append_property at 0x7fcccfa76170> @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property): utc_now_timestamp = datetime.datetime.utcnow() test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") agents_not_scanned_first_scan = [] agents_to_check = [agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_first_scan] test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerability_alerts_check) test_result.add_check(self.expected_vulnerability) record_property("test_result", test_result) # Install Vulnerable package operations_result = launch_parallel_operations(body, host_manager, agents_not_scanned_first_scan) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) host_manager.control_environment("start", ["agent"], parallel=True) time.sleep(AGENT_REGISTRATION_TIMEOUT * len(host_manager.get_group_hosts("agent"))) time.sleep(70) if 'to' in body['package']: package_data = [body['package']['to'], body['package']['from']] else: package_data = [body['package']] vulnerabilities = get_vulnerabilities_index(host_manager, agents_to_check, package_data) vulnerabilities_from_alerts = get_vulnerability_alerts(host_manager, agents_to_check, package_data, test_timestamp) expected_alerts = get_expected_alerts(host_manager, agents_to_check, body['operation'], body['package']) expected_vulnerabilities = get_expected_index(host_manager, agents_to_check, body['operation'], body['package']) logging.critical("Checking vulnerabilites") test_result.validate_check( "expected_vulnerabilities", [Evidence("vulnerabilities", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities)], ) test_result.validate_check( "expected_vulnerability_alerts", [Evidence("vulnerability_alerts", vulnerabilities_from_alerts), Evidence("expected_vulnerability_alerts", expected_alerts)], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", errors_environment)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[install_package_non_vulnerable] failed E E Check no_errors succeeded E Check operation_successfull_for_all_agents failed E . Evidences (['operation_results']) can be found in the report. E E Check expected_vulnerability_alerts succeeded E Check expected_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fcccfaa1690>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7fcccfaa1690>> = <wazuh_testing.end_to_end.TestResult object at 0x7fcccfaa1690>.get_test_result test_vulnerability_detector/test_vulnerability_detector.py:765: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:remote_operations_handler.py:318 Error installing package on agent1: Failed to install package in agent1: {'changed': False, 'msg': 'A later version is already installed'} CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'install_package': {'agent1': False}} CRITICAL root:check_validators.py:9 Operation install_package on agent1 failed ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': []}, 'absent': {}} ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_package] | 124.00 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts manager1_ossec.log test_vulnerability_detector_scans_cases[remove_package].log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'remove_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': []} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}} CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] | 208.35 | Test arguments vulnerabilities test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability].log operation_results expected_vulnerability_alerts manager1_ossec.log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log setup------------------------------- CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}, 'absent': {}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64')]}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64')]}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability0] | 120.40 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts manager1_ossec.log test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability0].log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64')]}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64')]}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability1] | 120.74 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts manager1_ossec.log test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability1].log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64')]}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64')]}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] | 134.88 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts manager1_ossec.log test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability].log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.4.17', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='9.4.17', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': []}, 'absent': {'agent1': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64')]}} CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='amd64') CRITICAL root:check_validators.py:47 Vulnerability: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] | 121.90 | Test arguments vulnerabilities test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable].log operation_results expected_vulnerability_alerts manager1_ossec.log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'update_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': [Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-34111', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64')]} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {'agent1': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64')]}, 'absent': {'agent1': []}} CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='amd64') CRITICAL root:check_validators.py:35 Vulnerability: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='amd64') ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] | ||||
Passed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] | 152.50 | Test arguments vulnerabilities operation_results expected_vulnerability_alerts test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge].log manager1_ossec.log expected_vulnerabilities manager1_alert.json agent1_ossec.log vulnerability_alerts error_level_messages | |
Test function detailsExtended SummaryParameters -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:721 Remote operation results: {'remove_package': {'agent1': True}} ERROR root:__init__.py:162 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:743 Checking vulnerabilites CRITICAL root:check_validators.py:20 Vulnerabilities: {'agent1': []} CRITICAL root:check_validators.py:21 Expected vulnerabilities: {'present': {}, 'absent': {'agent1': []}} ERROR root:__init__.py:162 Marked check expected_vulnerabilities result to True with evidences ['vulnerabilities', 'expected_vulnerabilities'] ERROR root:__init__.py:162 Marked check expected_vulnerability_alerts result to True with evidences ['vulnerability_alerts', 'expected_vulnerability_alerts'] ERROR root:__init__.py:162 Marked check no_errors result to True with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ CRITICAL root:conftest.py:313 Disabling modulesd debug mode |