Test_e2e_system_284_test_vulnerability_detector.html

Report generated on 07-May-2024 at 11:28:00 by pytest-html v3.1.1

Environment

Packages {"pluggy": "0.13.1", "py": "1.10.0", "pytest": "7.1.2"}
Platform Linux-5.10.198-187.748.amzn2.x86_64-x86_64-with-glibc2.26
Plugins {"html": "3.1.1", "metadata": "2.0.1", "testinfra": "5.0.0"}
Python 3.9.18

Summary

16 tests ran in 8347.55 seconds.

0 passed, 0 skipped, 16 failed, 0 errors, 0 expected failures, 0 unexpected passes
Tests Failed Success XFail Error
test_vulnerability_detector/test_vulnerability_detector.py 16 0 0 0

Results

Result Test Description Duration Links
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_first_syscollector_scan[vd_disabled_when_agents_registration] description: Validates the initiation of the first Syscollector scans across all agents in the environment. 1900.74

Test function details

Extended Summary

This test ensures that Syscollector first scans are started in all agents in the environment.
tier: 0
parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- vulnerability_detection_previously_enabled:
type: fixture
brief: Whether the vulnerability detection was previously enabled
- configure_environment:
type: fixture
brief: Configure the environment with the given configurations
- get_results: fixture to get the results of global class tests
assertions:
- Verify that all agents has been scanned

Parameters

self = <test_vulnerability_detector.TestInitialScans object at 0x7f65275ccfd0>
request = <FixtureRequest for <Function test_first_syscollector_scan[vd_disabled_when_agents_registration]>>
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
save_indexer_credentials_keystore = None
vulnerability_detection_previously_enabled = False
configure_vulnerability_detection_test_environment = '2024-05-07T09:09:52'
record_property = <function record_property.<locals>.append_property at 0x7f652727eca0>
clean_environment_logs = None, delete_states_vulnerability_index = None

@pytest.mark.parametrize(
"vulnerability_detection_previously_enabled",
[False, True],
ids=[
"vd_disabled_when_agents_registration",
"vd_enabled_when_agents_registration",
],
)
def test_first_syscollector_scan(
self,
request,
host_manager,
save_indexer_credentials_keystore,
vulnerability_detection_previously_enabled,
configure_vulnerability_detection_test_environment,
record_property,
clean_environment_logs,
delete_states_vulnerability_index,
):
"""
description: Validates the initiation of the first Syscollector scans across all agents in the environment.

This test ensures that Syscollector first scans are started in all agents in the environment.

tier: 0

parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- vulnerability_detection_previously_enabled:
type: fixture
brief: Whether the vulnerability detection was previously enabled
- configure_environment:
type: fixture
brief: Configure the environment with the given configurations
- get_results: fixture to get the results of global class tests

assertions:
- Verify that all agents has been scanned
"""
global AGENTS_SCANNED_FIRST_SCAN
global FIRST_SCAN_TIME
global FIRST_SCAN_VULNERABILITIES_INDEX
global INITIAL_VULNERABILITIES

FIRST_SCAN_TIME = configure_vulnerability_detection_test_environment

test_result = TestResult(request.node.name)
test_result.add_check(self.all_agents_scanned_syscollector_first_scan_check)
test_result.add_check(self.all_agents_scanned_vulnerability_first_scan_check)
test_result.add_check(self.no_errors_check)

record_property("test_result", test_result)

# Store the agents scanned by syscollector in a global variable.
# Only the last test case result is retained for comparison with the second scan.
agents_not_scanned_first_scan = monitoring_syscollector_scan_agents(host_manager,
VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN)

AGENTS_SCANNED_FIRST_SCAN = [
agent
for agent in host_manager.get_group_hosts("agent")
if agent not in agents_not_scanned_first_scan
]

test_result.validate_check(
"all_agents_scanned_syscollector_first_scan",
[
Evidence(
"agents_not_scanned_syscollector_first_scan",
agents_not_scanned_first_scan,
)
],
)

if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
logging.critical("Critical error. Test can not continue")
pytest.fail(
"Syscollector scan not started in any agent. Check agent logs for more information"
)

logging.critical("Waiting until agent all agents have been scanned.")
time.sleep(TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN * len(AGENTS_SCANNED_FIRST_SCAN))

logging.critical("Checking vulnerabilities in the index")
vuln_by_agent_index = get_vulnerabilities_from_states_by_agent(
host_manager,
AGENTS_SCANNED_FIRST_SCAN,
greater_than_timestamp=FIRST_SCAN_TIME,
)

# Store the vulnerabilities in the global variable to make the comparision in test_consistency_initial_scans
if not vulnerability_detection_previously_enabled:
INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"] = (
vuln_by_agent_index
)
else:
INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"] = (
vuln_by_agent_index
)

FIRST_SCAN_VULNERABILITIES_INDEX = vuln_by_agent_index

logging.critical(
"Checking that all agents has been scanned and generated vulnerabilities in the index"
)

agent_not_scanned = []
# We expect at least one vulnerability in each agent
for agent, vulnerabilities in vuln_by_agent_index.items():
if len(vulnerabilities) == 0:
logging.critical(f"No vulnerabilities found for {agent}")
agent_not_scanned.append(agent)

# Validate that all agents has been scanned and generated vulnerabilities in the index
test_result.validate_check(
"all_agents_scanned_vulnerability_first_scan",
[
Evidence(
"agents_not_scanned_vulnerability_first_scan", agent_not_scanned
),
Evidence(
"vulnerabilities_index_first_scan", vuln_by_agent_index, debug=True
),
],
)

logging.critical("Checking for errors in the environment")
unexpected_errors = check_errors_in_environment(
host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS
)

test_result.validate_check(
"no_errors", [Evidence("error_level_messages", unexpected_errors)]
)

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_first_syscollector_scan[vd_disabled_when_agents_registration] failed
E
E Check all_agents_scanned_syscollector_first_scan succeeded
E Check all_agents_scanned_vulnerability_first_scan failed. Evidences (['agents_not_scanned_vulnerability_first_scan']) can be found in the report.
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527273f10>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527273f10>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527273f10>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:374: AssertionError
-------------------------------Captured log setup-------------------------------
ERROR root:conftest.py:276 Save the Wazuh indexer username and password into the Wazuh manager keystore ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: False ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:140 Starting agents ERROR root:test_vulnerability_detector.py:143 Wait until agents are connected ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: True ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:130 Wait until Vulnerability Detector has update all the feeds
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_first_scan result to True with evidences ['agents_not_scanned_syscollector_first_scan'] CRITICAL root:test_vulnerability_detector.py:319 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:322 Checking vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:341 Checking that all agents has been scanned and generated vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent4 ERROR root:__init__.py:237 Marked check all_agents_scanned_vulnerability_first_scan result to False with evidences ['agents_not_scanned_vulnerability_first_scan', 'vulnerabilities_index_first_scan'] CRITICAL root:test_vulnerability_detector.py:365 Checking for errors in the environment ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_first_syscollector_scan[vd_enabled_when_agents_registration] description: Validates the initiation of the first Syscollector scans across all agents in the environment. 1276.54

Test function details

Extended Summary

This test ensures that Syscollector first scans are started in all agents in the environment.
tier: 0
parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- vulnerability_detection_previously_enabled:
type: fixture
brief: Whether the vulnerability detection was previously enabled
- configure_environment:
type: fixture
brief: Configure the environment with the given configurations
- get_results: fixture to get the results of global class tests
assertions:
- Verify that all agents has been scanned

Parameters

self = <test_vulnerability_detector.TestInitialScans object at 0x7f65275ccfa0>
request = <FixtureRequest for <Function test_first_syscollector_scan[vd_enabled_when_agents_registration]>>
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
save_indexer_credentials_keystore = None
vulnerability_detection_previously_enabled = True
configure_vulnerability_detection_test_environment = '2024-05-07T09:41:00'
record_property = <function record_property.<locals>.append_property at 0x7f6526dc61f0>
clean_environment_logs = None, delete_states_vulnerability_index = None

@pytest.mark.parametrize(
"vulnerability_detection_previously_enabled",
[False, True],
ids=[
"vd_disabled_when_agents_registration",
"vd_enabled_when_agents_registration",
],
)
def test_first_syscollector_scan(
self,
request,
host_manager,
save_indexer_credentials_keystore,
vulnerability_detection_previously_enabled,
configure_vulnerability_detection_test_environment,
record_property,
clean_environment_logs,
delete_states_vulnerability_index,
):
"""
description: Validates the initiation of the first Syscollector scans across all agents in the environment.

This test ensures that Syscollector first scans are started in all agents in the environment.

tier: 0

parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- vulnerability_detection_previously_enabled:
type: fixture
brief: Whether the vulnerability detection was previously enabled
- configure_environment:
type: fixture
brief: Configure the environment with the given configurations
- get_results: fixture to get the results of global class tests

assertions:
- Verify that all agents has been scanned
"""
global AGENTS_SCANNED_FIRST_SCAN
global FIRST_SCAN_TIME
global FIRST_SCAN_VULNERABILITIES_INDEX
global INITIAL_VULNERABILITIES

FIRST_SCAN_TIME = configure_vulnerability_detection_test_environment

test_result = TestResult(request.node.name)
test_result.add_check(self.all_agents_scanned_syscollector_first_scan_check)
test_result.add_check(self.all_agents_scanned_vulnerability_first_scan_check)
test_result.add_check(self.no_errors_check)

record_property("test_result", test_result)

# Store the agents scanned by syscollector in a global variable.
# Only the last test case result is retained for comparison with the second scan.
agents_not_scanned_first_scan = monitoring_syscollector_scan_agents(host_manager,
VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN)

AGENTS_SCANNED_FIRST_SCAN = [
agent
for agent in host_manager.get_group_hosts("agent")
if agent not in agents_not_scanned_first_scan
]

test_result.validate_check(
"all_agents_scanned_syscollector_first_scan",
[
Evidence(
"agents_not_scanned_syscollector_first_scan",
agents_not_scanned_first_scan,
)
],
)

if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
logging.critical("Critical error. Test can not continue")
pytest.fail(
"Syscollector scan not started in any agent. Check agent logs for more information"
)

logging.critical("Waiting until agent all agents have been scanned.")
time.sleep(TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN * len(AGENTS_SCANNED_FIRST_SCAN))

logging.critical("Checking vulnerabilities in the index")
vuln_by_agent_index = get_vulnerabilities_from_states_by_agent(
host_manager,
AGENTS_SCANNED_FIRST_SCAN,
greater_than_timestamp=FIRST_SCAN_TIME,
)

# Store the vulnerabilities in the global variable to make the comparision in test_consistency_initial_scans
if not vulnerability_detection_previously_enabled:
INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"] = (
vuln_by_agent_index
)
else:
INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"] = (
vuln_by_agent_index
)

FIRST_SCAN_VULNERABILITIES_INDEX = vuln_by_agent_index

logging.critical(
"Checking that all agents has been scanned and generated vulnerabilities in the index"
)

agent_not_scanned = []
# We expect at least one vulnerability in each agent
for agent, vulnerabilities in vuln_by_agent_index.items():
if len(vulnerabilities) == 0:
logging.critical(f"No vulnerabilities found for {agent}")
agent_not_scanned.append(agent)

# Validate that all agents has been scanned and generated vulnerabilities in the index
test_result.validate_check(
"all_agents_scanned_vulnerability_first_scan",
[
Evidence(
"agents_not_scanned_vulnerability_first_scan", agent_not_scanned
),
Evidence(
"vulnerabilities_index_first_scan", vuln_by_agent_index, debug=True
),
],
)

logging.critical("Checking for errors in the environment")
unexpected_errors = check_errors_in_environment(
host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS
)

test_result.validate_check(
"no_errors", [Evidence("error_level_messages", unexpected_errors)]
)

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_first_syscollector_scan[vd_enabled_when_agents_registration] failed
E
E Check all_agents_scanned_syscollector_first_scan succeeded
E Check all_agents_scanned_vulnerability_first_scan failed. Evidences (['agents_not_scanned_vulnerability_first_scan']) can be found in the report.
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527607dc0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527607dc0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527607dc0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:374: AssertionError
-------------------------------Captured log setup-------------------------------
ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: True ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:130 Wait until Vulnerability Detector has update all the feeds ERROR root:test_vulnerability_detector.py:140 Starting agents ERROR root:test_vulnerability_detector.py:143 Wait until agents are connected
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_first_scan result to True with evidences ['agents_not_scanned_syscollector_first_scan'] CRITICAL root:test_vulnerability_detector.py:319 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:322 Checking vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:341 Checking that all agents has been scanned and generated vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent4 ERROR root:__init__.py:237 Marked check all_agents_scanned_vulnerability_first_scan result to False with evidences ['agents_not_scanned_vulnerability_first_scan', 'vulnerabilities_index_first_scan'] CRITICAL root:test_vulnerability_detector.py:365 Checking for errors in the environment ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_consistency_initial_scans description: Ensure the consistency of the agent's vulnerabilities neither the agent was registered nor. 0.00

Test function details

Extended Summary

This test ensures that the agent's vulnerabilities are consistent with the initial scan.
tier: 0
parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
assertions:
- Verify that the number of vulnerabilities is the same between scans

Parameters

self = <test_vulnerability_detector.TestInitialScans object at 0x7f65275ccb50>
request = <FixtureRequest for <Function test_consistency_initial_scans>>
record_property = <function record_property.<locals>.append_property at 0x7f6526dc63a0>

def test_consistency_initial_scans(self, request, record_property):
"""
description: Ensure the consistency of the agent's vulnerabilities neither the agent was registered nor.

This test ensures that the agent's vulnerabilities are consistent with the initial scan.

tier: 0

parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment

assertions:
- Verify that the number of vulnerabilities is the same between scans
"""
test_result = TestResult(request.node.name)
test_result.add_check(self.initial_vulnerabilities_consistent)

record_property("test_result", test_result)
test_result.validate_check(
"initial_vulnerabilities_consistent",
[
Evidence(
"vd_disabled_when_agents_registration",
INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"],
),
Evidence(
"vd_enabled_when_agents_registration",
INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"],
),
],
)

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_consistency_initial_scans failed
E
E Check initial_vulnerabilities_consistent failed. Evidences (['vd_disabled_when_agents_registration', 'vd_enabled_when_agents_registration']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527748b50>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527748b50>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527748b50>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:411: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check initial_vulnerabilities_consistent result to False with evidences ['vd_disabled_when_agents_registration', 'vd_enabled_when_agents_registration']
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_syscollector_second_scan description: Validates the initiation of the second Syscollector scans across all agents in the environment. 146.79

Test function details

Extended Summary

This test ensures that Syscollector second scans are started in all agents in the environment.
tier: 0
parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- setup_vulnerability_tests:
type: fixture
brief: Setup the environment to proceed with the testing
- get_results: fixture to get the results of global class tests
assertions:
- Verify that all agents has been scanned
cases: None
tags:
- syscollector
- vulnerability_detector

Parameters

self = <test_vulnerability_detector.TestInitialScans object at 0x7f65275cca90>
request = <FixtureRequest for <Function test_syscollector_second_scan>>
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6527647f70>
get_timestamp = '2024-05-07T10:02:38', clean_environment_logs = None
delete_states_vulnerability_index = None

def test_syscollector_second_scan(
self,
request,
host_manager,
record_property,
get_timestamp,
clean_environment_logs,
delete_states_vulnerability_index,
):
"""
description: Validates the initiation of the second Syscollector scans across all agents in the environment.

This test ensures that Syscollector second scans are started in all agents in the environment.

tier: 0

parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- setup_vulnerability_tests:
type: fixture
brief: Setup the environment to proceed with the testing
- get_results: fixture to get the results of global class tests

assertions:
- Verify that all agents has been scanned

cases: None

tags:
- syscollector
- vulnerability_detector
"""
TIMEOUT_SECOND_SCAN = 60

global AGENTS_SCANNED_FIRST_SCAN

test_result = TestResult(request.node.name)

test_result.add_check(self.all_agents_scanned_syscollector_second_scan_check)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.vulnerabilities_consistent_first_second_scan)

record_property("test_result", test_result)

if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip(
"First scan was not executed or no agent was scanned. Skipping test"
)

agents_not_scanned_second_scan = monitoring_syscollector_scan_agents(
host_manager,
VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN,
greater_than_timestamp=get_timestamp,
)

test_result.validate_check(
"all_agents_scanned_syscollector_second_scan",
[
Evidence(
"agents_not_scanned_syscollector_second_scan",
agents_not_scanned_second_scan,
)
],
)

agents_to_check_vulns = [
agent
for agent in host_manager.get_group_hosts("agent")
if agent not in agents_not_scanned_second_scan
]

if len(agents_to_check_vulns) == 0:
pytest.fail(
"Syscollector scan not started in any agent. Check agent logs for more information"
)

logging.critical("Waiting until agent all agents have been scanned.")
time.sleep(TIMEOUT_SECOND_SCAN)

global FIRST_SCAN_TIME

logging.critical("Checking vulnerabilities in the index")
vuln_by_agent_index = get_vulnerabilities_from_states_by_agent(
host_manager, agents_to_check_vulns, greater_than_timestamp=FIRST_SCAN_TIME
)

logging.critical(
"Checking that all agents has been scanned and generated vulnerabilities in the index"
)
test_result.validate_check(
"vulnerabilities_consistent_first_second_scan",
[
Evidence(
"vulnerabilities_index_first_scan", FIRST_SCAN_VULNERABILITIES_INDEX
),
Evidence("vulnerabilities_index_second_scan", vuln_by_agent_index),
],
)

unexpected_errors = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=get_timestamp,
)

test_result.validate_check(
"no_errors", [Evidence("error_level_messages", unexpected_errors)]
)

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_syscollector_second_scan failed
E
E Check all_agents_scanned_syscollector_second_scan succeeded
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check vulnerabilities_consistent_first_second_scan succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cd8bb0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cd8bb0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527cd8bb0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:525: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_second_scan result to True with evidences ['agents_not_scanned_syscollector_second_scan'] CRITICAL root:test_vulnerability_detector.py:492 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:497 Checking vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:502 Checking that all agents has been scanned and generated vulnerabilities in the index ERROR root:__init__.py:237 Marked check vulnerabilities_consistent_first_second_scan result to True with evidences ['vulnerabilities_index_first_scan', 'vulnerabilities_index_second_scan'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_install_vulnerable_package_when_agent_down[install_package] description: Install a vulnerable package when the agent is down. 451.49

Test function details

Extended Summary

This test ensures that the Vulnerability Detector detects the vulnerability when the agent is down.
tier: 0
parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- configure_environment:
type: fixture
brief: Configure the environment with the given configurations
- get_results: fixture to get the results of global class tests
assertions:

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f65275cc040>
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
request = <FixtureRequest for <Function test_install_vulnerable_package_when_agent_down[install_package]>>
record_property = <function record_property.<locals>.append_property at 0x7f6526dc6d30>
preconditions = None
body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
setup = [], clean_environment_logs = None
delete_states_vulnerability_index = None, clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", single_vulnerable_case_complete_list,
ids=single_vulnerable_case_list_ids,)
def test_install_vulnerable_package_when_agent_down(self, host_manager, request, record_property, preconditions,
body, teardown, setup, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
"""
description: Install a vulnerable package when the agent is down.

This test ensures that the Vulnerability Detector detects the vulnerability when the agent is down.

tier: 0

parameters:
- request: pytest request object
- host_manager:
type: fixture
brief: Get the host manager of the environment
- configure_environment:
type: fixture
brief: Configure the environment with the given configurations
- get_results: fixture to get the results of global class tests

assertions:
"""
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

host_manager.control_environment("stop", ["agent"], parallel=True)

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)

host_manager.control_environment("start", ["agent"], parallel=True)

time.sleep(AGENT_REGISTRATION_TIMEOUT * len(AGENTS_SCANNED_FIRST_SCAN))
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"],
body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

logging.critical("Validating found vulnerabilities")
test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)

vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)
test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_install_vulnerable_package_when_agent_down[install_package] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0ca0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0ca0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0ca0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:738: AssertionError
-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:682 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent2': True, 'agent4': True, 'agent1': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:700 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} CRITICAL root:test_vulnerability_detector.py:711 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:721 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_change_agent_manager[install_package] 392.32

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527796fa0>
permutate_agents_managers = None
request = <FixtureRequest for <Function test_change_agent_manager[install_package]>>
preconditions = None
body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6527d10820>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", test_cases_change_manager,
ids=list_ids_change_manager,)
def test_change_agent_manager(self, permutate_agents_managers, request, preconditions, body,
teardown, setup, host_manager, record_property, clean_environment_logs,
delete_states_vulnerability_index, clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)

# Wait for Syscollector and VD Scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"],
body["package"])

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)

vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

logging.critical("Validating found vulnerabilities")
test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp
)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_change_agent_manager[install_package] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report.
E Check expected_vulnerability_mitigated_alert succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0370>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0370>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0370>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:864: AssertionError
-------------------------------Captured log setup-------------------------------
ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent1 to manager2 (172.31.12.164) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent3 to manager2 (172.31.12.164) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent4 to manager2 (172.31.12.164) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent5 to manager1 (172.31.15.53) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent6 to manager2 (44.192.63.45) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent2 to manager1 (172.31.15.53)
-------------------------------Captured log call--------------------------------
CRITICAL root:test_vulnerability_detector.py:773 Remote operation results: {'agent6': True, 'agent4': True, 'agent5': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} CRITICAL root:test_vulnerability_detector.py:794 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:809 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:830 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:843 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package] 310.39

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611ac0>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package]>>
preconditions = None
body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6525e0eaf0>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[install_package] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report.
E Check expected_vulnerability_mitigated_alert succeeded
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726e580>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726e580>> = <wazuh_testing.end_to_end.TestResult object at 0x7f652726e580>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent5': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2017-16014', package_name='http-proxy', package_version='0.5.9', architecture='')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2017-16014', package_name='http-proxy', package_version='0.5.9', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_package] 311.46

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611cd0>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[remove_package]>>
preconditions = None
body = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6526dceee0>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[remove_package] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index succeeded
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert succeeded
E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report.
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726ea30>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726ea30>> = <wazuh_testing.end_to_end.TestResult object at 0x7f652726ea30>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] 846.72

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611a30>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability]>>
preconditions = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}}
body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-...oxy-0.5.10'}, 'ubuntu': {'amd64': 'grafana-8.5.6', 'arm64v8': 'grafana-8.5.6'}, 'windows': {'amd64': 'node-v17.1.0'}}}}
teardown = None, setup = ['agent5', 'agent3', 'agent2']
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6525e0ea60>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index failed. Evidences (['unexpected_vulnerabilities']) can be found in the report.
E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report.
E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report.
E Check setup_operation_results failed. Evidences (['setup_failed_agents']) can be found in the report.
E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6525e080d0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6525e080d0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6525e080d0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log setup-------------------------------
CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {}
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to False with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent4': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {'agent1': [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64')]} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64')] ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to False with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability] 333.15

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f65276119d0>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability]>>
preconditions = None
body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.6-1', 'arm64v8': 'grafana-8.5.6-...tion-5.0.0'}, 'ubuntu': {'amd64': 'grafana-9.1.1', 'arm64v8': 'grafana-9.1.1'}, 'windows': {'amd64': 'node-v18.0.0'}}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6527347f70>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report.
E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report.
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272875b0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272875b0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272875b0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent1': True, 'agent4': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability] 333.05

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611f40>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability]>>
preconditions = None
body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.1.1-1', 'arm64v8': 'grafana-9.1.1-...tion-5.0.0'}, 'ubuntu': {'amd64': 'grafana-9.2.0', 'arm64v8': 'grafana-9.2.0'}, 'windows': {'amd64': 'node-v18.1.0'}}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6527cf9a60>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report.
E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report.
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65277cccd0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65277cccd0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65277cccd0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2023-42810', package_name='systeminformation', package_version='5.0.0', architecture='')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2023-42810', package_name='systeminformation', package_version='5.0.0', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] 329.37

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f65276117f0>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability]>>
preconditions = None
body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.2.0-1', 'arm64v8': 'grafana-9.2.0-...y-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.4.17', 'arm64v8': 'grafana-9.4.17'}, 'windows': {'amd64': 'node-v18.20.0'}}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f65273474c0>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index succeeded
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert succeeded
E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report.
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272f7190>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272f7190>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272f7190>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent5': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable] 334.52

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611e20>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable]>>
preconditions = None
body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.4.17-1', 'arm64v8': 'grafana-9.4.1...y-0.7.2'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.2'}}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6527330160>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents succeeded
E Check expected_vulnerabilities_found_in_index succeeded
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert succeeded
E Check expected_vulnerability_mitigated_alert succeeded
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6507fc8250>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6507fc8250>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6507fc8250>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] 487.31

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611e80>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable]>>
preconditions = None
body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.1...on-3.0.0'}, 'ubuntu': {'amd64': 'grafana-10.0.0', 'arm64v8': 'grafana-10.0.0'}, 'windows': {'amd64': 'node-v20.5.1'}}}}
teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-10.0.0-1', 'arm64v8': 'grafana-10.0.0-1'}, 'm...xon-3.0.0'}, 'ubuntu': {'amd64': 'grafana-10.0.0', 'arm64v8': 'grafana-10.0.0'}, 'windows': {'amd64': 'node-v20.5.1'}}}
setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f65272fca60>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents failed. Evidences (['operation_results']) can be found in the report.
E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report.
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report.
E Check expected_vulnerability_mitigated_alert succeeded
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report.
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6526dc3880>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6526dc3880>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6526dc3880>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] ERROR root:remote_operations_handler.py:401 Error installing package on agent2: Failed to install package in agent2: {'changed': False, 'msg': 'Unhandled exception while executing module: Exception calling "OpenPackage" with "2" argument(s): "This installation package could not be opened. Verify that the package exists and that you can access it, or contact the application vendor to verify that this is a valid Windows Installer package"'} CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': False} CRITICAL root:check_validators.py:9 Operation on agent2 failed ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs ERROR root:remote_operations_handler.py:378 Error removing package on agent2: Failed to remove package in agent2: {'changed': False, 'rc': 0, 'reboot_required': False}
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package_non_vulnerable] 307.18

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611eb0>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package_non_vulnerable]>>
preconditions = None
body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, '...xy-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.0'}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f652734ea60>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[install_package_non_vulnerable] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents failed. Evidences (['operation_results']) can be found in the report.
E Check expected_vulnerabilities_found_in_index succeeded
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert succeeded
E Check expected_vulnerability_mitigated_alert succeeded
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cfaa60>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cfaa60>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527cfaa60>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] ERROR root:remote_operations_handler.py:326 Error installing package on agent2: Failed to install package in agent2: {'changed': False, 'elapsed': 0.6012103999999999, 'log': "=== Verbose logging started: 5/7/2024 11:17:02 Build type: SHIP UNICODE 5.00.10011.00 Calling process: C:\\Windows\\System32\\msiexec.exe ===\r\nMSI (c) (C8:40) [11:17:02:234]: Resetting cached policy values\r\nMSI (c) (C8:40) [11:17:02:234]: Machine policy value 'Debug' is 0\r\nMSI (c) (C8:40) [11:17:02:234]: ******* RunEngine:\r\n ******* Product: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\n ******* Action: \r\n ******* CommandLine: **********\r\nMSI (c) (C8:40) [11:17:02:234]: Client-side and UI is none or basic: Running entire install on the server.\r\nMSI (c) (C8:40) [11:17:02:234]: Grabbed execution mutex.\r\nMSI (c) (C8:40) [11:17:02:234]: Cloaking enabled.\r\nMSI (c) (C8:40) [11:17:02:234]: Attempting to enable all disabled privileges before calling Install on Server\r\nMSI (c) (C8:40) [11:17:02:234]: Incrementing counter to disable shutdown. Counter after increment: 0\r\nMSI (s) (88:DC) [11:17:02:249]: Running installation inside multi-package transaction C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\nMSI (s) (88:DC) [11:17:02:249]: Grabbed execution mutex.\r\nMSI (s) (88:A4) [11:17:02:249]: Resetting cached policy values\r\nMSI (s) (88:A4) [11:17:02:249]: Machine policy value 'Debug' is 0\r\nMSI (s) (88:A4) [11:17:02:249]: ******* RunEngine:\r\n ******* Product: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\n ******* Action: \r\n ******* CommandLine: **********\r\nMSI (s) (88:A4) [11:17:02:249]: Machine policy value 'DisableUserInstalls' is 0\r\nMSI (s) (88:A4) [11:17:02:249]: Note: 1: 2203 2: C:\\Windows\\Installer\\inprogressinstallinfo.ipi 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:265]: SRSetRestorePoint skipped for this transaction.\r\nMSI (s) (88:A4) [11:17:02:265]: Note: 1: 1402 2: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer 3: 2 \r\nMSI (s) (88:A4) [11:17:02:265]: File will have security applied from OpCode.\r\nMSI (s) (88:A4) [11:17:02:281]: SOFTWARE RESTRICTION POLICY: Verifying package --> 'C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi' against software restriction policy\r\nMSI (s) (88:A4) [11:17:02:281]: SOFTWARE RESTRICTION POLICY: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi has a digital signature\r\nMSI (s) (88:A4) [11:17:02:296]: SOFTWARE RESTRICTION POLICY: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi is permitted to run at the 'unrestricted' authorization level.\r\nMSI (s) (88:A4) [11:17:02:296]: MSCOREE not loaded loading copy from system32\r\nMSI (s) (88:A4) [11:17:02:296]: End dialog not enabled\r\nMSI (s) (88:A4) [11:17:02:296]: Original package ==> C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\nMSI (s) (88:A4) [11:17:02:296]: Package we're running from ==> C:\\Windows\\Installer\\856c8e.msi\r\nMSI (s) (88:A4) [11:17:02:296]: APPCOMPAT: Compatibility mode property overrides found.\r\nMSI (s) (88:A4) [11:17:02:296]: APPCOMPAT: looking for appcompat database entry with ProductCode '{ED801E31-1556-48A1-AC38-BADEF42169B0}'.\r\nMSI (s) (88:A4) [11:17:02:296]: APPCOMPAT: no matching ProductCode found in database.\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'TransformsSecure' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: User policy value 'TransformsAtSource' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisablePatch' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'AllowLockdownPatch' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableLUAPatching' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableFlyWeightPatching' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: APPCOMPAT: looking for appcompat database entry with ProductCode '{ED801E31-1556-48A1-AC38-BADEF42169B0}'.\r\nMSI (s) (88:A4) [11:17:02:312]: APPCOMPAT: no matching ProductCode found in database.\r\nMSI (s) (88:A4) [11:17:02:312]: Transforms are not secure.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding MsiLogFileLocation property. Its value is 'C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\msiexec.log'.\r\nMSI (s) (88:A4) [11:17:02:312]: Command Line: REBOOT=ReallySuppress REBOOTPROMPT=S CURRENTDIRECTORY=C:\\Users\\qa CLIENTUILEVEL=3 CLIENTPROCESSID=6088 \r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding PackageCode property. Its value is '{458F748B-28FB-4746-94C7-2E7A73152173}'.\r\nMSI (s) (88:A4) [11:17:02:312]: Product Code passed to Engine.Initialize: ''\r\nMSI (s) (88:A4) [11:17:02:312]: Product Code from property table before transforms: '{ED801E31-1556-48A1-AC38-BADEF42169B0}'\r\nMSI (s) (88:A4) [11:17:02:312]: Product Code from property table after transforms: '{ED801E31-1556-48A1-AC38-BADEF42169B0}'\r\nMSI (s) (88:A4) [11:17:02:312]: Product not registered: beginning first-time install\r\nMSI (s) (88:A4) [11:17:02:312]: Product {ED801E31-1556-48A1-AC38-BADEF42169B0} is not managed.\r\nMSI (s) (88:A4) [11:17:02:312]: MSI_LUA: Credential prompt not required, user is an admin\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding ProductState property. Its value is '-1'.\r\nMSI (s) (88:A4) [11:17:02:312]: Entering CMsiConfigurationManager::SetLastUsedSource.\r\nMSI (s) (88:A4) [11:17:02:312]: User policy value 'SearchOrder' is 'nmu'\r\nMSI (s) (88:A4) [11:17:02:312]: Adding new sources is allowed.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding PackagecodeChanging property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:312]: Package name extracted from package path: 'node-v18.20.0-x64.msi'\r\nMSI (s) (88:A4) [11:17:02:312]: Package to be registered: 'node-v18.20.0-x64.msi'\r\nMSI (s) (88:A4) [11:17:02:312]: Note: 1: 2262 2: AdminProperties 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableMsi' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'AlwaysInstallElevated' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: User policy value 'AlwaysInstallElevated' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Product installation will be elevated because user is admin and product is being installed per-machine.\r\nMSI (s) (88:A4) [11:17:02:312]: Running product '{ED801E31-1556-48A1-AC38-BADEF42169B0}' with elevated privileges: Product is assigned.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding REBOOT property. Its value is 'ReallySuppress'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding REBOOTPROMPT property. Its value is 'S'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding CURRENTDIRECTORY property. Its value is 'C:\\Users\\qa'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding CLIENTUILEVEL property. Its value is '3'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding CLIENTPROCESSID property. Its value is '6088'.\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableAutomaticApplicationShutdown' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding MsiRestartManagerSessionKey property. Its value is 'f05913425bbaa541a0f476cb4a49d237'.\r\nMSI (s) (88:A4) [11:17:02:312]: RESTART MANAGER: Session opened.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding MsiSystemRebootPending property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:312]: TRANSFORMS property is now: \r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding VersionDatabase property. Its value is '200'.\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Favorites\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Network Shortcuts\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Documents\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Recent\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Templates\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Local\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Pictures\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\Public\\Desktop\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Desktop\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Templates\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Windows\\Fonts\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 2898 2: MS Sans Serif 3: MS Sans Serif 4: 0 5: 16 \r\nMSI (s) (88:A4) [11:17:02:343]: MSI_LUA: Setting MsiRunningElevated property to 1 because the install is already running elevated.\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding MsiRunningElevated property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding Privileged property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 1402 2: HKEY_CURRENT_USER\\Software\\Microsoft\\MS Setup (ACME)\\User Info 3: 2 \r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding USERNAME property. Its value is 'Jenkins'.\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 1402 2: HKEY_CURRENT_USER\\Software\\Microsoft\\MS Setup (ACME)\\User Info 3: 2 \r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding DATABASE property. Its value is 'C:\\Windows\\Installer\\856c8e.msi'.\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding OriginalDatabase property. Its value is 'C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi'.\r\nMSI (s) (88:A4) [11:17:02:343]: Machine policy value 'MsiDisableEmbeddedUI' is 0\r\nMSI (s) (88:A4) [11:17:02:343]: EEUI - Disabling MsiEmbeddedUI for service because it's not a quiet/basic install\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 2205 2: 3: PatchPackage \r\nMSI (s) (88:A4) [11:17:02:343]: Machine policy value 'DisableRollback' is 0\r\nMSI (s) (88:A4) [11:17:02:343]: User policy value 'DisableRollback' is 0\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding UILevel property. Its value is '2'.\r\n=== Logging started: 5/7/2024 11:17:02 ===\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 2203 2: C:\\Windows\\Installer\\inprogressinstallinfo.ipi 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:343]: APPCOMPAT: [DetectVersionLaunchCondition] Launch condition already passes.\r\nMSI (s) (88:A4) [11:17:02:359]: PROPERTY CHANGE: Adding ACTION property. Its value is 'INSTALL'.\r\nMSI (s) (88:A4) [11:17:02:359]: Doing action: INSTALL\r\nAction start 11:17:02: INSTALL.\r\nMSI (s) (88:A4) [11:17:02:359]: Running ExecuteSequence\r\nMSI (s) (88:A4) [11:17:02:359]: Doing action: SetInstallScope\r\nMSI (s) (88:14) [11:17:02:359]: Invoking remote custom action. DLL: C:\\Windows\\Installer\\MSI6CEB.tmp, Entrypoint: SetInstallScope\r\nMSI (s) (88:70) [11:17:02:359]: Generating random cookie.\r\nMSI (s) (88:70) [11:17:02:359]: Created Custom Action Server with PID 1556 (0x614).\r\nMSI (s) (88:E0) [11:17:02:408]: Running as a service.\r\nMSI (s) (88:E0) [11:17:02:424]: Hello, I'm your 64bit Impersonated custom action server.\r\nAction start 11:17:02: SetInstallScope.\r\nMSI (s) (88:A4) [11:17:02:424]: Doing action: GetLocalizedUserNames\r\nAction ended 11:17:02: SetInstallScope. Return value 1.\r\nMSI (s) (88:F8) [11:17:02:424]: Invoking remote custom action. DLL: C:\\Windows\\Installer\\MSI6D2B.tmp, Entrypoint: GetLocalizedUserNames\r\nMSI (s) (88!28) [11:17:02:440]: PROPERTY CHANGE: Adding AUTHENTICATED_USERS property. Its value is 'Authenticated Users'.\r\nAction start 11:17:02: GetLocalizedUserNames.\r\nMSI (s) (88:A4) [11:17:02:440]: Doing action: FindRelatedProducts\r\nAction ended 11:17:02: GetLocalizedUserNames. Return value 1.\r\nAction start 11:17:02: FindRelatedProducts.\r\nMSI (s) (88:A4) [11:17:02:440]: PROPERTY CHANGE: Adding WIX_DOWNGRADE_DETECTED property. Its value is '{2484FA32-4508-4229-B443-7AA07AD22780}'.\r\nMSI (s) (88:A4) [11:17:02:440]: Doing action: AppSearch\r\nAction ended 11:17:02: FindRelatedProducts. Return value 1.\r\nAction start 11:17:02: AppSearch.\r\nMSI (s) (88:A4) [11:17:02:440]: Note: 1: 2262 2: Signature 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:440]: PROPERTY CHANGE: Adding INSTALLDIR property. Its value is 'C:\\Program Files\\nodejs\\'.\r\nMSI (s) (88:A4) [11:17:02:440]: Note: 1: 2262 2: Signature 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:440]: Doing action: WixQueryOsWellKnownSID\r\nAction ended 11:17:02: AppSearch. Return value 1.\r\nMSI (s) (88:8C) [11:17:02:440]: Invoking remote custom action. DLL: C:\\Windows\\Installer\\MSI6D3C.tmp, Entrypoint: WixQueryOsWellKnownSID\r\nMSI (s) (88:70) [11:17:02:440]: Generating random cookie.\r\nMSI (s) (88:70) [11:17:02:456]: Created Custom Action Server with PID 2244 (0x8C4).\r\nMSI (s) (88:F8) [11:17:02:487]: Running as a service.\r\nMSI (s) (88:F8) [11:17:02:487]: Hello, I'm your 32bit Impersonated custom action server.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_LOCALSYSTEM property. Its value is 'NT AUTHORITY\\SYSTEM'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_LOCALSERVICE property. Its value is 'NT AUTHORITY\\LOCAL SERVICE'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_NETWORKSERVICE property. Its value is 'NT AUTHORITY\\NETWORK SERVICE'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_ADMINISTRATORS property. Its value is 'BUILTIN\\Administrators'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_USERS property. Its value is 'BUILTIN\\Users'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_GUESTS property. Its value is 'BUILTIN\\Guests'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_PERFLOGUSERS property. Its value is 'BUILTIN\\Performance Log Users'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_PERFLOGUSERS_NODOMAIN property. Its value is 'Performance Log Users'.\r\nAction start 11:17:02: WixQueryOsWellKnownSID.\r\nMSI (s) (88:A4) [11:17:02:503]: Doing action: LaunchConditions\r\nAction ended 11:17:02: WixQueryOsWellKnownSID. Return value 1.\r\nAction start 11:17:02: LaunchConditions.\r\nMSI (s) (88:A4) [11:17:02:503]: Product: Node.js -- A later version of Node.js is already installed. Setup will now exit.\r\n\r\nA later version of Node.js is already installed. Setup will now exit.\r\nAction ended 11:17:02: LaunchConditions. Return value 3.\r\nAction ended 11:17:02: INSTALL. Return value 3.\r\nProperty(S): UpgradeCode = {47C07A3A-42EF-4213-A85D-8F5A59077C28}\r\nProperty(S): INSTALLDIR = C:\\Program Files\\nodejs\\\r\nProperty(S): WixUIRMOption = UseRM\r\nProperty(S): WIXUI_INSTALLDIR = INSTALLDIR\r\nProperty(S): ALLUSERS = 1\r\nProperty(S): ProgramMenuFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\\r\nProperty(S): ProgramFiles64Folder = C:\\Program Files\\\r\nProperty(S): ARPPRODUCTICON = NodeIcon\r\nProperty(S): ApplicationFolderName = nodejs\r\nProperty(S): WixShellExecTarget = [#InstallToolsBat]\r\nProperty(S): DefaultUIFont = WixUI_Font_Normal\r\nProperty(S): WixUI_Mode = FeatureTree\r\nProperty(S): WIXUI_EXITDIALOGOPTIONALTEXT = Node.js has been successfully installed.\r\nProperty(S): Manufacturer = Node.js Foundation\r\nProperty(S): ProductCode = {ED801E31-1556-48A1-AC38-BADEF42169B0}\r\nProperty(S): ProductLanguage = 1033\r\nProperty(S): ProductName = Node.js\r\nProperty(S): ProductVersion = 18.20.0\r\nProperty(S): ErrorDialog = ErrorDlg\r\nProperty(S): SecureCustomProperties = EARLY_IO_DETECTED;INSTALLDIR;NODE_0X_DETECTED;WIX_ACCOUNT_ADMINISTRATORS;WIX_ACCOUNT_LOCALSYSTEM;WIX_ACCOUNT_USERS;WIX_DOWNGRADE_DETECTED;WIX_UPGRADE_DETECTED\r\nProperty(S): MsiHiddenProperties = ExecXmlFile;ExecXmlFileRollback\r\nProperty(S): WIX_DOWNGRADE_DETECTED = {2484FA32-4508-4229-B443-7AA07AD22780}\r\nProperty(S): MsiLogFileLocation = C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\msiexec.log\r\nProperty(S): PackageCode = {458F748B-28FB-4746-94C7-2E7A73152173}\r\nProperty(S): ProductState = -1\r\nProperty(S): PackagecodeChanging = 1\r\nProperty(S): REBOOT = ReallySuppress\r\nProperty(S): REBOOTPROMPT = S\r\nProperty(S): CURRENTDIRECTORY = C:\\Users\\qa\r\nProperty(S): CLIENTUILEVEL = 3\r\nProperty(S): CLIENTPROCESSID = 6088\r\nProperty(S): MsiRestartManagerSessionKey = f05913425bbaa541a0f476cb4a49d237\r\nProperty(S): VersionDatabase = 200\r\nProperty(S): MsiSystemRebootPending = 1\r\nProperty(S): VersionMsi = 5.00\r\nProperty(S): VersionNT = 603\r\nProperty(S): VersionNT64 = 603\r\nProperty(S): WindowsBuild = 9600\r\nProperty(S): ServicePackLevel = 0\r\nProperty(S): ServicePackLevelMinor = 0\r\nProperty(S): MsiNTProductType = 1\r\nProperty(S): WindowsFolder = C:\\Windows\\\r\nProperty(S): WindowsVolume = C:\\\r\nProperty(S): System64Folder = C:\\Windows\\system32\\\r\nProperty(S): SystemFolder = C:\\Windows\\SysWOW64\\\r\nProperty(S): RemoteAdminTS = 1\r\nProperty(S): TempFolder = C:\\Users\\qa\\AppData\\Local\\Temp\\\r\nProperty(S): ProgramFilesFolder = C:\\Program Files (x86)\\\r\nProperty(S): CommonFilesFolder = C:\\Program Files (x86)\\Common Files\\\r\nProperty(S): CommonFiles64Folder = C:\\Program Files\\Common Files\\\r\nProperty(S): AppDataFolder = C:\\Users\\qa\\AppData\\Roaming\\\r\nProperty(S): FavoritesFolder = C:\\Users\\qa\\Favorites\\\r\nProperty(S): NetHoodFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Network Shortcuts\\\r\nProperty(S): PersonalFolder = C:\\Users\\qa\\Documents\\\r\nProperty(S): PrintHoodFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\\\r\nProperty(S): RecentFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\\r\nProperty(S): SendToFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\\r\nProperty(S): TemplateFolder = C:\\ProgramData\\Microsoft\\Windows\\Templates\\\r\nProperty(S): CommonAppDataFolder = C:\\ProgramData\\\r\nProperty(S): LocalAppDataFolder = C:\\Users\\qa\\AppData\\Local\\\r\nProperty(S): MyPicturesFolder = C:\\Users\\qa\\Pictures\\\r\nProperty(S): AdminToolsFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\\\r\nProperty(S): StartupFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\\r\nProperty(S): StartMenuFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\\r\nProperty(S): DesktopFolder = C:\\Users\\Public\\Desktop\\\r\nProperty(S): FontsFolder = C:\\Windows\\Fonts\\\r\nProperty(S): GPTSupport = 1\r\nProperty(S): OLEAdvtSupport = 1\r\nProperty(S): ShellAdvtSupport = 1\r\nProperty(S): MsiAMD64 = 6\r\nProperty(S): Msix64 = 6\r\nProperty(S): Intel = 6\r\nProperty(S): PhysicalMemory = 4016\r\nProperty(S): VirtualMemory = 4011\r\nProperty(S): AdminUser = 1\r\nProperty(S): MsiTrueAdminUser = 1\r\nProperty(S): LogonUser = qa\r\nProperty(S): UserSID = S-1-5-21-3278051518-3114999403-1073775594-1002\r\nProperty(S): UserLanguageID = 1033\r\nProperty(S): ComputerName = DESKTOP-AQ2R8SM\r\nProperty(S): SystemLanguageID = 1033\r\nProperty(S): ScreenX = 1024\r\nProperty(S): ScreenY = 768\r\nProperty(S): CaptionHeight = 23\r\nProperty(S): BorderTop = 1\r\nProperty(S): BorderSide = 1\r\nProperty(S): TextHeight = 16\r\nProperty(S): TextInternalLeading = 3\r\nProperty(S): ColorBits = 32\r\nProperty(S): TTCSupport = 1\r\nProperty(S): Time = 11:17:02\r\nProperty(S): Date = 5/7/2024\r\nProperty(S): MsiNetAssemblySupport = 4.8.9032.0\r\nProperty(S): MsiWin32AssemblySupport = 6.3.22621.963\r\nProperty(S): RedirectedDllSupport = 2\r\nProperty(S): MsiRunningElevated = 1\r\nProperty(S): Privileged = 1\r\nProperty(S): USERNAME = Jenkins\r\nProperty(S): DATABASE = C:\\Windows\\Installer\\856c8e.msi\r\nProperty(S): OriginalDatabase = C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\nProperty(S): UILevel = 2\r\nProperty(S): ACTION = INSTALL\r\nProperty(S): AUTHENTICATED_USERS = Authenticated Users\r\nProperty(S): WIX_ACCOUNT_LOCALSYSTEM = NT AUTHORITY\\SYSTEM\r\nProperty(S): WIX_ACCOUNT_LOCALSERVICE = NT AUTHORITY\\LOCAL SERVICE\r\nProperty(S): WIX_ACCOUNT_NETWORKSERVICE = NT AUTHORITY\\NETWORK SERVICE\r\nProperty(S): WIX_ACCOUNT_ADMINISTRATORS = BUILTIN\\Administrators\r\nProperty(S): WIX_ACCOUNT_USERS = BUILTIN\\Users\r\nProperty(S): WIX_ACCOUNT_GUESTS = BUILTIN\\Guests\r\nProperty(S): WIX_ACCOUNT_PERFLOGUSERS = BUILTIN\\Performance Log Users\r\nProperty(S): WIX_ACCOUNT_PERFLOGUSERS_NODOMAIN = Performance Log Users\r\nMSI (s) (88:A4) [11:17:02:534]: Note: 1: 1708 \r\nMSI (s) (88:A4) [11:17:02:534]: Product: Node.js -- Installation failed.\r\n\r\nMSI (s) (88:A4) [11:17:02:534]: Windows Installer installed the product. Product Name: Node.js. Product Version: 18.20.0. Product Language: 1033. Manufacturer: Node.js Foundation. Installation success or error status: 1603.\r\n\r\nMSI (s) (88:A4) [11:17:02:534]: Deferring clean up of packages/files, if any exist\r\nMSI (s) (88:A4) [11:17:02:534]: MainEngineThread is returning 1603\r\nMSI (s) (88:DC) [11:17:02:534]: RESTART MANAGER: Session closed.\r\nMSI (s) (88:DC) [11:17:02:534]: No System Restore sequence number for this installation.\r\n=== Logging stopped: 5/7/2024 11:17:02 ===\r\nMSI (s) (88:DC) [11:17:02:534]: User policy value 'DisableRollback' is 0\r\nMSI (s) (88:DC) [11:17:02:534]: Machine policy value 'DisableRollback' is 0\r\nMSI (s) (88:DC) [11:17:02:534]: Incrementing counter to disable shutdown. Counter after increment: 0\r\nMSI (s) (88:DC) [11:17:02:534]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Installer\\Rollback\\Scripts 3: 2 \r\nMSI (s) (88:DC) [11:17:02:534]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Installer\\Rollback\\Scripts 3: 2 \r\nMSI (s) (88:DC) [11:17:02:550]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied. Counter after decrement: -1\r\nMSI (s) (88:DC) [11:17:02:550]: Destroying RemoteAPI object.\r\nMSI (s) (88:70) [11:17:02:550]: Custom Action Manager thread ending.\r\nMSI (c) (C8:40) [11:17:02:550]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied. Counter after decrement: -1\r\nMSI (c) (C8:40) [11:17:02:550]: MainEngineThread is returning 1603\r\n=== Verbose logging stopped: 5/7/2024 11:17:02 ===\r\n\r\n", 'msg': "unexpected rc from 'C:\\Windows\\System32\\msiexec.exe /i C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi /L*V C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\msiexec.log /qn /norestart /passive': see rc, stdout, and stderr for more details", 'rc': 1603, 'reboot_required': False, 'status_code': 200, 'stderr': '', 'stderr_lines': [], 'stdout': '', 'stdout_lines': []} CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent2': False, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True} CRITICAL root:check_validators.py:9 Operation on agent2 failed ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs
Failed test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] 321.86

Test function details

Extended Summary

Parameters

self = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611f70>
request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge]>>
preconditions = None
body = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, 'm...xy-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.0'}}}
teardown = None, setup = []
host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700>
record_property = <function record_property.<locals>.append_property at 0x7f6525bf7670>
clean_environment_logs = None, delete_states_vulnerability_index = None
clean_environment_logs_function = None

@pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids)
def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager,
record_property, clean_environment_logs,
delete_states_vulnerability_index,
clean_environment_logs_function):
# Is mandatory to launch this test along with the first scan test'
global AGENTS_SCANNED_FIRST_SCAN
if len(AGENTS_SCANNED_FIRST_SCAN) == 0:
pytest.skip("No agent was scanned in the first scan. Skipping test.")

target_to_ignore = list(
set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN)
)

utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc)
test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S")

test_result = TestResult(request.node.name)
test_result.add_check(self.no_errors_check)
test_result.add_check(self.operation_successfull_for_all_agents_check)
test_result.add_check(self.expected_vulnerabilities_found_in_index_check)
test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check)
test_result.add_check(self.expected_vulnerability_affected_alert_check)
test_result.add_check(self.expected_vulnerability_mitigated_alert_check)
test_result.add_check(self.setup_successfull_for_all_agents_check)
test_result.add_check(self.no_duplicated_vulnerabilities_check)

record_property("test_result", test_result)

agents_failed_setup = setup
test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)])

# Install Vulnerable package
operations_result = launch_parallel_operations(
body, host_manager, target_to_ignore
)

logging.critical(f"Remote operation results: {operations_result}")
test_result.validate_check(
"operation_successfull_for_all_agents",
[Evidence("operation_results", operations_result)],
)
# Wait for syscollector and VD scan
time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME)

if "to" in body["package"]:
package_data = [body["package"]["to"], body["package"]["from"]]
else:
package_data = [body["package"]]

vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data)
expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN,
body["operation"], body["package"])
duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities)

result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities)
vulnerabilities_not_found = result["vulnerabilities_not_found"]
vulnerabilities_unexpected = result["vulnerabilities_unexpected"]

test_result.validate_check('no_duplicated_vulnerabilities',
[Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities),
Evidence('vulnerabilities', vulnerabilities)
])

logging.critical("Validating found vulnerabilities")
test_result.validate_check(
"expected_vulnerabilities_found_in_index",
[
Evidence("missing_vulnerabilities", vulnerabilities_not_found),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

logging.critical("Validating unexpected vulnerabilities")
test_result.validate_check(
"no_unexpected_vulnerabilities_found_in_index",
[
Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected),
Evidence("vulnerabilities_found_in_index", vulnerabilities),
Evidence("expected_vulnerabilities", expected_vulnerabilities),
],
)

alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp)
expected_alerts = get_expected_alerts(
host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]
)

result_alert = compare_expected_found_vulnerabilities_alerts(
alerts, expected_alerts
)

logging.critical("Validating found alerts")
test_result.validate_check(
"expected_vulnerability_affected_alert",
[
Evidence(
"missing_affected_alerts",
result_alert["vulnerabilities_affected_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

logging.critical("Validating unexpected alerts")
test_result.validate_check(
"expected_vulnerability_mitigated_alert",
[
Evidence(
"missing_mitigated_alerts",
result_alert["vulnerabilities_mitigated_not_found"],
),
Evidence("alerts_found_in_index", alerts),
Evidence("expected_alerts", expected_alerts),
],
)

errors_environment = check_errors_in_environment(
host_manager,
expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS,
greater_than_timestamp=test_timestamp,
)

test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)])

> assert test_result.get_test_result(), test_result.report()
E AssertionError:
E Test test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] failed
E
E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report.
E Check operation_successfull_for_all_agents failed. Evidences (['operation_results']) can be found in the report.
E Check expected_vulnerabilities_found_in_index succeeded
E Check no_unexpected_vulnerabilities_found_in_index succeeded
E Check expected_vulnerability_affected_alert succeeded
E Check expected_vulnerability_mitigated_alert succeeded
E Check setup_operation_results succeeded
E Check no_duplicated_vulnerabilities succeeded
E -----
E
E assert False
E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65276408b0>>()
E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65276408b0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65276408b0>.get_test_result

end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError
-------------------------------Captured log call--------------------------------
ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] ERROR root:remote_operations_handler.py:378 Error removing package on agent2: Failed to remove package in agent2: {'changed': False, 'rc': 0, 'reboot_required': False} CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent2': False, 'agent1': True, 'agent3': True, 'agent5': True} CRITICAL root:check_validators.py:9 Operation on agent2 failed ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages']
-----------------------------Captured log teardown------------------------------
ERROR root:conftest.py:152 Truncate managers and agents logs ERROR root:conftest.py:164 Delete vulnerability index ERROR root:conftest.py:138 Truncate managers and agents logs