Report generated on 07-May-2024 at 11:28:00 by pytest-html v3.1.1
Packages | {"pluggy": "0.13.1", "py": "1.10.0", "pytest": "7.1.2"} |
Platform | Linux-5.10.198-187.748.amzn2.x86_64-x86_64-with-glibc2.26 |
Plugins | {"html": "3.1.1", "metadata": "2.0.1", "testinfra": "5.0.0"} |
Python | 3.9.18 |
16 tests ran in 8347.55 seconds.
(Un)check the boxes to filter the results.
0 passed, 0 skipped, 16 failed, 0 errors, 0 expected failures, 0 unexpected passesTests | Failed | Success | XFail | Error |
---|---|---|---|---|
test_vulnerability_detector/test_vulnerability_detector.py | 16 | 0 | 0 | 0 |
Result | Test | Description | Duration | Links |
---|---|---|---|---|
No results found. Try to check the filters | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_first_syscollector_scan[vd_disabled_when_agents_registration] | description: Validates the initiation of the first Syscollector scans across all agents in the environment. | 1900.74 | Test arguments test_first_syscollector_scan[vd_disabled_when_agents_registration].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json agents_not_scanned_syscollector_first_scan agents_not_scanned_vulnerability_first_scan vulnerabilities_index_first_scan error_level_messages |
Test function detailsExtended SummaryThis test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7f65275ccfd0> request = <FixtureRequest for <Function test_first_syscollector_scan[vd_disabled_when_agents_registration]>> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> save_indexer_credentials_keystore = None vulnerability_detection_previously_enabled = False configure_vulnerability_detection_test_environment = '2024-05-07T09:09:52' record_property = <function record_property.<locals>.append_property at 0x7f652727eca0> clean_environment_logs = None, delete_states_vulnerability_index = None @pytest.mark.parametrize( "vulnerability_detection_previously_enabled", [False, True], ids=[ "vd_disabled_when_agents_registration", "vd_enabled_when_agents_registration", ], ) def test_first_syscollector_scan( self, request, host_manager, save_indexer_credentials_keystore, vulnerability_detection_previously_enabled, configure_vulnerability_detection_test_environment, record_property, clean_environment_logs, delete_states_vulnerability_index, ): """ description: Validates the initiation of the first Syscollector scans across all agents in the environment. This test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned """ global AGENTS_SCANNED_FIRST_SCAN global FIRST_SCAN_TIME global FIRST_SCAN_VULNERABILITIES_INDEX global INITIAL_VULNERABILITIES FIRST_SCAN_TIME = configure_vulnerability_detection_test_environment test_result = TestResult(request.node.name) test_result.add_check(self.all_agents_scanned_syscollector_first_scan_check) test_result.add_check(self.all_agents_scanned_vulnerability_first_scan_check) test_result.add_check(self.no_errors_check) record_property("test_result", test_result) # Store the agents scanned by syscollector in a global variable. # Only the last test case result is retained for comparison with the second scan. agents_not_scanned_first_scan = monitoring_syscollector_scan_agents(host_manager, VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN) AGENTS_SCANNED_FIRST_SCAN = [ agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_first_scan ] test_result.validate_check( "all_agents_scanned_syscollector_first_scan", [ Evidence( "agents_not_scanned_syscollector_first_scan", agents_not_scanned_first_scan, ) ], ) if len(AGENTS_SCANNED_FIRST_SCAN) == 0: logging.critical("Critical error. Test can not continue") pytest.fail( "Syscollector scan not started in any agent. Check agent logs for more information" ) logging.critical("Waiting until agent all agents have been scanned.") time.sleep(TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN * len(AGENTS_SCANNED_FIRST_SCAN)) logging.critical("Checking vulnerabilities in the index") vuln_by_agent_index = get_vulnerabilities_from_states_by_agent( host_manager, AGENTS_SCANNED_FIRST_SCAN, greater_than_timestamp=FIRST_SCAN_TIME, ) # Store the vulnerabilities in the global variable to make the comparision in test_consistency_initial_scans if not vulnerability_detection_previously_enabled: INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"] = ( vuln_by_agent_index ) else: INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"] = ( vuln_by_agent_index ) FIRST_SCAN_VULNERABILITIES_INDEX = vuln_by_agent_index logging.critical( "Checking that all agents has been scanned and generated vulnerabilities in the index" ) agent_not_scanned = [] # We expect at least one vulnerability in each agent for agent, vulnerabilities in vuln_by_agent_index.items(): if len(vulnerabilities) == 0: logging.critical(f"No vulnerabilities found for {agent}") agent_not_scanned.append(agent) # Validate that all agents has been scanned and generated vulnerabilities in the index test_result.validate_check( "all_agents_scanned_vulnerability_first_scan", [ Evidence( "agents_not_scanned_vulnerability_first_scan", agent_not_scanned ), Evidence( "vulnerabilities_index_first_scan", vuln_by_agent_index, debug=True ), ], ) logging.critical("Checking for errors in the environment") unexpected_errors = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", unexpected_errors)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_first_syscollector_scan[vd_disabled_when_agents_registration] failed E E Check all_agents_scanned_syscollector_first_scan succeeded E Check all_agents_scanned_vulnerability_first_scan failed. Evidences (['agents_not_scanned_vulnerability_first_scan']) can be found in the report. E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527273f10>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527273f10>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527273f10>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:374: AssertionError -------------------------------Captured log setup------------------------------- ERROR root:conftest.py:276 Save the Wazuh indexer username and password into the Wazuh manager keystore ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: False ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:140 Starting agents ERROR root:test_vulnerability_detector.py:143 Wait until agents are connected ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: True ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:130 Wait until Vulnerability Detector has update all the feeds -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_first_scan result to True with evidences ['agents_not_scanned_syscollector_first_scan'] CRITICAL root:test_vulnerability_detector.py:319 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:322 Checking vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:341 Checking that all agents has been scanned and generated vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent4 ERROR root:__init__.py:237 Marked check all_agents_scanned_vulnerability_first_scan result to False with evidences ['agents_not_scanned_vulnerability_first_scan', 'vulnerabilities_index_first_scan'] CRITICAL root:test_vulnerability_detector.py:365 Checking for errors in the environment ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_first_syscollector_scan[vd_enabled_when_agents_registration] | description: Validates the initiation of the first Syscollector scans across all agents in the environment. | 1276.54 | Test arguments test_first_syscollector_scan[vd_enabled_when_agents_registration].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json agents_not_scanned_syscollector_first_scan agents_not_scanned_vulnerability_first_scan vulnerabilities_index_first_scan error_level_messages |
Test function detailsExtended SummaryThis test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7f65275ccfa0> request = <FixtureRequest for <Function test_first_syscollector_scan[vd_enabled_when_agents_registration]>> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> save_indexer_credentials_keystore = None vulnerability_detection_previously_enabled = True configure_vulnerability_detection_test_environment = '2024-05-07T09:41:00' record_property = <function record_property.<locals>.append_property at 0x7f6526dc61f0> clean_environment_logs = None, delete_states_vulnerability_index = None @pytest.mark.parametrize( "vulnerability_detection_previously_enabled", [False, True], ids=[ "vd_disabled_when_agents_registration", "vd_enabled_when_agents_registration", ], ) def test_first_syscollector_scan( self, request, host_manager, save_indexer_credentials_keystore, vulnerability_detection_previously_enabled, configure_vulnerability_detection_test_environment, record_property, clean_environment_logs, delete_states_vulnerability_index, ): """ description: Validates the initiation of the first Syscollector scans across all agents in the environment. This test ensures that Syscollector first scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - vulnerability_detection_previously_enabled: type: fixture brief: Whether the vulnerability detection was previously enabled - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned """ global AGENTS_SCANNED_FIRST_SCAN global FIRST_SCAN_TIME global FIRST_SCAN_VULNERABILITIES_INDEX global INITIAL_VULNERABILITIES FIRST_SCAN_TIME = configure_vulnerability_detection_test_environment test_result = TestResult(request.node.name) test_result.add_check(self.all_agents_scanned_syscollector_first_scan_check) test_result.add_check(self.all_agents_scanned_vulnerability_first_scan_check) test_result.add_check(self.no_errors_check) record_property("test_result", test_result) # Store the agents scanned by syscollector in a global variable. # Only the last test case result is retained for comparison with the second scan. agents_not_scanned_first_scan = monitoring_syscollector_scan_agents(host_manager, VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN) AGENTS_SCANNED_FIRST_SCAN = [ agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_first_scan ] test_result.validate_check( "all_agents_scanned_syscollector_first_scan", [ Evidence( "agents_not_scanned_syscollector_first_scan", agents_not_scanned_first_scan, ) ], ) if len(AGENTS_SCANNED_FIRST_SCAN) == 0: logging.critical("Critical error. Test can not continue") pytest.fail( "Syscollector scan not started in any agent. Check agent logs for more information" ) logging.critical("Waiting until agent all agents have been scanned.") time.sleep(TIMEOUT_PER_AGENT_VULNERABILITY_FIRST_SCAN * len(AGENTS_SCANNED_FIRST_SCAN)) logging.critical("Checking vulnerabilities in the index") vuln_by_agent_index = get_vulnerabilities_from_states_by_agent( host_manager, AGENTS_SCANNED_FIRST_SCAN, greater_than_timestamp=FIRST_SCAN_TIME, ) # Store the vulnerabilities in the global variable to make the comparision in test_consistency_initial_scans if not vulnerability_detection_previously_enabled: INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"] = ( vuln_by_agent_index ) else: INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"] = ( vuln_by_agent_index ) FIRST_SCAN_VULNERABILITIES_INDEX = vuln_by_agent_index logging.critical( "Checking that all agents has been scanned and generated vulnerabilities in the index" ) agent_not_scanned = [] # We expect at least one vulnerability in each agent for agent, vulnerabilities in vuln_by_agent_index.items(): if len(vulnerabilities) == 0: logging.critical(f"No vulnerabilities found for {agent}") agent_not_scanned.append(agent) # Validate that all agents has been scanned and generated vulnerabilities in the index test_result.validate_check( "all_agents_scanned_vulnerability_first_scan", [ Evidence( "agents_not_scanned_vulnerability_first_scan", agent_not_scanned ), Evidence( "vulnerabilities_index_first_scan", vuln_by_agent_index, debug=True ), ], ) logging.critical("Checking for errors in the environment") unexpected_errors = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", unexpected_errors)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_first_syscollector_scan[vd_enabled_when_agents_registration] failed E E Check all_agents_scanned_syscollector_first_scan succeeded E Check all_agents_scanned_vulnerability_first_scan failed. Evidences (['agents_not_scanned_vulnerability_first_scan']) can be found in the report. E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527607dc0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527607dc0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527607dc0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:374: AssertionError -------------------------------Captured log setup------------------------------- ERROR root:test_vulnerability_detector.py:107 Configuring the environment: Vulnerability Detection Enabled: True ERROR root:test_vulnerability_detector.py:126 Restarting managers ERROR root:test_vulnerability_detector.py:130 Wait until Vulnerability Detector has update all the feeds ERROR root:test_vulnerability_detector.py:140 Starting agents ERROR root:test_vulnerability_detector.py:143 Wait until agents are connected -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_first_scan result to True with evidences ['agents_not_scanned_syscollector_first_scan'] CRITICAL root:test_vulnerability_detector.py:319 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:322 Checking vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:341 Checking that all agents has been scanned and generated vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:349 No vulnerabilities found for agent4 ERROR root:__init__.py:237 Marked check all_agents_scanned_vulnerability_first_scan result to False with evidences ['agents_not_scanned_vulnerability_first_scan', 'vulnerabilities_index_first_scan'] CRITICAL root:test_vulnerability_detector.py:365 Checking for errors in the environment ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_consistency_initial_scans | description: Ensure the consistency of the agent's vulnerabilities neither the agent was registered nor. | 0.00 | Test arguments test_consistency_initial_scans.log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json vd_disabled_when_agents_registration vd_enabled_when_agents_registration |
Test function detailsExtended SummaryThis test ensures that the agent's vulnerabilities are consistent with the initial scan. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment assertions: - Verify that the number of vulnerabilities is the same between scans Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7f65275ccb50> request = <FixtureRequest for <Function test_consistency_initial_scans>> record_property = <function record_property.<locals>.append_property at 0x7f6526dc63a0> def test_consistency_initial_scans(self, request, record_property): """ description: Ensure the consistency of the agent's vulnerabilities neither the agent was registered nor. This test ensures that the agent's vulnerabilities are consistent with the initial scan. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment assertions: - Verify that the number of vulnerabilities is the same between scans """ test_result = TestResult(request.node.name) test_result.add_check(self.initial_vulnerabilities_consistent) record_property("test_result", test_result) test_result.validate_check( "initial_vulnerabilities_consistent", [ Evidence( "vd_disabled_when_agents_registration", INITIAL_VULNERABILITIES["vd_disabled_when_agents_registration"], ), Evidence( "vd_enabled_when_agents_registration", INITIAL_VULNERABILITIES["vd_enabled_when_agents_registration"], ), ], ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_consistency_initial_scans failed E E Check initial_vulnerabilities_consistent failed. Evidences (['vd_disabled_when_agents_registration', 'vd_enabled_when_agents_registration']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527748b50>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527748b50>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527748b50>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:411: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check initial_vulnerabilities_consistent result to False with evidences ['vd_disabled_when_agents_registration', 'vd_enabled_when_agents_registration'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestInitialScans::test_syscollector_second_scan | description: Validates the initiation of the second Syscollector scans across all agents in the environment. | 146.79 | Test arguments test_syscollector_second_scan.log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json agents_not_scanned_syscollector_second_scan error_level_messages vulnerabilities_index_first_scan vulnerabilities_index_second_scan |
Test function detailsExtended SummaryThis test ensures that Syscollector second scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - setup_vulnerability_tests: type: fixture brief: Setup the environment to proceed with the testing - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned cases: None tags: - syscollector - vulnerability_detector Parametersself = <test_vulnerability_detector.TestInitialScans object at 0x7f65275cca90> request = <FixtureRequest for <Function test_syscollector_second_scan>> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6527647f70> get_timestamp = '2024-05-07T10:02:38', clean_environment_logs = None delete_states_vulnerability_index = None def test_syscollector_second_scan( self, request, host_manager, record_property, get_timestamp, clean_environment_logs, delete_states_vulnerability_index, ): """ description: Validates the initiation of the second Syscollector scans across all agents in the environment. This test ensures that Syscollector second scans are started in all agents in the environment. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - setup_vulnerability_tests: type: fixture brief: Setup the environment to proceed with the testing - get_results: fixture to get the results of global class tests assertions: - Verify that all agents has been scanned cases: None tags: - syscollector - vulnerability_detector """ TIMEOUT_SECOND_SCAN = 60 global AGENTS_SCANNED_FIRST_SCAN test_result = TestResult(request.node.name) test_result.add_check(self.all_agents_scanned_syscollector_second_scan_check) test_result.add_check(self.no_errors_check) test_result.add_check(self.vulnerabilities_consistent_first_second_scan) record_property("test_result", test_result) if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip( "First scan was not executed or no agent was scanned. Skipping test" ) agents_not_scanned_second_scan = monitoring_syscollector_scan_agents( host_manager, VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN, greater_than_timestamp=get_timestamp, ) test_result.validate_check( "all_agents_scanned_syscollector_second_scan", [ Evidence( "agents_not_scanned_syscollector_second_scan", agents_not_scanned_second_scan, ) ], ) agents_to_check_vulns = [ agent for agent in host_manager.get_group_hosts("agent") if agent not in agents_not_scanned_second_scan ] if len(agents_to_check_vulns) == 0: pytest.fail( "Syscollector scan not started in any agent. Check agent logs for more information" ) logging.critical("Waiting until agent all agents have been scanned.") time.sleep(TIMEOUT_SECOND_SCAN) global FIRST_SCAN_TIME logging.critical("Checking vulnerabilities in the index") vuln_by_agent_index = get_vulnerabilities_from_states_by_agent( host_manager, agents_to_check_vulns, greater_than_timestamp=FIRST_SCAN_TIME ) logging.critical( "Checking that all agents has been scanned and generated vulnerabilities in the index" ) test_result.validate_check( "vulnerabilities_consistent_first_second_scan", [ Evidence( "vulnerabilities_index_first_scan", FIRST_SCAN_VULNERABILITIES_INDEX ), Evidence("vulnerabilities_index_second_scan", vuln_by_agent_index), ], ) unexpected_errors = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=get_timestamp, ) test_result.validate_check( "no_errors", [Evidence("error_level_messages", unexpected_errors)] ) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_syscollector_second_scan failed E E Check all_agents_scanned_syscollector_second_scan succeeded E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check vulnerabilities_consistent_first_second_scan succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cd8bb0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cd8bb0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527cd8bb0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:525: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check all_agents_scanned_syscollector_second_scan result to True with evidences ['agents_not_scanned_syscollector_second_scan'] CRITICAL root:test_vulnerability_detector.py:492 Waiting until agent all agents have been scanned. CRITICAL root:test_vulnerability_detector.py:497 Checking vulnerabilities in the index CRITICAL root:test_vulnerability_detector.py:502 Checking that all agents has been scanned and generated vulnerabilities in the index ERROR root:__init__.py:237 Marked check vulnerabilities_consistent_first_second_scan result to True with evidences ['vulnerabilities_index_first_scan', 'vulnerabilities_index_second_scan'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_install_vulnerable_package_when_agent_down[install_package] | description: Install a vulnerable package when the agent is down. | 451.49 | Test arguments test_install_vulnerable_package_when_agent_down[install_package].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities duplicated_vulnerabilities vulnerabilities |
Test function detailsExtended SummaryThis test ensures that the Vulnerability Detector detects the vulnerability when the agent is down. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: Parametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f65275cc040> host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> request = <FixtureRequest for <Function test_install_vulnerable_package_when_agent_down[install_package]>> record_property = <function record_property.<locals>.append_property at 0x7f6526dc6d30> preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} setup = [], clean_environment_logs = None delete_states_vulnerability_index = None, clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", single_vulnerable_case_complete_list, ids=single_vulnerable_case_list_ids,) def test_install_vulnerable_package_when_agent_down(self, host_manager, request, record_property, preconditions, body, teardown, setup, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): """ description: Install a vulnerable package when the agent is down. This test ensures that the Vulnerability Detector detects the vulnerability when the agent is down. tier: 0 parameters: - request: pytest request object - host_manager: type: fixture brief: Get the host manager of the environment - configure_environment: type: fixture brief: Configure the environment with the given configurations - get_results: fixture to get the results of global class tests assertions: """ # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) host_manager.control_environment("stop", ["agent"], parallel=True) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) host_manager.control_environment("start", ["agent"], parallel=True) time.sleep(AGENT_REGISTRATION_TIMEOUT * len(AGENTS_SCANNED_FIRST_SCAN)) time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) logging.critical("Validating found vulnerabilities") test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_install_vulnerable_package_when_agent_down[install_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0ca0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0ca0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0ca0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:738: AssertionError -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:682 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent2': True, 'agent4': True, 'agent1': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:test_vulnerability_detector.py:700 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent4: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5-1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5-1', architecture='arm64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} CRITICAL root:test_vulnerability_detector.py:711 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5-1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5-1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:721 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_change_agent_manager[install_package] | 392.32 | Test arguments test_change_agent_manager[install_package].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527796fa0> permutate_agents_managers = None request = <FixtureRequest for <Function test_change_agent_manager[install_package]>> preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6527d10820> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", test_cases_change_manager, ids=list_ids_change_manager,) def test_change_agent_manager(self, permutate_agents_managers, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for Syscollector and VD Scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) logging.critical("Validating found vulnerabilities") test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp ) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_change_agent_manager[install_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0370>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0370>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272b0370>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:864: AssertionError -------------------------------Captured log setup------------------------------- ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent1 to manager2 (172.31.12.164) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent3 to manager2 (172.31.12.164) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent4 to manager2 (172.31.12.164) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent5 to manager1 (172.31.15.53) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent6 to manager2 (44.192.63.45) ERROR root:test_vulnerability_detector.py:620 Changing manager for agent agent2 to manager1 (172.31.15.53) -------------------------------Captured log call-------------------------------- CRITICAL root:test_vulnerability_detector.py:773 Remote operation results: {'agent6': True, 'agent4': True, 'agent5': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} CRITICAL root:test_vulnerability_detector.py:794 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:809 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:830 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:843 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package] | 310.39 | Test arguments test_vulnerability_detector_scans_cases[install_package].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611ac0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package]>> preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6525e0eaf0> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[install_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726e580>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726e580>> = <wazuh_testing.end_to_end.TestResult object at 0x7f652726e580>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent5': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2017-16014', package_name='http-proxy', package_version='0.5.9', architecture='')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2017-16014', package_name='http-proxy', package_version='0.5.9', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_package] | 311.46 | Test arguments test_vulnerability_detector_scans_cases[remove_package].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611cd0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[remove_package]>> preconditions = None body = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'mac...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6526dceee0> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[remove_package] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726ea30>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f652726ea30>> = <wazuh_testing.end_to_end.TestResult object at 0x7f652726ea30>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent1': True, 'agent5': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] | 846.72 | Test arguments test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611a30> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability]>> preconditions = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-1'}, 'ma...proxy-0.5.9'}, 'ubuntu': {'amd64': 'grafana-8.5.5', 'arm64v8': 'grafana-8.5.5'}, 'windows': {'amd64': 'node-v17.0.1'}}} body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.5-1', 'arm64v8': 'grafana-8.5.5-...oxy-0.5.10'}, 'ubuntu': {'amd64': 'grafana-8.5.6', 'arm64v8': 'grafana-8.5.6'}, 'windows': {'amd64': 'node-v17.1.0'}}}} teardown = None, setup = ['agent5', 'agent3', 'agent2'] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6525e0ea60> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_maintain_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index failed. Evidences (['unexpected_vulnerabilities']) can be found in the report. E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results failed. Evidences (['setup_failed_agents']) can be found in the report. E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6525e080d0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6525e080d0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6525e080d0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log setup------------------------------- CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to False with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent4': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent1: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:41 Vulnerability unexpected found for agent4: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {'agent1': [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64')], 'agent4': [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64')]} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities CRITICAL root:check_validators.py:145 agent1 is not empty: [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent4 is not empty: [Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.6-1', architecture='arm64')] ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to False with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='8.5.5', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.5', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.0.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.0.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability] | 333.15 | Test arguments test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f65276119d0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability]>> preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-8.5.6-1', 'arm64v8': 'grafana-8.5.6-...tion-5.0.0'}, 'ubuntu': {'amd64': 'grafana-9.1.1', 'arm64v8': 'grafana-9.1.1'}, 'windows': {'amd64': 'node-v18.0.0'}}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6527347f70> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_add_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272875b0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272875b0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272875b0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent1': True, 'agent4': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')], 'agent2': [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31097', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31107', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='8.5.6', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='8.5.6', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2021-4044', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44531', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44532', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2021-44533', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-0778', package_name='Node.js', package_version='17.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-21824', package_name='Node.js', package_version='17.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability] | 333.05 | Test arguments test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611f40> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability]>> preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.1.1-1', 'arm64v8': 'grafana-9.1.1-...tion-5.0.0'}, 'ubuntu': {'amd64': 'grafana-9.2.0', 'arm64v8': 'grafana-9.2.0'}, 'windows': {'amd64': 'node-v18.1.0'}}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6527cf9a60> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_maintain_add_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65277cccd0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65277cccd0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65277cccd0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2023-42810', package_name='systeminformation', package_version='5.0.0', architecture='')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')], 'agent6': [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='5.0.0', architecture=''), Vulnerability(cve='CVE-2023-42810', package_name='systeminformation', package_version='5.0.0', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31123', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-31130', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-35957', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-36062', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39201', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39229', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.1.1', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.1.1', architecture='arm64')] CRITICAL root:check_validators.py:145 agent6 is not empty: [Vulnerability(cve='CVE-2021-21315', package_name='systeminformation', package_version='4.34.23', architecture=''), Vulnerability(cve='CVE-2021-21388', package_name='systeminformation', package_version='4.34.23', architecture='')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32223', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.0.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] | 329.37 | Test arguments test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f65276117f0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability]>> preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.2.0-1', 'arm64v8': 'grafana-9.2.0-...y-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.4.17', 'arm64v8': 'grafana-9.4.17'}, 'windows': {'amd64': 'node-v18.20.0'}}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f65273474c0> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_remove_vulnerability] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert failed. Evidences (['missing_mitigated_alerts']) can be found in the report. E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272f7190>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65272f7190>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65272f7190>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent5': True, 'agent1': True, 'agent3': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {'agent3': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')]} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2022-23498', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-23552', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39306', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39307', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39324', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2022-39328', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0507', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-0594', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1387', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-1410', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-2183', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-22462', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-3128', package_name='grafana', package_version='9.2.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='9.2.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2022-32212', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32213', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32214', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32215', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-32222', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35255', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-35256', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3602', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-3786', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2022-43548', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23918', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23919', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23920', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-23936', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30581', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30585', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30588', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30589', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-30590', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32002', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32006', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-32559', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='18.1.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='18.1.0', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to False with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable] | 334.52 | Test arguments test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611e20> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable]>> preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.4.17-1', 'arm64v8': 'grafana-9.4.1...y-0.7.2'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.2'}}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6527330160> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_nonvulnerable] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents succeeded E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6507fc8250>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6507fc8250>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6507fc8250>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': True} ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to True with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] | 487.31 | Test arguments test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611e80> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable]>> preconditions = None body = {'operation': 'update_package', 'package': {'from': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.1...on-3.0.0'}, 'ubuntu': {'amd64': 'grafana-10.0.0', 'arm64v8': 'grafana-10.0.0'}, 'windows': {'amd64': 'node-v20.5.1'}}}} teardown = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-10.0.0-1', 'arm64v8': 'grafana-10.0.0-1'}, 'm...xon-3.0.0'}, 'ubuntu': {'amd64': 'grafana-10.0.0', 'arm64v8': 'grafana-10.0.0'}, 'windows': {'amd64': 'node-v20.5.1'}}} setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f65272fca60> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[upgrade_package_nonvulnerable_to_vulnerable] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents failed. Evidences (['operation_results']) can be found in the report. E Check expected_vulnerabilities_found_in_index failed. Evidences (['missing_vulnerabilities']) can be found in the report. E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert failed. Evidences (['missing_affected_alerts']) can be found in the report. E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities failed. Evidences (['duplicated_vulnerabilities']) can be found in the report. E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6526dc3880>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6526dc3880>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6526dc3880>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] ERROR root:remote_operations_handler.py:401 Error installing package on agent2: Failed to install package in agent2: {'changed': False, 'msg': 'Unhandled exception while executing module: Exception calling "OpenPackage" with "2" argument(s): "This installation package could not be opened. Verify that the package exists and that you can access it, or contact the application vendor to verify that this is a valid Windows Installer package"'} CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True, 'agent2': False} CRITICAL root:check_validators.py:9 Operation on agent2 failed ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent3: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent5: Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:30 Vulnerability not found for agent2: Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64') CRITICAL root:check_validators.py:50 Vulnerabilities not found: {'agent3': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')]} CRITICAL root:check_validators.py:51 Vulnerabilities unexpected: {} ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to False with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to False with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:check_validators.py:123 Vulnerabilities affected not found: {'agent3': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')], 'agent5': [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')], 'agent2': [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')]} CRITICAL root:check_validators.py:124 Vulnerabilities mitigated not found: {} CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts CRITICAL root:check_validators.py:145 agent3 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='x86_64')] CRITICAL root:check_validators.py:145 agent5 is not empty: [Vulnerability(cve='CVE-2023-4399', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64'), Vulnerability(cve='CVE-2023-4822', package_name='grafana', package_version='10.0.0', architecture='arm64')] CRITICAL root:check_validators.py:145 agent2 is not empty: [Vulnerability(cve='CVE-2023-38552', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39331', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-39332', package_name='Node.js', package_version='20.5.1', architecture='x86_64'), Vulnerability(cve='CVE-2023-44487', package_name='Node.js', package_version='20.5.1', architecture='x86_64')] ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to False with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs ERROR root:remote_operations_handler.py:378 Error removing package on agent2: Failed to remove package in agent2: {'changed': False, 'rc': 0, 'reboot_required': False} | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[install_package_non_vulnerable] | 307.18 | Test arguments test_vulnerability_detector_scans_cases[install_package_non_vulnerable].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611eb0> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[install_package_non_vulnerable]>> preconditions = None body = {'operation': 'install_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, '...xy-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.0'}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f652734ea60> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[install_package_non_vulnerable] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents failed. Evidences (['operation_results']) can be found in the report. E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cfaa60>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f6527cfaa60>> = <wazuh_testing.end_to_end.TestResult object at 0x7f6527cfaa60>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] ERROR root:remote_operations_handler.py:326 Error installing package on agent2: Failed to install package in agent2: {'changed': False, 'elapsed': 0.6012103999999999, 'log': "=== Verbose logging started: 5/7/2024 11:17:02 Build type: SHIP UNICODE 5.00.10011.00 Calling process: C:\\Windows\\System32\\msiexec.exe ===\r\nMSI (c) (C8:40) [11:17:02:234]: Resetting cached policy values\r\nMSI (c) (C8:40) [11:17:02:234]: Machine policy value 'Debug' is 0\r\nMSI (c) (C8:40) [11:17:02:234]: ******* RunEngine:\r\n ******* Product: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\n ******* Action: \r\n ******* CommandLine: **********\r\nMSI (c) (C8:40) [11:17:02:234]: Client-side and UI is none or basic: Running entire install on the server.\r\nMSI (c) (C8:40) [11:17:02:234]: Grabbed execution mutex.\r\nMSI (c) (C8:40) [11:17:02:234]: Cloaking enabled.\r\nMSI (c) (C8:40) [11:17:02:234]: Attempting to enable all disabled privileges before calling Install on Server\r\nMSI (c) (C8:40) [11:17:02:234]: Incrementing counter to disable shutdown. Counter after increment: 0\r\nMSI (s) (88:DC) [11:17:02:249]: Running installation inside multi-package transaction C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\nMSI (s) (88:DC) [11:17:02:249]: Grabbed execution mutex.\r\nMSI (s) (88:A4) [11:17:02:249]: Resetting cached policy values\r\nMSI (s) (88:A4) [11:17:02:249]: Machine policy value 'Debug' is 0\r\nMSI (s) (88:A4) [11:17:02:249]: ******* RunEngine:\r\n ******* Product: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\n ******* Action: \r\n ******* CommandLine: **********\r\nMSI (s) (88:A4) [11:17:02:249]: Machine policy value 'DisableUserInstalls' is 0\r\nMSI (s) (88:A4) [11:17:02:249]: Note: 1: 2203 2: C:\\Windows\\Installer\\inprogressinstallinfo.ipi 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:265]: SRSetRestorePoint skipped for this transaction.\r\nMSI (s) (88:A4) [11:17:02:265]: Note: 1: 1402 2: HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer 3: 2 \r\nMSI (s) (88:A4) [11:17:02:265]: File will have security applied from OpCode.\r\nMSI (s) (88:A4) [11:17:02:281]: SOFTWARE RESTRICTION POLICY: Verifying package --> 'C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi' against software restriction policy\r\nMSI (s) (88:A4) [11:17:02:281]: SOFTWARE RESTRICTION POLICY: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi has a digital signature\r\nMSI (s) (88:A4) [11:17:02:296]: SOFTWARE RESTRICTION POLICY: C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi is permitted to run at the 'unrestricted' authorization level.\r\nMSI (s) (88:A4) [11:17:02:296]: MSCOREE not loaded loading copy from system32\r\nMSI (s) (88:A4) [11:17:02:296]: End dialog not enabled\r\nMSI (s) (88:A4) [11:17:02:296]: Original package ==> C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\nMSI (s) (88:A4) [11:17:02:296]: Package we're running from ==> C:\\Windows\\Installer\\856c8e.msi\r\nMSI (s) (88:A4) [11:17:02:296]: APPCOMPAT: Compatibility mode property overrides found.\r\nMSI (s) (88:A4) [11:17:02:296]: APPCOMPAT: looking for appcompat database entry with ProductCode '{ED801E31-1556-48A1-AC38-BADEF42169B0}'.\r\nMSI (s) (88:A4) [11:17:02:296]: APPCOMPAT: no matching ProductCode found in database.\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'TransformsSecure' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: User policy value 'TransformsAtSource' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisablePatch' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'AllowLockdownPatch' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableLUAPatching' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableFlyWeightPatching' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: APPCOMPAT: looking for appcompat database entry with ProductCode '{ED801E31-1556-48A1-AC38-BADEF42169B0}'.\r\nMSI (s) (88:A4) [11:17:02:312]: APPCOMPAT: no matching ProductCode found in database.\r\nMSI (s) (88:A4) [11:17:02:312]: Transforms are not secure.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding MsiLogFileLocation property. Its value is 'C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\msiexec.log'.\r\nMSI (s) (88:A4) [11:17:02:312]: Command Line: REBOOT=ReallySuppress REBOOTPROMPT=S CURRENTDIRECTORY=C:\\Users\\qa CLIENTUILEVEL=3 CLIENTPROCESSID=6088 \r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding PackageCode property. Its value is '{458F748B-28FB-4746-94C7-2E7A73152173}'.\r\nMSI (s) (88:A4) [11:17:02:312]: Product Code passed to Engine.Initialize: ''\r\nMSI (s) (88:A4) [11:17:02:312]: Product Code from property table before transforms: '{ED801E31-1556-48A1-AC38-BADEF42169B0}'\r\nMSI (s) (88:A4) [11:17:02:312]: Product Code from property table after transforms: '{ED801E31-1556-48A1-AC38-BADEF42169B0}'\r\nMSI (s) (88:A4) [11:17:02:312]: Product not registered: beginning first-time install\r\nMSI (s) (88:A4) [11:17:02:312]: Product {ED801E31-1556-48A1-AC38-BADEF42169B0} is not managed.\r\nMSI (s) (88:A4) [11:17:02:312]: MSI_LUA: Credential prompt not required, user is an admin\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding ProductState property. Its value is '-1'.\r\nMSI (s) (88:A4) [11:17:02:312]: Entering CMsiConfigurationManager::SetLastUsedSource.\r\nMSI (s) (88:A4) [11:17:02:312]: User policy value 'SearchOrder' is 'nmu'\r\nMSI (s) (88:A4) [11:17:02:312]: Adding new sources is allowed.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding PackagecodeChanging property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:312]: Package name extracted from package path: 'node-v18.20.0-x64.msi'\r\nMSI (s) (88:A4) [11:17:02:312]: Package to be registered: 'node-v18.20.0-x64.msi'\r\nMSI (s) (88:A4) [11:17:02:312]: Note: 1: 2262 2: AdminProperties 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableMsi' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'AlwaysInstallElevated' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: User policy value 'AlwaysInstallElevated' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: Product installation will be elevated because user is admin and product is being installed per-machine.\r\nMSI (s) (88:A4) [11:17:02:312]: Running product '{ED801E31-1556-48A1-AC38-BADEF42169B0}' with elevated privileges: Product is assigned.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding REBOOT property. Its value is 'ReallySuppress'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding REBOOTPROMPT property. Its value is 'S'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding CURRENTDIRECTORY property. Its value is 'C:\\Users\\qa'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding CLIENTUILEVEL property. Its value is '3'.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding CLIENTPROCESSID property. Its value is '6088'.\r\nMSI (s) (88:A4) [11:17:02:312]: Machine policy value 'DisableAutomaticApplicationShutdown' is 0\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding MsiRestartManagerSessionKey property. Its value is 'f05913425bbaa541a0f476cb4a49d237'.\r\nMSI (s) (88:A4) [11:17:02:312]: RESTART MANAGER: Session opened.\r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding MsiSystemRebootPending property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:312]: TRANSFORMS property is now: \r\nMSI (s) (88:A4) [11:17:02:312]: PROPERTY CHANGE: Adding VersionDatabase property. Its value is '200'.\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Favorites\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Network Shortcuts\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Documents\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Recent\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Templates\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Local\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Pictures\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\r\nMSI (s) (88:A4) [11:17:02:327]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Start Menu\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\Public\\Desktop\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Users\\qa\\Desktop\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\ProgramData\\Microsoft\\Windows\\Templates\r\nMSI (s) (88:A4) [11:17:02:343]: SHELL32::SHGetFolderPath returned: C:\\Windows\\Fonts\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 2898 2: MS Sans Serif 3: MS Sans Serif 4: 0 5: 16 \r\nMSI (s) (88:A4) [11:17:02:343]: MSI_LUA: Setting MsiRunningElevated property to 1 because the install is already running elevated.\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding MsiRunningElevated property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding Privileged property. Its value is '1'.\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 1402 2: HKEY_CURRENT_USER\\Software\\Microsoft\\MS Setup (ACME)\\User Info 3: 2 \r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding USERNAME property. Its value is 'Jenkins'.\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 1402 2: HKEY_CURRENT_USER\\Software\\Microsoft\\MS Setup (ACME)\\User Info 3: 2 \r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding DATABASE property. Its value is 'C:\\Windows\\Installer\\856c8e.msi'.\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding OriginalDatabase property. Its value is 'C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi'.\r\nMSI (s) (88:A4) [11:17:02:343]: Machine policy value 'MsiDisableEmbeddedUI' is 0\r\nMSI (s) (88:A4) [11:17:02:343]: EEUI - Disabling MsiEmbeddedUI for service because it's not a quiet/basic install\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 2205 2: 3: PatchPackage \r\nMSI (s) (88:A4) [11:17:02:343]: Machine policy value 'DisableRollback' is 0\r\nMSI (s) (88:A4) [11:17:02:343]: User policy value 'DisableRollback' is 0\r\nMSI (s) (88:A4) [11:17:02:343]: PROPERTY CHANGE: Adding UILevel property. Its value is '2'.\r\n=== Logging started: 5/7/2024 11:17:02 ===\r\nMSI (s) (88:A4) [11:17:02:343]: Note: 1: 2203 2: C:\\Windows\\Installer\\inprogressinstallinfo.ipi 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:343]: APPCOMPAT: [DetectVersionLaunchCondition] Launch condition already passes.\r\nMSI (s) (88:A4) [11:17:02:359]: PROPERTY CHANGE: Adding ACTION property. Its value is 'INSTALL'.\r\nMSI (s) (88:A4) [11:17:02:359]: Doing action: INSTALL\r\nAction start 11:17:02: INSTALL.\r\nMSI (s) (88:A4) [11:17:02:359]: Running ExecuteSequence\r\nMSI (s) (88:A4) [11:17:02:359]: Doing action: SetInstallScope\r\nMSI (s) (88:14) [11:17:02:359]: Invoking remote custom action. DLL: C:\\Windows\\Installer\\MSI6CEB.tmp, Entrypoint: SetInstallScope\r\nMSI (s) (88:70) [11:17:02:359]: Generating random cookie.\r\nMSI (s) (88:70) [11:17:02:359]: Created Custom Action Server with PID 1556 (0x614).\r\nMSI (s) (88:E0) [11:17:02:408]: Running as a service.\r\nMSI (s) (88:E0) [11:17:02:424]: Hello, I'm your 64bit Impersonated custom action server.\r\nAction start 11:17:02: SetInstallScope.\r\nMSI (s) (88:A4) [11:17:02:424]: Doing action: GetLocalizedUserNames\r\nAction ended 11:17:02: SetInstallScope. Return value 1.\r\nMSI (s) (88:F8) [11:17:02:424]: Invoking remote custom action. DLL: C:\\Windows\\Installer\\MSI6D2B.tmp, Entrypoint: GetLocalizedUserNames\r\nMSI (s) (88!28) [11:17:02:440]: PROPERTY CHANGE: Adding AUTHENTICATED_USERS property. Its value is 'Authenticated Users'.\r\nAction start 11:17:02: GetLocalizedUserNames.\r\nMSI (s) (88:A4) [11:17:02:440]: Doing action: FindRelatedProducts\r\nAction ended 11:17:02: GetLocalizedUserNames. Return value 1.\r\nAction start 11:17:02: FindRelatedProducts.\r\nMSI (s) (88:A4) [11:17:02:440]: PROPERTY CHANGE: Adding WIX_DOWNGRADE_DETECTED property. Its value is '{2484FA32-4508-4229-B443-7AA07AD22780}'.\r\nMSI (s) (88:A4) [11:17:02:440]: Doing action: AppSearch\r\nAction ended 11:17:02: FindRelatedProducts. Return value 1.\r\nAction start 11:17:02: AppSearch.\r\nMSI (s) (88:A4) [11:17:02:440]: Note: 1: 2262 2: Signature 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:440]: PROPERTY CHANGE: Adding INSTALLDIR property. Its value is 'C:\\Program Files\\nodejs\\'.\r\nMSI (s) (88:A4) [11:17:02:440]: Note: 1: 2262 2: Signature 3: -2147287038 \r\nMSI (s) (88:A4) [11:17:02:440]: Doing action: WixQueryOsWellKnownSID\r\nAction ended 11:17:02: AppSearch. Return value 1.\r\nMSI (s) (88:8C) [11:17:02:440]: Invoking remote custom action. DLL: C:\\Windows\\Installer\\MSI6D3C.tmp, Entrypoint: WixQueryOsWellKnownSID\r\nMSI (s) (88:70) [11:17:02:440]: Generating random cookie.\r\nMSI (s) (88:70) [11:17:02:456]: Created Custom Action Server with PID 2244 (0x8C4).\r\nMSI (s) (88:F8) [11:17:02:487]: Running as a service.\r\nMSI (s) (88:F8) [11:17:02:487]: Hello, I'm your 32bit Impersonated custom action server.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_LOCALSYSTEM property. Its value is 'NT AUTHORITY\\SYSTEM'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_LOCALSERVICE property. Its value is 'NT AUTHORITY\\LOCAL SERVICE'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_NETWORKSERVICE property. Its value is 'NT AUTHORITY\\NETWORK SERVICE'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_ADMINISTRATORS property. Its value is 'BUILTIN\\Administrators'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_USERS property. Its value is 'BUILTIN\\Users'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_GUESTS property. Its value is 'BUILTIN\\Guests'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_PERFLOGUSERS property. Its value is 'BUILTIN\\Performance Log Users'.\r\nMSI (s) (88!6C) [11:17:02:503]: PROPERTY CHANGE: Adding WIX_ACCOUNT_PERFLOGUSERS_NODOMAIN property. Its value is 'Performance Log Users'.\r\nAction start 11:17:02: WixQueryOsWellKnownSID.\r\nMSI (s) (88:A4) [11:17:02:503]: Doing action: LaunchConditions\r\nAction ended 11:17:02: WixQueryOsWellKnownSID. Return value 1.\r\nAction start 11:17:02: LaunchConditions.\r\nMSI (s) (88:A4) [11:17:02:503]: Product: Node.js -- A later version of Node.js is already installed. Setup will now exit.\r\n\r\nA later version of Node.js is already installed. Setup will now exit.\r\nAction ended 11:17:02: LaunchConditions. Return value 3.\r\nAction ended 11:17:02: INSTALL. Return value 3.\r\nProperty(S): UpgradeCode = {47C07A3A-42EF-4213-A85D-8F5A59077C28}\r\nProperty(S): INSTALLDIR = C:\\Program Files\\nodejs\\\r\nProperty(S): WixUIRMOption = UseRM\r\nProperty(S): WIXUI_INSTALLDIR = INSTALLDIR\r\nProperty(S): ALLUSERS = 1\r\nProperty(S): ProgramMenuFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\\r\nProperty(S): ProgramFiles64Folder = C:\\Program Files\\\r\nProperty(S): ARPPRODUCTICON = NodeIcon\r\nProperty(S): ApplicationFolderName = nodejs\r\nProperty(S): WixShellExecTarget = [#InstallToolsBat]\r\nProperty(S): DefaultUIFont = WixUI_Font_Normal\r\nProperty(S): WixUI_Mode = FeatureTree\r\nProperty(S): WIXUI_EXITDIALOGOPTIONALTEXT = Node.js has been successfully installed.\r\nProperty(S): Manufacturer = Node.js Foundation\r\nProperty(S): ProductCode = {ED801E31-1556-48A1-AC38-BADEF42169B0}\r\nProperty(S): ProductLanguage = 1033\r\nProperty(S): ProductName = Node.js\r\nProperty(S): ProductVersion = 18.20.0\r\nProperty(S): ErrorDialog = ErrorDlg\r\nProperty(S): SecureCustomProperties = EARLY_IO_DETECTED;INSTALLDIR;NODE_0X_DETECTED;WIX_ACCOUNT_ADMINISTRATORS;WIX_ACCOUNT_LOCALSYSTEM;WIX_ACCOUNT_USERS;WIX_DOWNGRADE_DETECTED;WIX_UPGRADE_DETECTED\r\nProperty(S): MsiHiddenProperties = ExecXmlFile;ExecXmlFileRollback\r\nProperty(S): WIX_DOWNGRADE_DETECTED = {2484FA32-4508-4229-B443-7AA07AD22780}\r\nProperty(S): MsiLogFileLocation = C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\msiexec.log\r\nProperty(S): PackageCode = {458F748B-28FB-4746-94C7-2E7A73152173}\r\nProperty(S): ProductState = -1\r\nProperty(S): PackagecodeChanging = 1\r\nProperty(S): REBOOT = ReallySuppress\r\nProperty(S): REBOOTPROMPT = S\r\nProperty(S): CURRENTDIRECTORY = C:\\Users\\qa\r\nProperty(S): CLIENTUILEVEL = 3\r\nProperty(S): CLIENTPROCESSID = 6088\r\nProperty(S): MsiRestartManagerSessionKey = f05913425bbaa541a0f476cb4a49d237\r\nProperty(S): VersionDatabase = 200\r\nProperty(S): MsiSystemRebootPending = 1\r\nProperty(S): VersionMsi = 5.00\r\nProperty(S): VersionNT = 603\r\nProperty(S): VersionNT64 = 603\r\nProperty(S): WindowsBuild = 9600\r\nProperty(S): ServicePackLevel = 0\r\nProperty(S): ServicePackLevelMinor = 0\r\nProperty(S): MsiNTProductType = 1\r\nProperty(S): WindowsFolder = C:\\Windows\\\r\nProperty(S): WindowsVolume = C:\\\r\nProperty(S): System64Folder = C:\\Windows\\system32\\\r\nProperty(S): SystemFolder = C:\\Windows\\SysWOW64\\\r\nProperty(S): RemoteAdminTS = 1\r\nProperty(S): TempFolder = C:\\Users\\qa\\AppData\\Local\\Temp\\\r\nProperty(S): ProgramFilesFolder = C:\\Program Files (x86)\\\r\nProperty(S): CommonFilesFolder = C:\\Program Files (x86)\\Common Files\\\r\nProperty(S): CommonFiles64Folder = C:\\Program Files\\Common Files\\\r\nProperty(S): AppDataFolder = C:\\Users\\qa\\AppData\\Roaming\\\r\nProperty(S): FavoritesFolder = C:\\Users\\qa\\Favorites\\\r\nProperty(S): NetHoodFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Network Shortcuts\\\r\nProperty(S): PersonalFolder = C:\\Users\\qa\\Documents\\\r\nProperty(S): PrintHoodFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Printer Shortcuts\\\r\nProperty(S): RecentFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\\r\nProperty(S): SendToFolder = C:\\Users\\qa\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\\r\nProperty(S): TemplateFolder = C:\\ProgramData\\Microsoft\\Windows\\Templates\\\r\nProperty(S): CommonAppDataFolder = C:\\ProgramData\\\r\nProperty(S): LocalAppDataFolder = C:\\Users\\qa\\AppData\\Local\\\r\nProperty(S): MyPicturesFolder = C:\\Users\\qa\\Pictures\\\r\nProperty(S): AdminToolsFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Administrative Tools\\\r\nProperty(S): StartupFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\\r\nProperty(S): StartMenuFolder = C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\\r\nProperty(S): DesktopFolder = C:\\Users\\Public\\Desktop\\\r\nProperty(S): FontsFolder = C:\\Windows\\Fonts\\\r\nProperty(S): GPTSupport = 1\r\nProperty(S): OLEAdvtSupport = 1\r\nProperty(S): ShellAdvtSupport = 1\r\nProperty(S): MsiAMD64 = 6\r\nProperty(S): Msix64 = 6\r\nProperty(S): Intel = 6\r\nProperty(S): PhysicalMemory = 4016\r\nProperty(S): VirtualMemory = 4011\r\nProperty(S): AdminUser = 1\r\nProperty(S): MsiTrueAdminUser = 1\r\nProperty(S): LogonUser = qa\r\nProperty(S): UserSID = S-1-5-21-3278051518-3114999403-1073775594-1002\r\nProperty(S): UserLanguageID = 1033\r\nProperty(S): ComputerName = DESKTOP-AQ2R8SM\r\nProperty(S): SystemLanguageID = 1033\r\nProperty(S): ScreenX = 1024\r\nProperty(S): ScreenY = 768\r\nProperty(S): CaptionHeight = 23\r\nProperty(S): BorderTop = 1\r\nProperty(S): BorderSide = 1\r\nProperty(S): TextHeight = 16\r\nProperty(S): TextInternalLeading = 3\r\nProperty(S): ColorBits = 32\r\nProperty(S): TTCSupport = 1\r\nProperty(S): Time = 11:17:02\r\nProperty(S): Date = 5/7/2024\r\nProperty(S): MsiNetAssemblySupport = 4.8.9032.0\r\nProperty(S): MsiWin32AssemblySupport = 6.3.22621.963\r\nProperty(S): RedirectedDllSupport = 2\r\nProperty(S): MsiRunningElevated = 1\r\nProperty(S): Privileged = 1\r\nProperty(S): USERNAME = Jenkins\r\nProperty(S): DATABASE = C:\\Windows\\Installer\\856c8e.msi\r\nProperty(S): OriginalDatabase = C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi\r\nProperty(S): UILevel = 2\r\nProperty(S): ACTION = INSTALL\r\nProperty(S): AUTHENTICATED_USERS = Authenticated Users\r\nProperty(S): WIX_ACCOUNT_LOCALSYSTEM = NT AUTHORITY\\SYSTEM\r\nProperty(S): WIX_ACCOUNT_LOCALSERVICE = NT AUTHORITY\\LOCAL SERVICE\r\nProperty(S): WIX_ACCOUNT_NETWORKSERVICE = NT AUTHORITY\\NETWORK SERVICE\r\nProperty(S): WIX_ACCOUNT_ADMINISTRATORS = BUILTIN\\Administrators\r\nProperty(S): WIX_ACCOUNT_USERS = BUILTIN\\Users\r\nProperty(S): WIX_ACCOUNT_GUESTS = BUILTIN\\Guests\r\nProperty(S): WIX_ACCOUNT_PERFLOGUSERS = BUILTIN\\Performance Log Users\r\nProperty(S): WIX_ACCOUNT_PERFLOGUSERS_NODOMAIN = Performance Log Users\r\nMSI (s) (88:A4) [11:17:02:534]: Note: 1: 1708 \r\nMSI (s) (88:A4) [11:17:02:534]: Product: Node.js -- Installation failed.\r\n\r\nMSI (s) (88:A4) [11:17:02:534]: Windows Installer installed the product. Product Name: Node.js. Product Version: 18.20.0. Product Language: 1033. Manufacturer: Node.js Foundation. Installation success or error status: 1603.\r\n\r\nMSI (s) (88:A4) [11:17:02:534]: Deferring clean up of packages/files, if any exist\r\nMSI (s) (88:A4) [11:17:02:534]: MainEngineThread is returning 1603\r\nMSI (s) (88:DC) [11:17:02:534]: RESTART MANAGER: Session closed.\r\nMSI (s) (88:DC) [11:17:02:534]: No System Restore sequence number for this installation.\r\n=== Logging stopped: 5/7/2024 11:17:02 ===\r\nMSI (s) (88:DC) [11:17:02:534]: User policy value 'DisableRollback' is 0\r\nMSI (s) (88:DC) [11:17:02:534]: Machine policy value 'DisableRollback' is 0\r\nMSI (s) (88:DC) [11:17:02:534]: Incrementing counter to disable shutdown. Counter after increment: 0\r\nMSI (s) (88:DC) [11:17:02:534]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Installer\\Rollback\\Scripts 3: 2 \r\nMSI (s) (88:DC) [11:17:02:534]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Installer\\Rollback\\Scripts 3: 2 \r\nMSI (s) (88:DC) [11:17:02:550]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied. Counter after decrement: -1\r\nMSI (s) (88:DC) [11:17:02:550]: Destroying RemoteAPI object.\r\nMSI (s) (88:70) [11:17:02:550]: Custom Action Manager thread ending.\r\nMSI (c) (C8:40) [11:17:02:550]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied. Counter after decrement: -1\r\nMSI (c) (C8:40) [11:17:02:550]: MainEngineThread is returning 1603\r\n=== Verbose logging stopped: 5/7/2024 11:17:02 ===\r\n\r\n", 'msg': "unexpected rc from 'C:\\Windows\\System32\\msiexec.exe /i C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\node-v18.20.0-x64.msi /L*V C:\\Users\\qa\\AppData\\Local\\Temp\\ansible-moduletmp-133595542207059765-1872437114\\msiexec.log /qn /norestart /passive': see rc, stdout, and stderr for more details", 'rc': 1603, 'reboot_required': False, 'status_code': 200, 'stderr': '', 'stderr_lines': [], 'stdout': '', 'stdout_lines': []} CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent2': False, 'agent5': True, 'agent3': True, 'agent4': True, 'agent1': True} CRITICAL root:check_validators.py:9 Operation on agent2 failed ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs | ||||
Failed | test_vulnerability_detector/test_vulnerability_detector.py::TestScanSyscollectorCases::test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] | 321.86 | Test arguments test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge].log manager1_ossec.log manager2_ossec.log agent1_ossec.log agent3_ossec.log agent4_ossec.log agent5_ossec.log agent6_ossec.log agent2_ossec.log manager1_alert.json manager2_alert.json error_level_messages operation_results missing_vulnerabilities vulnerabilities_found_in_index expected_vulnerabilities unexpected_vulnerabilities missing_affected_alerts alerts_found_in_index expected_alerts missing_mitigated_alerts setup_failed_agents duplicated_vulnerabilities vulnerabilities | |
Test function detailsExtended SummaryParametersself = <test_vulnerability_detector.TestScanSyscollectorCases object at 0x7f6527611f70> request = <FixtureRequest for <Function test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge]>> preconditions = None body = {'operation': 'remove_package', 'package': {'centos': {'amd64': 'grafana-9.5.13-1', 'arm64v8': 'grafana-9.5.13-1'}, 'm...xy-0.7.0'}, 'ubuntu': {'amd64': 'grafana-9.5.13', 'arm64v8': 'grafana-9.5.13'}, 'windows': {'amd64': 'node-v18.20.0'}}} teardown = None, setup = [] host_manager = <wazuh_testing.tools.system.HostManager object at 0x7f6527607700> record_property = <function record_property.<locals>.append_property at 0x7f6525bf7670> clean_environment_logs = None, delete_states_vulnerability_index = None clean_environment_logs_function = None @pytest.mark.parametrize("preconditions, body, teardown", complete_list, ids=list_ids) def test_vulnerability_detector_scans_cases(self, request, preconditions, body, teardown, setup, host_manager, record_property, clean_environment_logs, delete_states_vulnerability_index, clean_environment_logs_function): # Is mandatory to launch this test along with the first scan test' global AGENTS_SCANNED_FIRST_SCAN if len(AGENTS_SCANNED_FIRST_SCAN) == 0: pytest.skip("No agent was scanned in the first scan. Skipping test.") target_to_ignore = list( set(host_manager.get_group_hosts("agent")) - set(AGENTS_SCANNED_FIRST_SCAN) ) utc_now_timestamp = datetime.datetime.now(datetime.timezone.utc) test_timestamp = utc_now_timestamp.strftime("%Y-%m-%dT%H:%M:%S") test_result = TestResult(request.node.name) test_result.add_check(self.no_errors_check) test_result.add_check(self.operation_successfull_for_all_agents_check) test_result.add_check(self.expected_vulnerabilities_found_in_index_check) test_result.add_check(self.no_unexpected_vulnerabilities_found_in_index_check) test_result.add_check(self.expected_vulnerability_affected_alert_check) test_result.add_check(self.expected_vulnerability_mitigated_alert_check) test_result.add_check(self.setup_successfull_for_all_agents_check) test_result.add_check(self.no_duplicated_vulnerabilities_check) record_property("test_result", test_result) agents_failed_setup = setup test_result.validate_check("setup_operation_results", [Evidence("setup_failed_agents", agents_failed_setup)]) # Install Vulnerable package operations_result = launch_parallel_operations( body, host_manager, target_to_ignore ) logging.critical(f"Remote operation results: {operations_result}") test_result.validate_check( "operation_successfull_for_all_agents", [Evidence("operation_results", operations_result)], ) # Wait for syscollector and VD scan time.sleep(VD_E2E_TIMEOUT_SYSCOLLECTOR_SCAN + PACKAGE_VULNERABILITY_SCAN_TIME) if "to" in body["package"]: package_data = [body["package"]["to"], body["package"]["from"]] else: package_data = [body["package"]] vulnerabilities = get_vulnerabilities_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data) expected_vulnerabilities = get_expected_index(host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"]) duplicated_vulnerabilities = get_duplicated_vulnerabilities(vulnerabilities) result = compare_expected_found_vulnerabilities(vulnerabilities, expected_vulnerabilities) vulnerabilities_not_found = result["vulnerabilities_not_found"] vulnerabilities_unexpected = result["vulnerabilities_unexpected"] test_result.validate_check('no_duplicated_vulnerabilities', [Evidence('duplicated_vulnerabilities', duplicated_vulnerabilities), Evidence('vulnerabilities', vulnerabilities) ]) logging.critical("Validating found vulnerabilities") test_result.validate_check( "expected_vulnerabilities_found_in_index", [ Evidence("missing_vulnerabilities", vulnerabilities_not_found), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) logging.critical("Validating unexpected vulnerabilities") test_result.validate_check( "no_unexpected_vulnerabilities_found_in_index", [ Evidence("unexpected_vulnerabilities", vulnerabilities_unexpected), Evidence("vulnerabilities_found_in_index", vulnerabilities), Evidence("expected_vulnerabilities", expected_vulnerabilities), ], ) alerts = get_vulnerability_alerts(host_manager, AGENTS_SCANNED_FIRST_SCAN, package_data, test_timestamp) expected_alerts = get_expected_alerts( host_manager, AGENTS_SCANNED_FIRST_SCAN, body["operation"], body["package"] ) result_alert = compare_expected_found_vulnerabilities_alerts( alerts, expected_alerts ) logging.critical("Validating found alerts") test_result.validate_check( "expected_vulnerability_affected_alert", [ Evidence( "missing_affected_alerts", result_alert["vulnerabilities_affected_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) logging.critical("Validating unexpected alerts") test_result.validate_check( "expected_vulnerability_mitigated_alert", [ Evidence( "missing_mitigated_alerts", result_alert["vulnerabilities_mitigated_not_found"], ), Evidence("alerts_found_in_index", alerts), Evidence("expected_alerts", expected_alerts), ], ) errors_environment = check_errors_in_environment( host_manager, expected_errors=VULNERABILITY_DETECTION_E2E_EXPECTED_ERRORS, greater_than_timestamp=test_timestamp, ) test_result.validate_check("no_errors", [Evidence("error_level_messages", errors_environment)]) > assert test_result.get_test_result(), test_result.report() E AssertionError: E Test test_vulnerability_detector_scans_cases[remove_non_vulnerable_packge] failed E E Check no_errors failed. Evidences (['error_level_messages']) can be found in the report. E Check operation_successfull_for_all_agents failed. Evidences (['operation_results']) can be found in the report. E Check expected_vulnerabilities_found_in_index succeeded E Check no_unexpected_vulnerabilities_found_in_index succeeded E Check expected_vulnerability_affected_alert succeeded E Check expected_vulnerability_mitigated_alert succeeded E Check setup_operation_results succeeded E Check no_duplicated_vulnerabilities succeeded E ----- E E assert False E + where False = <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65276408b0>>() E + where <bound method TestResult.get_test_result of <wazuh_testing.end_to_end.TestResult object at 0x7f65276408b0>> = <wazuh_testing.end_to_end.TestResult object at 0x7f65276408b0>.get_test_result end_to_end/test_vulnerability_detector/test_vulnerability_detector.py:993: AssertionError -------------------------------Captured log call-------------------------------- ERROR root:__init__.py:237 Marked check setup_operation_results result to True with evidences ['setup_failed_agents'] ERROR root:remote_operations_handler.py:378 Error removing package on agent2: Failed to remove package in agent2: {'changed': False, 'rc': 0, 'reboot_required': False} CRITICAL root:test_vulnerability_detector.py:903 Remote operation results: {'agent6': True, 'agent4': True, 'agent2': False, 'agent1': True, 'agent3': True, 'agent5': True} CRITICAL root:check_validators.py:9 Operation on agent2 failed ERROR root:__init__.py:237 Marked check operation_successfull_for_all_agents result to False with evidences ['operation_results'] ERROR root:__init__.py:237 Marked check no_duplicated_vulnerabilities result to True with evidences ['duplicated_vulnerabilities', 'vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:930 Validating found vulnerabilities ERROR root:__init__.py:237 Marked check expected_vulnerabilities_found_in_index result to True with evidences ['missing_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:940 Validating unexpected vulnerabilities ERROR root:__init__.py:237 Marked check no_unexpected_vulnerabilities_found_in_index result to True with evidences ['unexpected_vulnerabilities', 'vulnerabilities_found_in_index', 'expected_vulnerabilities'] CRITICAL root:test_vulnerability_detector.py:959 Validating found alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_affected_alert result to True with evidences ['missing_affected_alerts', 'alerts_found_in_index', 'expected_alerts'] CRITICAL root:test_vulnerability_detector.py:972 Validating unexpected alerts ERROR root:__init__.py:237 Marked check expected_vulnerability_mitigated_alert result to True with evidences ['missing_mitigated_alerts', 'alerts_found_in_index', 'expected_alerts'] ERROR root:__init__.py:237 Marked check no_errors result to False with evidences ['error_level_messages'] -----------------------------Captured log teardown------------------------------ ERROR root:conftest.py:152 Truncate managers and agents logs ERROR root:conftest.py:164 Delete vulnerability index ERROR root:conftest.py:138 Truncate managers and agents logs |